<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.gtconsult.com/blogs/tag/News/feed" rel="self" type="application/rss+xml"/><title>GTconsult - Blog #News</title><description>GTconsult - Blog #News</description><link>https://www.gtconsult.com/blogs/tag/News</link><lastBuildDate>Wed, 01 Apr 2026 02:47:10 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Sujata Excels in MS 900 Exam!]]></title><link>https://www.gtconsult.com/blogs/post/sujata-excels-in-ms-900-exam</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Sujata Thumbnail.jpg"/>With six years of experience in testing and quality control, Sujata has become highly skilled and knowledgeable in her field. Her tenure at GT for nea ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_0qtso2nASkeaKV11QKiimQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_PGlbe2GHRq-8MdioXn_yAg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_BUoaXPGuT6a4wQoivZ2KhQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_qLtAQfTvTyW_qfPP8SQXMw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qLtAQfTvTyW_qfPP8SQXMw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p align="center"><span style="font-size:22.5pt;">Sujata&nbsp;Excels in MS 900 Exam!&nbsp;</span></p></div></div></h2></div>
<div data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw"] .zpimagetext-container figure img { width: 435px !important ; height: 613.5px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw"] .zpimagetext-container figure img { width:435px ; height:613.5px ; } } @media (max-width: 767px) { [data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw"] .zpimagetext-container figure img { width:435px ; height:613.5px ; } } [data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/The%20Team/sujata-gtconsult.com.jpg" width="435" height="613.5" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="font-size:12px;"><p><span style="font-size:11pt;">With six years of experience in testing and quality control, Sujata has become highly skilled and knowledgeable in her field. Her tenure at GT for nearly two years has demonstrated her immense value as an asset to the team.&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">Driven by her desire to enhance her skills, Sujata recently embarked on a journey to improve herself further by taking the MS 900 Microsoft Fundamentals exam.&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">The MS 900 exam is specifically designed for individuals seeking to demonstrate their foundational understanding of cloud-based solutions that enhance productivity and collaboration in various settings, including on-site, at home, or a combination of both.&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div style="font-size:12px;"><p><a href="https://learn.microsoft.com/en-us/certifications/exams/ms-900/" target="_blank" rel="noreferrer noopener"><span style="font-size:11pt;">https://learn.microsoft.com/en-us/certifications/exams/ms-900/</span></a><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p><span style="font-size:11pt;"><br></span></p><div style="color:inherit;"><div><p><span style="font-size:11pt;">You might be wondering how Sujata fared in this exam. Well, it would be rather awkward if we were to write about an exam she didn't pass, wouldn't it? Fortunately, not only did she pass, but she did so with flying colors!&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">When asked about her motivation to pursue this certification, Sujata expressed her belief that it would enable her to better serve clients.&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">“If a client asks me anything about SharePoint, I can answer them smartly and confidently. Previously, I was a little bit confused when it came to the differences and the functionalities under SharePoint. Now, I know it better.”&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">She also emphasized how the certification has benefited her testing process, particularly in understanding requirements and finding improved ways to optimize SharePoint.&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><div style="color:inherit;"><div><p><span style="font-size:11pt;">Sujata's commitment to achieving her goal was evident in her rigorous exam preparation. She attributed her success to the comprehensive 500-page book &quot;Microsoft 365 Fundamentals&quot; by Craig Zacker, noting that studying this resource helped her gain a deeper understanding and ultimately pass the exam.&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">“Because I’m a tester, I don’t work in the back end, so I don’t know the coding and other stuff. That’s why this book was really helpful.”&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">Sujata also expressed gratitude towards her colleagues for their contributions to her success, including recommending study materials, offering study strategies, and providing encouragement.&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">Upon learning of her results, Sujata described her elation, admitting to feeling a bit nervous before the exam, unsure of what to expect.&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">“When I finished, I closed my eyes, opened them a little and saw, OK, I passed. I was literally dancing. And then I realized, OK, the camera is still on, they are still recording.”&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">Sujata's unwavering dedication to her work and constant pursuit of self-improvement are truly commendable. It is no surprise that she already has her sights set on the next certification, which we will undoubtedly be eager to share here.&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">Sujata, your hard work, and commitment to excellence are truly inspiring. Keep shining brightly! We eagerly anticipate witnessing your future accomplishments.&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div></div></div></div></div></div></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 01 Jun 2023 09:06:48 +0000</pubDate></item><item><title><![CDATA[Buckle in, we're just getting started!]]></title><link>https://www.gtconsult.com/blogs/post/buckle-in-we-re-just-getting-started</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Announcement new.jpg"/>Having served the market in various parts of South Africa and the world for over a decade, GT has made the decision to open a branch in a new location ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_TJZRkuE6SwecubaoDGUjEw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm__yt4g3D9Tt-iDd8aSiWLpg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_PFeFmAz4SmufmyXzEaybFQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_PFeFmAz4SmufmyXzEaybFQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Rcfm0MelQ5CEwyj4DydGbA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Rcfm0MelQ5CEwyj4DydGbA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">GT IS EXPANDING TO A NEW LOCATION!</h2></div>
<div data-element-id="elm_NJpkeiIyNcc3bu_cVKiPmw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_NJpkeiIyNcc3bu_cVKiPmw"] .zpimage-container figure img { width: 800px ; height: 533.50px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_NJpkeiIyNcc3bu_cVKiPmw"] .zpimage-container figure img { width:500px ; height:333.44px ; } } @media (max-width: 767px) { [data-element-id="elm_NJpkeiIyNcc3bu_cVKiPmw"] .zpimage-container figure img { width:500px ; height:333.44px ; } } [data-element-id="elm_NJpkeiIyNcc3bu_cVKiPmw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-large zpimage-tablet-fallback-large zpimage-mobile-fallback-large hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/pexels-markus-winkler-5227049.jpg" width="500" height="333.44" loading="lazy" size="large" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_eAFbl1XSQFKdHaUK37wzCg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_eAFbl1XSQFKdHaUK37wzCg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="color:inherit;">Having served the market in various parts of South Africa and the world for over a decade, GT has made the decision to open a branch in a new location!</span><br></div><div><br></div><div>We have been operating out of Seattle since 2014 and, as you can imagine, the time difference was quite significant. Ideally, we needed to be as close to the +2 GMT time zone to better serve our clients. Enter, new location.</div><div><br></div><div>We are pleased that our employees can now look forward to smoother operations, communication and shift handovers without the hassle of the major time difference.</div><div><br></div><div>“The new location is really the jelly in our peanut butter and jelly sandwich.&nbsp; Its our goldilocks location really, somewhere in the middle that is able to cover the gap between our Durban and Seattle branch.&nbsp; This will allow us to ensure a quality work balance for all employees in every location.&nbsp; And provide our customers the best possible service from each branch based on their work hour needs.”- Bradley Geldenhuys (Chairman)</div><div>&nbsp; &nbsp;</div><div>Having considered both Tennessee and Illinois as possible locations for our next branch, we split the difference and decided on the Hoosier state as the best location for GT.</div><div><br></div></div>
</div></div><div data-element-id="elm_p4RwbHtf5UIab-02vyQRnA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_p4RwbHtf5UIab-02vyQRnA"] .zpimage-container figure img { width: 800px ; height: 560.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_p4RwbHtf5UIab-02vyQRnA"] .zpimage-container figure img { width:500px ; height:350.00px ; } } @media (max-width: 767px) { [data-element-id="elm_p4RwbHtf5UIab-02vyQRnA"] .zpimage-container figure img { width:500px ; height:350.00px ; } } [data-element-id="elm_p4RwbHtf5UIab-02vyQRnA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-large zpimage-tablet-fallback-large zpimage-mobile-fallback-large hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Map%20new.jpg" width="500" height="350.00" loading="lazy" size="large" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_UFxhvNudfQ40ZCutwruA4w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_UFxhvNudfQ40ZCutwruA4w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Indiana is a state with rich history, diverse culture and a thriving economy which promises to be great for GT. It’s business-friendly environment with lower operating costs, the fact that it is a central location within the United States, and the strong local talent pool in technology and customer service industries were some of the many reasons why we were swayed.</div><div><br></div><div>In addition, Indiana’s lower cost of living and business-friendly environment are benefits we eagerly anticipate experiencing in the future.</div><div><br></div><div>Opening a branch in Indiana does not mean we will be exclusively operating there or serving clients within the state. As mentioned before, it’s a central location, allowing us to serve clients within the Midwest.</div><div><br></div><div style="color:inherit;"><div>“We believe the Midwest region in US is a high growth area for business and we provide secure collaboration solutions to business.”- Bradley Geldenhuys (Chairman)</div><div><br></div><div>The world has changed so much since covid and it’s clear to see, the remote working model is a new way of life. Even so, we do believe in the importance of face to face contact, in meeting, greeting and understanding clients. We look forward to doing so in our new branch in the Hoosier state!</div><div><br></div></div></div></div>
</div><div data-element-id="elm_5Dv9fAAIMRhr1q9fAKymzQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_5Dv9fAAIMRhr1q9fAKymzQ"] .zpimage-container figure img { width: 800px ; height: 600.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_5Dv9fAAIMRhr1q9fAKymzQ"] .zpimage-container figure img { width:500px ; height:375.00px ; } } @media (max-width: 767px) { [data-element-id="elm_5Dv9fAAIMRhr1q9fAKymzQ"] .zpimage-container figure img { width:500px ; height:375.00px ; } } [data-element-id="elm_5Dv9fAAIMRhr1q9fAKymzQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-large zpimage-tablet-fallback-large zpimage-mobile-fallback-large hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/MicrosoftTeams-image%20-4-.png" width="500" height="375.00" loading="lazy" size="large" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 31 Mar 2023 07:33:18 +0000</pubDate></item><item><title><![CDATA[To leave or not to leave.... what are the alternatives? ]]></title><link>https://www.gtconsult.com/blogs/post/to-leave-or-not-to-leave....-what-are-the-alternatives</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.comhttps://images.unsplash.com/photo-1522033601-8c44cd8cb261?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MXw0NTc5N3wwfDF8c2VhcmNofDV8fGVub3VnaHxlbnwwfHx8&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080"/>Whatsapp caused the first controversy of 2021. What would a fragmented messaging industry look like? are you prepared to chat to all of your current Whatsapp contacts across multiple platforms? What are your options come February 8?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_dt5BF_VCSm-SRWf_gcbbew" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_hhbkLy5DSTOeMSLwSbfYfw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_h_2hNFsYRg2a3R5Vzafe5Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_fxXjK8IYS2aQN0CTzLrHzA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">Whatsapp has caused the first controversy of 2021. What alternatives do you have come February 8?</h2></div>
<div data-element-id="elm_goW3nDIjRdCaaHokzTAXCw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><img src="https://images.unsplash.com/photo-1599382103240-5f2a57137d28?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=MXw0NTc5N3wwfDF8c2VhcmNofDJ8fHdoYXRzYXBwfGVufDB8fHw&ixlib=rb-1.2.1&q=80&w=1080"><span><br></span></p><p style="text-align:left;"><span><br></span></p><p style="text-align:left;"><span>The dust has barely settled from the New Years celebrations and we are already into our first drama of 2021. Whatsapp has decided to update its privacy statement which apparently allows it to sell certain information to Facebook. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Predictably, this has left a sour taste in many peoples mouths with a significant number of Whatsapp users exiting stage left. The world is being run by data and we are very protective of our privacy. So, what are the alternatives to Whatsapp and are they any better? Let us unpack this debate. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Go back to the beginning</span></b></p><p style="text-align:left;"><span>To fully appreciate the issue, we need to start at the beginning. I read an interview on Moneyweb where Moneyweb journalist, Dudu Ramela, spoke to Arthur Goldstuck, CEO of World Wide Worx, to unpack the issue. The written transcript of the interview, as well as an audio version, <a href="https://www.moneyweb.co.za/moneyweb-radio/safm-market-update/updated-policy-results-in-mass-exodus-of-whatsapp-users/">can be found here</a>.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: What is it that one needs to know to make an informed decision about whether to stay or to go?</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: Thank you, Dudu. The first thing to know is that, if you do go, it means that you will not be able to keep in contact with most of your connections – family, friends, contacts – using WhatsApp as the main communication channel. If you use email primarily, if you use SMS or voice, or even Facebook Messenger for that matter, you will find that WhatsApp in South Africa is used by more than half the population. So, you have got to consider that before looking at all the other issues.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>There are two main issues that people are concerned about. The one is that people think this means Facebook would have access to the content of the chat – and that is not true. Facebook cannot access the content of any WhatsApp chat because it is encrypted. There are exceptions if you are involved in criminal activity, or [authorities] believe that you are a suspect or a person of interest in a terrorism case. Then they have the right to use various tools and techniques to access those messages. But besides those extreme circumstances, the contents of your messaging are completely secure.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The real issue here is that they are going to allow Facebook and WhatsApp to combine information about usage of the apps and your smartphone. So, if you use WhatsApp, for example, it automatically has access to your entire contacts list. And, in effect, that is what Facebook is telling you to share – from WhatsApp to Facebook – so they can target you more accurately based on how many people you are in touch with, what kinds of communication you have with those people, not what is in it. But the fact that you are involved in video communication, for example, could be used to target advertising at you.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>But, generally speaking, they can access your location data, the speed of your phone, or the battery level of your phone, to tell you are the kind of person who often lets your phone run down, for example, or who your real mobile operator is. All of that kind of information starts adding up to create a profile that allows their advertisers to target you more precisely.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: Is it just WhatsApp, or are there plenty of other applications that actually do this? Dies it really matter.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: If you consider the extent to which you have been giving permission to Google over the years, then you could say that it does not make a difference because, if you use an Android phone, really Google has access to all your phone information and your current behaviour – not the contents, but certainly the activity. And then if you combine that with Google Search, for example, and Gmail and Google Maps and YouTube, suddenly they have a vast picture of who you are, what you search for, and what you buy. That is where you have really given up your privacy. So, it is the same situation that applies now with Facebook and WhatsApp and Instagram, combining all the data on you so they start taking a big picture.&nbsp; So, to avoid that, you have got to go to a completely independent messaging app.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: Facebook has been hacked on a number of occasions. A lot of people are also worried about privacy in terms of security.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: Security of the contents of your messages tends not to be an issue. It is the security of your personal data that becomes an issue. Facebook has not plugged the hole that allowed hackers, for example, to send you a link pretending, for example, that it is a video that includes something about you, or something embarrassing about you. You click on that link and what you really do is give permission to access your account, and that then starts giving access to deeper levels of information about you. Ultimately, they are looking for bank-account information and the ability to access your financial data as well as the actual money.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: What are the alternatives?</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: Of two alternatives on the market at the moment the best known one is Telegram, which was started by Russian developers and in fact is not what you might call a pro-Russian app, because the Russian authorities banned it for two years because they refused to co-operate with them. That is perhaps the most widely used of the more secure apps. It does not share your information with any other application, so it does not allow any advertisers to build up a profile about you. You also have a desktop version of it, for example. So that is a little trick that WhatsApp introduced not too long ago.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The other big one is Signal. Signal was developed by, among others, the person who created WhatsApp, so he understands what it takes to create this kind of application, but also what the issues were. The reason that he left Facebook was because he disagreed with the direction of WhatsApp. And Signal is partly in response to that. So Signal is probably the most secure and the least likely to share your information or make your information available to any other application.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: Who is regulating all of these social media platforms in terms of making sure that users’ data is not abused, if you will.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: Here is the real problem. Regulators have been asleep at the wheel because it is technology and regulators tend to be the establishment’s real old-timers, even running governments around the world. They tend to have the courts behind the times in terms of the significance of these apps and also how widespread their use is. Only now, for example, are American antitrust authorities starting to look at the issue of whether Facebook should be allowed to integrate Instagram into its services. Because Instagram goes way back to 2011, at that stage the transaction was approved because the regulators had no idea of its significance.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The same with WhatsApp in 2014. So, Facebook is now arguing, hey, this is a moot issue because you already gave us approval back then. The difference is back then they had no idea of the extent to which so much information could be aggregated across all of these apps.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: Interesting. It has got a lot of people talking, and we will see what happens come February 8, whether people will leave or stay with WhatsApp.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Greener pastures?</span></b></p><p style="text-align:left;"><span>So where to from here? It does sound a bit dodgy that Facebook does not want to read your messages but wants to access our personal information such as contact lists and geolocations. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>So, what are the alternatives? There are two that seem to be very popular in South Africa, and one that may prove to be popular going forward. A <a href="https://indianexpress.com/article/technology/techook/whatsapp-alternatives-signal-telegram-viber-faq-and-features-7138298/">recent article by the Indian Express</a> discussed these in detail. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Signal</span></b></p><p style="text-align:left;"><span>The article points out that, currently, the best alternative to WhatsApp if one were to consider the security features and the fact that this is run by a non-profit firm.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Security Features. It has end-to-end encryption based on the Signal protocol, built by American cryptographer Moxie Marlinspike, who is also the CEO of Signal. It means no third-party or even Signal can read your messages. The Signal protocol is open source, which is another good thing. Signal does not support third-party backups either, which is actually a good thing. All data remains stored locally on the device, and if you do lose access to the device and try to set up Signal on another phone, your previous chat history is lost;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Cross-Platform. Yes, the private messaging app can be used across platforms from Android, iOS, iPad, Mac, Windows and Linux as well. Signal is quite easy to use. The app shows the name of the contacts that are on Signal, which makes it easy for you to connect;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Free or paid? Ads? Signal is totally free. The app is run by a non-profit. Former WhatsApp co-founder Brian Acton helped found the Signal foundation along with Marlinspike, and has also poured in $50 million to fund the app. It does not sell your data or monetise it and does not have advertisements;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Groups, video, and audio calls. Yes, it supports Group features with a maximum of 150 members. It has recently added Group video calls. The app also supports regular video and audio calls, which are also end-to-end encrypted;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Disappearing Messages. Yes, you can turn on disappearing messages for each chat, which is great. The time can be set by you ranging from five seconds to one week;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Screen Lock, Other features. Yes, there is a screen lock feature. You can also set a PIN to the Signal account to keep your account secure. There is also an incognito keyboard option, which basically does not allow your keyboard to save what you are typing. Other features include fingerprint lock, read Receipts, location sharing, relay calls, archive chats, and more. There is also a feature called Message Requests, which gives you the option to block, delete, or accept messages from an unknown person. Signal lets you react to any message with emojis. You also get the option to not allow a user to take chat screenshots. In order to add anyone in a group, the individual will be required to accept the group invitation, unlike WhatsApp. The storage management of the app is really good and quite similar to WhatsApp. You can clear messages, remove videos or images, and check different files in the storage management tool;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Data collected. The key priority of Signal is user privacy, which is why the app does not collect any user data, as per the privacy labels provided on the App Store. The app only stores your phone number or contact information.&nbsp; When it comes to data collection, this is one of the most minimal apps out there. You can learn more about the Signal app here.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Telegram</span></b></p><p style="text-align:left;"><span>The Indian Express article adds that Telegram is another popular alternative Whatsapp and you will likely find a lot of your friends there. A user will not really find it difficult to switch to this app as it is simple to use and has most of the WhatsApp users. In fact, some of the Telegram features are not present in WhatsApp.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Security features. Telegram is encrypted, and it is open source, though in the past issues have been raised about its encryption. While normal chats are not end-to-end encrypted, as they are on Signal and WhatsApp, if you start a secret chat on Telegram, it is secured and does not get saved. You can also set a timer to destruct these secret chat messages. To protect the data that is not covered by end-to-end encryption, the company uses a distributed infrastructure. Regarding the issue over end-to-end encryption, Telegram CEO Pavel Durov wrote in a blog, “We rely on our own distributed cross-jurisdictional encrypted cloud storage which we believe is much more protected,” compared to say Apple or Google;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Cross-platform. Yes, it is a cross-platform app, which is available on Android, iOS, Mac, Windows. Given it relies on its own cloud backup, Telegram ensures that when you set up the app on a different device, the entire chat history is retained;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Free or paid? Ads? Telegram is free. It is an ad-free service for now. But Telegram recently announced its monetisation plans as the company says the project of this “size needs at least a few hundred million dollars per year to keep going.” The service also confirmed that the advertisement interface will be user-friendly, and it will respect user’s privacy, which means no data will be taken. As per Telegram, it will soon launch premium features for business or power users. The current features will remain free for all the Telegram users, but the new ones might fall in the premium plan. The company will also add ads in massive public channels. Note that one-on-one and private group chats will not have ads;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Groups, video, and audio calls. Telegram is really popular for groups and allows more than 200,000 users in a group. It also supports audio and video calls as well. Interestingly all video calls are end-to-end encrypted;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Disappearing Messages. Disappearing messages are part of the Secret Chat feature and you can set a timer for messages. The time range offered is one second to one week;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Screen Lock, Other Features. The best part about Telegram is it is a cloud service, which is why you do not need to worry about backing up chats to other servers to restore them on a new device. With Telegram, you can access your data from any of your devices as the data is synchronised across all your registered devices through cloud-based service. The good part about Telegram is you can send up to 1.5GB of files, create channels, add up to 2 lakh users in a group, forward files without downloading them, schedule messages, archive chats, and more. Telegram allows users to find anyone by username or phone number. Further users can edit messages as well. Telegram even displays the name of the original source from where you have forwarded a message and once you tap on it, you will be redirected to that group or channel. Telegram supports Picture-in-Picture mode, which means that you can video call while using other apps like Instagram. On Telegram, a group admin can set different permissions for every user. Telegram offers really cool and fun animated stickers, which you will not find on any other messaging app. In order to create an account, you just need to provide your mobile number and some basic information;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Data collected. The data collected by Telegram includes name, phone number, contacts, and user ID, according to the privacy label on the Apple App Store.</span></p><p style="text-align:left;"><br></p><p style="text-align:left;"><b><span>Viber</span></b></p><p style="text-align:left;"><span>Viber is the wild card in the South African market as it has not received massive amount of airtime in terms of an attractive alternative to Whatsapp. However, the Indian Express article points out that it may be more attractive than we think. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Security Features. This is yet another privacy messenger app, which supports end-to-end encryption. All types of messages, photos, videos, voice and video calls and group chats are encrypted. The company says that everyone will have to make sure that they are using the latest version of Viber to get maximum protection. Similar to WhatsApp, all your chats can be backed up to Google Drive, from where you can restore your chats. Viber says that once you upload your chats to Google, it will not be responsible for your data protection and privacy will depend on Google’s policy;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Cross-Platform. Yes, Viber can be used across platforms from Android, iOS, and Windows as well;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Free or paid? Ads? Like all the other apps, Viber is also free. However, you will witness a few ads in the popular messaging app. The company says, “Showing you these tailored and relevant offers help us keep the app free for you to use.” “Since we do not have access to your chats, neither advertising providers nor brands can access your chats. The content of your chats stays in your chats always and never will be used for showing your relevant ads,” Viber said in a blog post;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Groups, video, and audio calls. Yes, it supports Group features with up to 250 members. One can only add members by sending an invitation to a Viber user. This feature works similar to Signal. The app also supports regular video and audio calls that are also end-to-end encrypted;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Disappearing Messages. Similar to Telegram, you get a secret chat mode here too. You can set the timer, and screenshot/forwarding feature is disabled. The time can be set by you ranging from one second to one week;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Screen Lock, Other features. The screen lock feature is available, but not for the mobile version. You can send stickers and GIFs, delete, or edit messages, share location, voice messages, and share files. You can create your own GIF, search, and send YouTube videos in the app itself and do a lot of other things. However, the privacy features that Signal offers are not present in both Telegram and Viber;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>What data does Viber collect? Viber collects location and device ID identifiers. It also collects device ID identifiers. It collects phone numbers, user ID, product interaction, purchase history, other contact information such as email ID, name, and contacts.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>In the end, privacy matters</span></b></p><p style="text-align:left;"><span>Privacy does matter. We want to be able to use these social media platforms confident that we can do so without any concerns about where Big Brother is watching. Privacy does matter. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>There are a few interesting questions that need to be asked at this juncture. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The first is, can we live without Facebook and other social media platforms in the modern age? While there are a lot of people in the world without a social media presence at all, there is a reason why Facebook has so many users. If Facebook were a country, it would be the third most populous country in the world. Facebook is mostly used to communicate with people in far flung corners of the world, to provide people with a platform to publicise their lives (vomit), and for people to consume news. It is also increasingly being used for people to do business and to connect with small businesses. If this is the case, why does Facebook have such an obsession with a free user model. Let us answer this. Facebooks current user base is 2,7 billion users. If Facebook charged its users $0.50 a year, it would generate an annual income of close to $1,3 billion. This is significantly less than what it made from advertising revenue in 2019, which was $69 billion. To get close to the last benchmark, Facebook would either have to reach 7 billion users, which is impossible considering that the world population is 8 billion (as of 2020), or it would have to charge its 2,7 billion users about $25/year. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Therefore, the advertising model is significantly more profitable. So how long will Facebook get away with this. In order to get more advertising revenue, advertising needs to be more relevant. In order for it to be more relevant, it needs to be targeted. In order for it to be targeted, it needs data. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Facebook could just ask people about what their expectations are when it comes to advertising. But would they get a genuine answer? No. They only way to guarantee proper data is to use the methods discussed earlier in the blog. So, when will Facebook finally stop this? When the US will finally catches up with the rest of the world and entrenches the right of privacy as a Constitutional Right thereby forcing Facebook to take data privacy seriously. The UK led this with the GDPR, and many countries followed in its wake. By entrenching this right into the constitution, you are guaranteeing that companies cannot take advantage of the public’s right to privacy and it is punishable by law. Companies who do not comply with the GDPR face massive fines and a restraint of trade that is debilitating. A <a href="https://www.theverge.com/2020/12/15/22176008/twitter-gdpr-fine-protected-tweets-ireland-data-protection-commission">recent report</a> showed that Ireland’s Data Protection Commission (DPC) has fined Twitter €450 000 (around $546 000) over a data breach it disclosed back in January 2019, the regulator announced today. The security flaw exposed some supposedly private tweets from the service’s Android users for over four years. Twitter was found to have violated the EU’s General Data Protection Regulation (GDPR) because it failed to notify the regulator within 72 hours of discovering the breach, The Wall Street Journal reports.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The fine is notable because it is the first time a US tech giant has been hit with a GDPR fine in a cross-border case, meaning one in which the Irish regulator consulted its EU counterparts as part of the decision. The investigation was headed by Ireland’s DPC because Ireland is where Twitter’s international headquarters are based.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>The major problem</span></b></p><p style="text-align:left;"><span>There are a few problems which sees Facebook, and Whatsapp, sitting in the pound seats. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The first is that Whatsapp are technically not doing anything wrong. Whatsapp is owned by Facebook and until the US has privacy laws which governs what companies can do with private data, companies will do what they like because they are not breaking any laws. Further, Whatsapp is telling you that this is happening and that you have to agree to these new updates (opt in), failure to do so will see you deleted from Whatsapp (forcibly opted out). This is taking compliance to a new level. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The second problem is that almost half of the world’s population uses Whatsapp. Teleporting all of your contacts to a single platform is going to be a mission. The strength of Whatsapp – and they know this – is that the public has proven that Whatsapp is the best messaging software in the market, and until another platform can make same claim, the userbase will be fragmented in terms of multiplatform as opposed to the current single platform we see now. People also do not like having to communicate with half of their contacts on platform and half on another, so we will probably see a lot of people accepting the new terms come February 8. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>What is the fuss about? </span></b></p><p style="text-align:left;"><span>What is Facebook going to try and do with this information? Sell you stuff? Put more adverts on your timeline for stuff that you never told Facebook you were looking for? I have been doing some research for my wife on my birthday present for this year and guess what, Facebook placed adverts for those items on my timeline. So, Facebook does not need Whatsapp to spy on people. People would also like to think that their data is not being used in advertising. The spoiler alert here is that Facebook and Google are using your data for targeted ads. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>People are also waiting in anticipation for smart devices that help you live your life. Run out of milk, your fridge will send you a message about this and will inform you about all of the specials that grocery stores are having regarding milk. Will these devices not be using your data for targeted advertising purposes? Will it be ok for these advertisements to be targeted but others not? MMMMM…</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="color:inherit;"></span></p><p style="text-align:left;"><span>Data is running the world. It is what is making technology smarter, more convenient and life changing. Yes, companies will be chomping at the bit to get hold of this kind of data, and that may not be a bad thing. Would you rather see 100 worthless advertisements on your Facebook timeline of items that you do not actually want, or would you rather see 10 advertisements about things that you want and will make a difference in your life? And if you have such an issue with how Facebook uses your data, delete Facebook. Whatsapp is just doing what its owner is telling it to do.&nbsp;</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 12 Jan 2021 11:11:23 +0000</pubDate></item><item><title><![CDATA[Optimism is the key to 2021]]></title><link>https://www.gtconsult.com/blogs/post/optimism-is-the-key-to-2021</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.comhttps://images.unsplash.com/photo-1581090464777-f3220bbe1b8b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MXw0NTc5N3wwfDF8c2VhcmNofDR8fHRlY2hub2xvZ3l8ZW58MHx8fA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080"/>While there is a lot of optimism about 2021, managing expectations and looking towards specific areas of innovation will be the key to surviving the year.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_LhRSfD07Rni45DnymQ-3qQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Wi-c5j1YSBuOq8cfn-7p0A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_7V7SUVggTl-r7iV_sr0TEQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_l9rHhhI1Qc-MEP7fR8DbWw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">This year may not be as challenging as we think!</h2></div>
<div data-element-id="elm_PumakUXlSDCYo7-EhxS_Fg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p><img src="https://images.unsplash.com/photo-1485827404703-89b55fcc595e?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=MXw0NTc5N3wwfDF8c2VhcmNofDExfHx0ZWNobm9sb2d5fGVufDB8fHw&ixlib=rb-1.2.1&q=80&w=1080"></p><p><br></p><p style="text-align:left;"><span>Welcome back from the Festive Season break. GTconsult would like to take this opportunity to wish all of its employees, clients, and business partners all the best for 2021. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>I have no doubt in my mind that there not one single person who can comfortably say that Covid-19 <i>did not</i> impact their lives in some way or another. From remote work to self isolation and the loss of many family members and loved ones, 2020 is a year that most people will want to forget. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>There are a lot of people who are very optimistic about 2021. While optimism is goo, there is a fine line between being optimistic and unrealistically so. Most if the world is dealing with a second wave of Covid-19 infections, and until a viable vaccine is produced, the first half of 2021 may just be the third episode of 2020. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Fortunately, tech is changing the world and is making it easier to do your job. With the South African governments plans to increase access to spectrum, we are positioning ourselves as a country that could find itself at the epicentre of the explosion of the Gig Economy in Africa. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Tech will obviously play an important part in this and I read a few interesting articles about the tech that will shape the world in 2021. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>A massive step</span></b></p><p style="text-align:left;"><span>We will start in India which has long been a country that has been at the forefront of digital innovation. The Indian Express <a href="https://indianexpress.com/article/explained/covid-19-pandemic-technology-2021-7128180/">points out that</a> some of the tech that will shape the future will be a massive step for mankind. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article points out that We will be pushing the envelope in optimism if we expect to be back in office soon. Even with a vaccine, work from home has got acceptance across the world and businesses have not really seen a drop in productivity. So if last year #WFH was an act of desperation, in the new year you will see more technologies that act as enablers for remote employment at scale. We already have a host of companies that help collaboration among colleagues in real time, but we could see startups emerge with out-of-the-box ideas on creating virtual offices that take away the requirement for being in a physical space.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>There is already lot of talk about extended reality, or XR, being extended to fill the gaps in our work environment. XR is a mix of augmented reality (AR), virtual reality (VR) and mixed reality (MR) that combine the realms of the real and virtual. In a few months, you could be back sitting next to your colleagues in office, though they are spread all over the country, thanks to a 5G-powered XR headset you are wearing to work from home. Or explaining a new project to customers in a virtual boardroom as they walk around scaled-down models, moving them with virtual swipes. Companies like Qualcomm are already close to this rather confusing reality, which is already used to train people before they get to work on high-value assets.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that then a lot of bells and whistles that are impacting the very experience of work from home could get polished. For instance, laptop makers might finally start making a Full HD camera a standard feature because it has suddenly become the most important feature in the device. You could also see laptops with wireless connectivity become more common as these try to unfetter from Wi-Fi and offer a connectivity backup to those working remotely. This is where 5G could become an important part of enterprises in the coming year.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Better homes</span></b></p><p style="text-align:left;"><span>The article points out that as people the world over spend more time at home, there is a huge opportunity to offer them indoors what they are missing outside. This is why you could see a boost in how home entertainment technologies improve in the coming months. Television screens could become larger, offering immersive experiences and theatre-quality sound. We have already seen a bit of this with projectors that can create cinematic sound. This push will also come with increased affordability of better technologies. While this would mean curtains on many cinemas, new streaming services will try and cater to all kinds of content demands to cash in on the urge to be entertained.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>A lot of the smart home technology so far has been worked around scenarios where the residents would want to control gadgets from their places of work. Now with all these users stuck inside the homes, smart home software will have to improvise and improve the experiences of people who have nowhere to go, keeping them entertained, informed and healthy.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Also, expect gaming to enter our homes like never before. And no, it will not be limited to the younger ones. The segment is already in the midst of a boom thanks to the pandemic and now there will be new consoles and services that make gaming the vent for all your indoor frustrations, irrespective of age.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Health for all</span></b></p><p style="text-align:left;"><span>The article points out that your doctor is now more accessible than before, often just a tap away on an app. But these virtual consultations hit a hurdle as soon as there is a need to look at data. While smart watches and other gadgets now offer more data on different aspects of the user’s health and wellness, the quantified self is going to get more attention now. In early 2020, for instance, the Consumer Electronics Show had a lot on show around sleep technology. These products are now becoming available to people, tracking their vitals as they sleep and alerting them of anomalies as they wake up.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Expect more wearables and smart gadgets near your body keeping a tab in not just the vitals, but also alerting you of what could be the early symptom on an underlying condition. There will also be a lot more assistance in the wellness space, especially with stress management.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Boutique tech</span></b></p><p style="text-align:left;"><span>The article adds that, as our dependence on technologies increases, at least those who can afford it will start pulling out of the mainstream to subscription-based services that are niche, but offer a better quality and experience because of this. Companies are already working on products that offer a different experience from what the Internet offers for free. So you will see companies like Neeva that offer an ad-free search service and more publishers and production houses offer premium content behind a paywall.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The movement towards niches will also be a reaction to big tech, which is slowly losing user trust. While governments try to regulate how big and powerful these companies can be, the lack of trust is already moving users to scaled down environments where they are more confident of not being exploited as just a data binary.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Intelligent data</span></b></p><p style="text-align:left;"><span>The article points out that, while we have been hearing about artificial intelligence for decades, the pandemic has presented these models with use cases at unprecedented scale. As countries try to figure out how to vaccinate sizeable chunks of their populations, intelligent systems like IBM’s Watson will come into play in helping figure out the rollout of the vaccines. Since we are literally talking about everyone in the world, these are not figures that are easily manageable without help of AI-driven models. And it is not just about the vaccines: AI is already being used to alert about new Covid-18 hotspots based on early trends that are plotted against patterns seen elsewhere. Also, when there will be the question of how to tackle the surge in information demand from people as vaccinations starts, here too it could be computers that answer queries because of the sheer scale.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>A new set of gadgets</span></b></p><p style="text-align:left;"><span>the Indian Express article ends off by predicting what may change when it comes to gadgets. 2020 has been a weird year of makers of smartphones and other technologies. After a few weeks when sales dried up, most experienced a surge because of the pent-up demand. There was also the new opportunity created by online education. At the same time, a lot of the product thinking went out the window at least for a couple of years as it went down in the priority list.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>In 2021, expect smartphones and all other devices to pack more computing power because that will be what they need to focus on, more than cameras and battery life — which are not such big pain points if you are not stepping out. With Apple entering the silicon space with its M1 processor, you will see the personal computing segment undergo some revolutionary changes with rivals trying their best to catch on the processing power and battery life this new entrant can offer. So by end of the year, expect more laptops to offer all-day battery life.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>You will see folding, rolling, swivelling smartphones in the new year too, but they will stay well within the fringes and the consumers will be more bothered about the devices that will work long hours without tiring, offering good screen clarity and front cameras for video calls. There will also be a spate of affordable computing devices that try and offer a viable alternative to the budget smartphone that is now being used for online education in many households. Clearly the focus will be on the functional and not the gimmicky.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>An <a href="https://www.livemint.com/">article on livemint.com</a> has pointed to the fact that the Covid-19 pandemic has inspired tech innovation. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article pointed out that one key area, better webcams for our constant video calling, was significant. Samsung has already announced that its forthcoming Galaxy smartphone, expected in early 2021, will improve video recording and calling. We anticipate laptop makers will do the same and finally ditch their crappy, low-resolution webcams.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Portable versions of UV sanitizers for cleaning your phones and gadgets are on the way to keep in your car or your pocket. Another thing we may eventually never leave home without? High-tech masks. Expect a range of built-in features: Bluetooth and microphones (see Maskfone), a fan-powered wearable air purifier (see LG PuriCare), a mask with a UV LED (see the UV Mask). Look for air-quality sensors, contact-tracing assistance and more.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Laptops Arm Up</span></b></p><p style="text-align:left;"><span>The article pointed out that, suddenly, laptops aren’t the most boring gadget in the world. Our reliance on them for at-home work and school spurred demand the category hadn’t seen in years. (“Children, let me tell you about the Great Chromebook Shortage of 2020.&quot;) Then, in November, Apple released a MacBook Air and MacBook Pro that ditched Intel inside for Apple’s own M1 chips. The result? Machines that have never been so quiet and cool, and lasted so long on one charge.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The move from chips based on Intel’s x86 architecture to ones based on lower-powered Arm technology, like the ones inside phones, is setting the entire computing industry on a new course. Lenovo, Acer and Microsoft have begun releasing Windows or Chrome OS laptops with chips from Qualcomm, whose processors power the most popular Android phones. This will only accelerate in the coming year, with nearly every major Windows PC maker working with Qualcomm on laptops and some models even gaining 5G, said Qualcomm President Cristiano Amon.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article added that Apple, which plans to transition its entire Mac lineup to its own processors by 2022, is also expected to release a long-anticipated new iMac, among other things. And it won’t come as a surprise when more tech giants, including Amazon and Microsoft, embrace their own custom chips in everything from laptops to servers to wearables.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Reality: Assisted, Not Augmented</span></b></p><p style="text-align:left;"><span>Remember the ambitious Google Glass concept. The world was either so excited for it that they were prepared to invest heavily in a pair, or the world was bemoaning how tech was becoming massively intrusive. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ultimately, the Google Glass project failed, but that didn’t mean the end for artificial intelligence (AI). The Live Mint article rightly points out that AI will only get better over the years. When will Apple release a pair of smart glasses? Probably not 2021. And while Google made a big step in this category this summer by acquiring North, a pioneer in projection glasses, it canceled the second version of North’s glasses as it plots its future. It’s actually Facebook that declared it will launch smart glasses in 2021—and they’ll be Ray Bans.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Facebook Chief Executive Mark Zuckerbergsaid in September these glasses will be “the next step on the road to augmented reality.&quot; They won’t feature virtual objects that appear to interact with the real world. AR headsets like Microsoft’s HoloLens might deliver an immersive experience, but they’re still expensive and cumbersome.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that <i>assisted reality</i> glasses—which project text, images and even video feeds into a person’s field of view—are of more value now, says Brian Ballard, CEO of remote-expertise company Upskill. Businesses have found utility in remote video conferencing that hovers in workers’ field of view, or turn-by-turn directions they don’t have to look down to follow.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>E-commerce ≠ Amazon</span></b></p><p style="text-align:left;"><span>The article pointed out that the pandemic packed 10 years of consumer e-commerce adoption into a single quarter, and forced every company that wasn’t Amazon—especially those with large retail footprints—to scramble to offer consumers new and better ways to shop from home.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Target saw an explosion in curbside pickup from online orders, while warehouse retailer Costco reported unprecedented growth in e-commerce. Walmart launched a Prime-like membership program called Walmart+, and rapidly added features to keep up the competition. (Walmart recently eliminated order minimums and shipping fees on Walmart.com orders, and provides no-fee delivery on grocery carts totaling $35 or more.) Shopify, which powers payments for many small businesses online, expanded its own network of fulfillment centers so those businesses could get goods to customers more quickly and efficiently, without turning to Amazon.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article added that, now that fast, free shipping is table stakes and retailers recognize they won’t see the foot traffic they counted on pre-pandemic, consumers finally get an online version of an old retail staple: comparison shopping. In 2021, Amazon’s value proposition—that if it isn’t always the least expensive way to shop, it’s at least the most convenient—will be tested. Meanwhile, its market power—along with Google’s, Facebook’s and Apple’s—will continue to be the focus of regulatory scrutiny.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Return of the Trust Fall</span></b></p><p style="text-align:left;"><span>Remember doing these exercises at work team building outings. You would spend a significant amount of time praying that you didn’t have to do this exercise with the creepy man/woman four desks down from you. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The Live Mint article points out that while remote work has many advantages, building trust between employees isn’t one of them. Online, there is no water cooler, no nearby coffee shop for informal brainstorms, no place to grab a drink after work. But companies whose employees worked remotely long before the pandemic already had a solution: the off-site retreat.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Buffer, a fully remote company, gets its entire, globe-spanning team together at least once a year. Dozens of other companies whose employees work mostly or entirely at home do the same thing, which has led to a cottage industry of firms that will plan these retreats for you.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that one reason companies have embraced remote work is that it makes employees happier, but another is that it saves companies money on office space. In 2021, expect to see many of the millions of employees who have permanently shifted to remote or hybrid work piling into party buses, doing group yoga and seeking inner peace in the presence of their bosses—for far less than the cost of the rent on the offices they left behind.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>The platform contributor</span></b></p><p style="text-align:left;"><span>We have given significant focus to the gadgets what with shape 2021, and the innovation that certain companies are planning, but we cannot forget the role that technology based platforms played in 2020 and the <a href="https://www.thedrum.com/opinion/2020/12/21/the-four-technology-trends-you-need-know-about-2021-and-one-miss">influence that they will have in 2021</a>. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Blockchain</span></b></p><p style="text-align:left;"><span>The article points out that it has taken a long time for blockchain to shift centre stage, but as people increasingly trust algorithms, which it’s based on, its time has come. Decentralised finance will continue to grow over the next few years because of the increased demand for online financial products, but it will need to continually address the balance between decentralisation, security and scalability.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Increasingly, government bodies are leveraging blockchain for their activities, moving from incredulity to embracing the technology. With this, we’re going to see regulation surrounding blockchain become ever more pronounced. Our client Block.one reported this year that Google Cloud is taking steps to become a network block producer, a sign that the world’s largest companies are committed to ensuring that information on public blockchains is secure. In five years time, using blockchain could feel about as edgy as banking with HSBC.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Customer learning experience</span></b></p><p style="text-align:left;"><span>The article adds that consumer sales have seen major disruptions in 2020 due to Covid-19 and new restrictions the pandemic has brought to in-person interactions. Businesses have been pushed to accelerate adoption of digital solutions as replacements for traditional aspects of the sales cycle. Attracting and educating customers on the benefits of specific products and features has required a digital-first approach, with e-commerce solutions integrating video, webchat and even augmented reality. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>For complex products that require training, including consumer electronics, automotives and software, companies are investing in Learning Management Systems - or tailored equivalents designed to meet the goals of their specific learning experience- to provide customers with instructive content. These LMS solutions allow businesses to create custom branded courseware, training programs, documentation and video guides to deliver complete digital learning experiences. The article adds that, with big data and analytics, companies can implement in-depth tracking of customers on their learning journeys to rapidly gain insights and improve their offerings.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>As restrictions on in-person shopping and in-person learning begin to relax in the post-pandemic future, digital learning experiences for customers will continue to grow in popularity, with new opportunities to enhance e-commerce and post-purchase experiences.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Cloud-based tech</span></b></p><p style="text-align:left;"><span>The article points out that the world shifted irreversibly in 2020 as so many of us migrated from our old workspaces to predominantly work from home. Beyonders scattered far and wide; I now head up technology from our Lisbon hub. That, of, course, is only possible with greater use of cloud-based technology, including workplace applications.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>With the rise in ecommerce we’re seeing cloud-based platforms pushed and we’ll see their full potential through 2021 and beyond. Cloud native technology will continue to power digital transformation: by the end of 2021 60 per cent of companies will leverage containers on public cloud platforms and 25 per cent of developers will leverage serverless, according to predictions from ForresterNow Predictions 2021: Cloud Computing report.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that technology design is evolving in tandem and we’re building modular, composable architectures that can shift and transform in an agile way, not dissimilar to how we build multi platform, multi stack software. As Google Cloud Partners, we design our composable architectures with plenty of flexibility, but primarily with people in mind.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Cautious optimism</span></b></p><p style="text-align:left;"><span>We mentioned at the beginning of the blog post that most people will need to manage their expectations of 2021. And this is not a bad thing as it is likely going to be a challenging year. However, there are <a href="https://www.geekwire.com/2021/2021-predictions-leaders-tech-life-sciences-investing-government-look-year-ahead/">some global tech leaders</a> who feel that 2021 will be a good year for tech innovation. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Magdalena Balazinska, professor and director of the Paul G. Allen School of Computer Science &amp; Engineering at the University of Washington</span></b></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><i><span>How will this year’s events — the pandemic, social justice movements, economic recession — affect the technology industry in 2021? While the COVID-19 vaccines are rolling out and providing us with hope that 2021 will be a better year than 2020, we are not out of the woods yet and we should plan for 2021 being fundamentally a highly disrupted year.</span></i></p><p style="text-align:left;"><i><span>&nbsp;</span></i></p><p style="text-align:left;"><i><span>That said, if we consider 2021 and perhaps a little beyond, I would say that:</span></i></p><p style="text-align:left;"><i><span>&nbsp;</span></i></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span></span><i><span>2020 really demonstrated that working from home can be effective in many industries. I expect that the tech industry will be rethinking their long-term policies regarding working from home and hiring remote employees;</span></i></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span></span><i><span>Diversity, equity, and inclusion will remain high priorities for the technology industry, and for academia;</span></i></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span></span><i><span>The tech industry has contributed to polarization through the various social media platforms that we developed. Our next step in 2021 needs to be on developing tools to help bring people together;</span></i></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span></span><i><span>The tech backlash is real. The industry needs to take this challenge seriously — to become a rising tide that lifts all boats, not just the captain’s barge.</span></i></p><p style="text-align:left;"><i><span>Software engineers will increasingly question the technology they are developing and the business models of the companies they are working for. Graduates will consider not just the salary but also the type of product that a company is creating, their DEI statement, and more when they choose their employment.</span></i></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Leslie Alexandre, president and CEO of Life Science Washington</span></b></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><i><span>What will be the most pressing issue facing the tech industry in 2021? Again, speaking from a biotech/life science perspective … we are witnessing breathtaking innovation in new treatments — and even some cures — for horrible diseases and conditions thanks to a new generation of platform technologies, such as gene editing and other cell therapies. These treatments are improving the quality of life for thousands of Americans every day, but come at a very high price tag, commensurate with the costs of their development.</span></i></p><p style="text-align:left;"><i><span>&nbsp;</span></i></p><p style="text-align:left;"><i><span>As a society, if we want broad access to these life-saving treatments, we must figure out how to pay for them. And as an industry, we must come to the table with sound policy options that facilitate continued investment in innovation and a resolution to drug pricing issues that are becoming barriers to that investment.</span></i></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Peter Lee, CVP of Research and Incubations at Microsoft</span></b></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><i><span>The most overhyped technology of 2021: I guess three of the technologies that are always mentioned on these “most overhyped” lists are blockchain, virtual reality, and self-driving cars. Blockchain and VR are getting a lot of new hype, with blockchain mentioned in areas like vaccine credentials, and VR to make home isolation more fun. But as great as they are, both probably need more time to flip from hype to hot. And self-driving cars, well, while we may actually see some really interesting products hit the market in 2021, there is a lot less driving going on nowadays. We’ll want to revisit all three in 2022…</span></i></p><p style="text-align:left;"><i><span>&nbsp;</span></i></p><p style="text-align:left;"><i><span>Advice to startups and entrepreneurs for 2021: Think of the three phases of a global crisis: Response – Recovery – Resilience. If 2020 was about Response, 2021 will be about Recovery. Your company/investment needs to be relevant to that. But even more important is to think about the technologies you are developing for the next long phase, which is about Resilience for the future.</span></i></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>GTconsults view</span></b></p><p style="text-align:left;"><span>From a GTconsult perspective, we are convinced that Cloud Computing and AI will be big innovators during the year. With this comes the need to increasingly trust technology and see it as innovative and enabling rather than intrusive and overbearing. We applaud Governments view on spectrum and hope that this project can gain significant momentum. This will see new tech startups and entrepreneurs who can not only grow our economy, but provide a future for their families.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>We also hope that technology will improve access to healthcare as well as innovative ways to diagnose and treat diseases. We are seeing how tech is playing a role in the Covid-19 vaccine, but we need to see these advancements take place more rapidly. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="color:inherit;"></span></p><p style="text-align:left;"><span>Finally, technology <i>must</i> play a role in education. We have already seen the beginning of it in remote teaching and many students have adapted well to the new normal that has been placed on them. We now need to advance this. Coding needs to be taught at school and students need to be given the skills to prosper in the Gig Economy. If we can get this right, 2021 will be a good year.&nbsp;</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 03 Jan 2021 08:16:51 +0000</pubDate></item><item><title><![CDATA[Getting the world future fit]]></title><link>https://www.gtconsult.com/blogs/post/Getting-the-world-future-fit</link><description><![CDATA[I’m not the biggest sci-fi fan. I can count the number of times I have seen the Star Wars movies on one hand, and I have never seen any of the Star Tr ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Y8QsbpIjTxiuOJ2eaKsrWA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_b1URdGkVS92Ka1xLzQgVIA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_6Kgr0iQ1RciTfsMawmQCkw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_hEt2tnXFSq-ezsaMHdUOjA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">Tech will play an important role when it comes to future proofing our world.&nbsp;</h2></div>
<div data-element-id="elm_iTD_Hf96Tz6Yy_26c_15vQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iTD_Hf96Tz6Yy_26c_15vQ"].zpelem-text { margin-block-start:5px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><br></p></div>
</div><div data-element-id="elm_TdBldB9zV6dNos_0SY7piw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_TdBldB9zV6dNos_0SY7piw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><img src="https://images.unsplash.com/photo-1496449903678-68ddcb189a24?ixlib=rb-1.2.1&q=80&fm=jpg&crop=entropy&cs=tinysrgb&w=1080&fit=max&ixid=eyJhcHBfaWQiOjQ1Nzk3fQ"><br></p><p><br></p><p>I’m not the biggest sci-fi fan. I can count the number of times I have seen the Star Wars movies on one hand, and I have never seen any of the Star Trek movies or television series. However, I am a fan of the Big Bang Theory and as Dr Sheldon Cooper has pointed out on many occasions, many of the inventions that we see today were predicted on Star Trek decades before they were invented. </p><p>&nbsp;</p><p>Along with Big Data, innovation is what will drive the future development of the Fourth Industrial Revolution and our relationship with technology. There are a number of key growth points that we need to look at which will have a significant impact on the world and the way that technology will enable productivity in the future.</p><p>&nbsp;</p><p><b>Technology in today’s world</b></p><p>I recently <a href="https://www.experian.com/blogs/insights/2019/09/the-future-of-technology-and-innovation/#%3A%7E%3Atext=By%202020%2C%20at%20least%20a%2Cconnected%20devices%20in%20the%20world.&text=At%20the%20rate%20at%20which%2Cto%20modify%20how%20they%20operate.">read an article</a> which pointed out that from the moment you wake up, to the moment you go back to sleep, technology is everywhere. The highly digital life we live and the development of our technological world have become the new normal. According to The International Telecommunication Union (ITU), almost 50% of the world’s population uses the internet, leading to over 3.5 billion daily searches on Google and more than 570 new websites being launched each minute. And even more mind-boggling? Over 90% of the world’s data has been created in just the last couple of years.</p><p>&nbsp;</p><p>The article adds that with data growing faster than ever before, the future of technology is even more interesting than what is happening now. We’re just at the beginning of a revolution that will touch every business and every life on this planet. By 2020, at least a third of all data will pass through the cloud, and within five years, there will be over 50 billion smart connected devices in the world.</p><p>&nbsp;</p><p><b>Keeping pace with digital transformation</b></p><p>At the rate at which data and our ability to analyze it are growing, businesses of all sizes will be forced to modify how they operate. Businesses that digitally transform, will be able to offer customers a seamless and frictionless experience, and as a result, claim a greater share of profit in their sectors. Take, for example, the financial services industry – specifically banking. Whereas most banking used to be done at a local branch, recent reports show that 40% of Americans have not stepped through the door of a bank or credit union within the last six months, largely due to the rise of online and mobile banking.</p><p>&nbsp;</p><p>The article points out that, according to Citi’s 2018 Mobile Banking Study, mobile banking is one of the top three most-used apps by Americans. Similarly, the Federal Reserve reported that more than half of U.S. adults with bank accounts have used a mobile app to access their accounts in the last year, presenting forward-looking banks with an incredible opportunity to increase the number of relationship touchpoints they have with their customers by introducing a wider array of banking products via mobile.</p><p>&nbsp;</p><p><b>Be part of the movement</b></p><p>The article added that rather than viewing digital disruption as worrisome and challenging, embrace the uncertainty and potential that advances in new technologies, data analytics and artificial intelligence will bring. The pressure to innovate amid technological progress poses an opportunity for us all to rethink the work we do and the way we do it.</p><p>&nbsp;</p><p><b>Reframing the future</b></p><p>Most of this is scary for us to comprehend. However, if done correctly, we can reframe the future responsibly. I recently <a href="https://www.governing.com/next/CIOs-How-to-Reframe-the-Future-with-Emerging-Tech.html">read an article</a> where Chief Information Officers (CIOs) weigh in on how to reframe the future with emerging technology. </p><p>&nbsp;</p><p>The lure of the latest breakthrough technology can be strong, but state chief information officers also need to take more practical considerations into account when contemplating new deployments. In a live session on the last day of the NASCIO annual conference, moderator Chris Estes, former CIO of North Carolina, who now works at EY, was joined by Utah CIO Mike Hussey and Pennsylvania CIO John MacMillan to weigh in on a new report from NASCIO and EY, How Will the Power of Emerging Technology Help Reframe your Future?</p><p>&nbsp;</p><p>the article pointed out that, indeed, a more measured approach seems the most prudent for government. “You can’t always do every shiny widget that comes through the front door,” Hussey said. But as has been proven repeatedly during the past several months when CIOs have been focused on digital service delivery during the pandemic, there’s a place for innovation in state government. And in fact, it’s what citizens expect.</p><p>&nbsp;</p><p>To support this point, Estes recalled a comment from Rhode Island CIO Bijay Kumar: “There’s no way government can not do emerging technology when the citizens are so used to using it.”</p><p>&nbsp;</p><p>Critical to the successful use of emerging technologies in government, then, is constructing appropriate guard rails to make sure it is used responsibly in a way that produces value. In short, good governance is paramount.</p><p>&nbsp;</p><p><b>Governance: The Utah and Pennsylvania Approaches</b></p><p>the article added that, in Utah, there are a few groups responsible for evaluating the potential of new technologies and their applicability to state government. An agency review board, Hussey explained, is made up of staff from various departments and business areas. They offer specific organizational perspectives on how a technology might be used to solve business problems for the state. Their work is complemented by an external technology advisory board with representatives from outside of state government. Together, Hussey explained, the two groups serve as an effective vetting mechanism before any investment decisions are made.</p><p>&nbsp;</p><p>Yet another body involved in evaluating emerging tech applications for Utah is its center for excellence for artificial intelligence, established in 2019. At a recent virtual event, Utah Chief Technology Officer Dave Fletcher counted about a dozen major initiatives currently underway from the center.</p><p>&nbsp;</p><p>MacMillan explained that Pennsylvania began looking at best practices around architecture frameworks a couple of years back, eventually arriving at its Commonwealth Innovation Architecture Framework (CIAF). The framework is made up of seven models (in performance, business, data, application, technology, security and digital) to help establish standard governance on how the state approaches the use of emerging technologies. These well-defined parameters keep the state focused on the right things.</p><p>&nbsp;</p><p>the article pointed out that the panelists concurred with an assessment offered by Tennessee CIO Stephanie Dedmon: “Emerging tech needs to add value, solve problems and make things easier.” MacMillan added that the approach in Pennsylvania is to ensure that tech investments fit within the context of existing architecture, and further, that tech must solve a business problem. “IT is not in business for itself,” he said.</p><p>&nbsp;</p><p><b>Most Impactful Emerging Tech</b></p><p>In the annual NASCIO State CIO survey released Tuesday, more than half (61 percent) of respondents said artificial intelligence was their top prediction for the emerging technology that will be the most impactful in the next three to five years. The response isn’t surprising given how the pandemic has pushed governments to quickly move services online, a move often supported by chatbots, machine learning and robotic processes automation (RPA).</p><p>&nbsp;</p><p>The emerging tech survey found that the top place respondents believe AI-powered solutions like these will make the most impact is in citizen-facing digital services, like chatbots that can help residents get their questions answered more quickly than trying to call a government agency. MacMillan said that in Pennsylvania, they’ve experimented with the potential interactions AI can have and the “intents” of citizen questions so they are then pointed in the right direction. This tracks with his notion that you can’t just toss out a new solution and expect it to work perfectly. “Each one of these emerging technologies requires some kind of care and feeding,” MacMillan stressed.</p><p>&nbsp;</p><p>the article added that survey responses that followed automation included low-code app development (33 percent), and the Internet of Things and connected/autonomous vehicles (tied at 2.3 percent). The latter are congruent with what Hussey sees coming down the pipeline, pointing to Utah’s smart corridor project and vehicle-to-infrastructure work. “I know it’s a very small piece right now,” he said, “but certainly that’s where you’ll start to see that take off.”</p><p>&nbsp;</p><p>Utah is also exploring new applications for drones to measure air quality at various altitudes, given the smoke that has moved into their state from the west, and is looking at taking vehicle titles digitally so citizens don’t need to visit a DMV to transfer ownership. “We’re eyeing a potential solution that’s on blockchain,” Hussey said. “There’s a lot of opportunities to get excited about the new technologies,” he added.</p><p>&nbsp;</p><p><b>Barriers to Adoption</b></p><p>Of course, all the opportunities and excitement about solutions like chatbots and connected vehicles don’t necessarily mean there aren’t challenges to putting emerging tech in place for state government. Respondents to the survey ranked budget as the most challenging obstacle to getting emerging tech projects off the ground, which MacMillan agreed with, noting that “every new CIO understands their success relies on the budget director in some form or another.”</p><p>&nbsp;</p><p>the article pointed out that, in Pennsylvania, they have a system of procurement waivers, built upon state code originally written in 1929 that has been updated through the years. The value, he explained, is that a waiver makes sure his IT agency can consider “valid exceptions” when other statutes might prohibit a novel technology.</p><p>&nbsp;</p><p>Hussey said that Utah, on the other hand, has an annual innovation fund that goes toward innovative ideas and allows the state to demonstrate that a technology solution will have appropriate return on investment.</p><p>&nbsp;</p><p>the article added that, in addition to issues around how to fund emerging tech, survey respondents also cited alignment of use cases, legacy IT systems, lack of necessary staff skills and organizational silos as barriers to adoption. And MacMillan sees questions arising around how an increasingly connected life is regulated.</p><p>&nbsp;</p><p>“This kind of technology has to become a national technology,” he said, pointing to work in Pennsylvania around self-driving cars and asking what happens when those cars reach a jurisdictional border. “It can’t just be a unique occurrence within a state. There are lots of problems to solve on the road to autonomous vehicles.”</p><p>&nbsp;</p><p><b>Secret Weapon<br></b>Every industry, from financial service providers to banking to gyms, are tryaing to future proof their business models with artificial intellegence (AI); this adoption will only accelerate in the future. </p><p>&nbsp;</p><p>I recently <a href="https://www.weforum.org/agenda/2020/10/the-secret-to-designing-a-positive-vision-for-ai-imagination/">read an article</a> which pointed out that the secret to designing a positive future with AI is by embracing imagination. </p><p>&nbsp;</p><p>Many physical tasks previously seen as un-automatable can now be performed by machines, from medical diagnoses to legal document drafting. Meanwhile, the need for remote working during the COVID-19 pandemic is converting complex business processes into modular, decontextualized tasks more amenable to automation.</p><p>&nbsp;</p><p>The article points out that such trends are fuelling the growth of automation technologies and will spur large-scale, global changes, including 400 to 800 million lost jobs by 2030, according to McKinsey. Automation technologies may also exacerbate economic and social inequalities within a fractured and dysfunctional society.</p><p>&nbsp;</p><p>Even optimistic economists anticipate a world that promises a high standard of living to all, but leaves few people with any useful role that is valued by others by today’s standards — in essence, life on Earth might feel much like a cruise ship experience, a world in which human beings are merely passengers.</p><p>&nbsp;</p><p>For many, this kind of future would rob life of the very aspects that give it meaning. In order to avoid such outcomes, it is essential that we take steps to ensure an economically sustainable and desirable future for workers today, and for generations to come. To accomplish this, our most essential step is to tap into a quality we often overlook when discussing jobs and the future economy: our imaginations.</p><p>&nbsp;</p><p><b>Seeking true vision</b></p><p>The article adds that we must imagine the positive world we want to live in, the desirable future economy we think we want.</p><p>&nbsp;</p><p>A desirable future economy will have several traits. It's one in which, even after many dramatic economic shifts occur, humans retain valuable and meaningful roles in society. This world would be economically sustainable, allowing humans to flourish while planetary boundaries are respected, and inequalities are minimized.</p><p>&nbsp;</p><p>The article points out that focusing on the positive is key to steering toward a positive destination. Instead of being passive passengers in a collective spaceship erring towards dangerous planets, we can instead actively move in the direction of the outcomes we want, such as full employment and equity.</p><p>&nbsp;</p><p>This is, at its heart, an exercise in vision. To be sure, realizing that vision will require a commitment to idealism, hope, and an openness towards change and uncertainty. But the vision is paramount and will set our future course.</p><p>&nbsp;</p><p><b>Tapping a range of disciplines</b></p><p>The article adds that building such a vision is a collective intelligence exercise that requires many voices from around the world. In taking this step, we can empower participants from various backgrounds and countries to make this vision real and identify the implications of that long-term vision for present-day policy decisions</p><p>&nbsp;</p><p>Such work can seem like a creative writing prompt but was actually a key exercise undertaken by the World Economic Forum’s Global AI Council (GAIC), a multi-stakeholder body that includes leaders from the public and private sectors, civil society and academia. In April 2020, we began pursuing an ambitious initiative called Positive AI Economic Futures, taking as its starting point the hypothesis that AI systems will eventually be able to do the great majority of what we currently call work, including all forms of routine physical and mental labour.</p><p>&nbsp;</p><p>The article points out that knowing science-fiction’s astounding accuracy in predicting both the advantages and challenges technologies can bring, we solicited the creativity of notable authors to give their thoughts along with policy makers and subject-matter experts in economics and AI. In a series of ongoing workshops, this diverse group of individuals discussed existing visions and their implications for present-day policy.</p><p>&nbsp;</p><p>Running in parallel with the workshops, the non-profit XPRIZE Foundation is organizing a short film competition that challenges participants from around the world to showcase their ideas for a future economy, ideas that addressed individual aspirations and fears. This is the part of the overall project where imagination takes its full power.</p><p>&nbsp;</p><p>The article adds that tapping visionaries from the creative, technical and policy realms ensures we tap in the full range of ideas for a new society. A true breadth of ideas is only possible by getting the perspectives from a range of disciplines.</p><p>&nbsp;</p><p><b>Looking ahead</b></p><p>We stand on the cusp of remarkable change. AI and other emerging technologies are positioned to raise global income levels and improve standards of living for billions of people.</p><p>&nbsp;</p><p>The article points out that, at the same time, as noted by various economists, many livelihoods will be severely disrupted. Previous industrial revolutions suggest that over time, labour markets eventually adjust to changes in demand for workers from technological disruptions such as the combustion engine. But there are reasons to believe that the Fourth Industrial Revolution may play out differently.</p><p>&nbsp;</p><p>The article adds that much has been written about painful transitions that could be in our future. In our minds, less attention has been given to crafting and working toward a positive outcome. As we see it, it is much better to plan for the worst by planning and designing for the best.</p><p>&nbsp;</p><p><b>A 5G jump forward</b></p><p>Huawei has emerged as the first real challenger to the dominance that Apple and Samsung have had in the telecommunications industry. The fact that their phones are cheaper and are run by impressively sophisticated tech means that the company is a future industry giant in the making. </p><p>&nbsp;</p><p>Their expansion is hinging on the growth of 5G. The company did encounter a lot of resistance in Australia and New Zealand over its 5G expansion plans. But this is not stopping the development of the tech as Nokia is now also pinning its hopes on the tech. </p><p>&nbsp;</p><p>Like AI, 5G will be a technology of the future, whether we like it or not. I recently <a href="https://tidbits.com/2020/11/11/understanding-5g-and-why-its-the-future-not-present-for-mobile-communications/">read an article</a> which pointed out the future uses of the tech. </p><p>&nbsp;</p><p><b>The Purported Potential Uses of 5G</b></p><p>The article pointed out that the US is the first country in which 5G will rely on a triad of cellular frequencies: existing ones across a range of bands, new allocations up near the bands currently used for 5 GHz Wi-Fi and soon for 6 GHz Wi-Fi, and mmWave starting at 24 GHz. It’s a grand experiment for delivering broad-scale higher-performance in lower bands and super-fast throughput as needed in the much higher bands.</p><p>&nbsp;</p><p>The uses cited for 5G include all things we do now, though carriers actually don’t mention video streaming all that often. Perhaps 4K-quality video streams just aren’t that compelling, especially given that some carriers already downscale video automatically or require a higher-priced subscription to get higher fidelity than 480p, and more expensive plans top out at 1080p.</p><p>&nbsp;</p><p>The article added that carriers are excited about (and investing in) 5G because they anticipate new money-making opportunities, particularly in industries in which low-latency, high-bandwidth, high-coverage wireless enables new products or services, or allows shifting intelligence from edge devices to central processing.</p><p>&nbsp;</p><p>Just as Web apps have benefitted from the massive improvements of speed in JavaScript running in a browser that allows a combination of locally downloaded code and seamless interaction with remote resources, 5G networks will ostensibly enable massively scaled systems that can feed data out in real time to edge points. This includes both relatively low-featured Internet of Things (IoT) devices that will benefit from storing their brains elsewhere—with all the security and privacy issues associated with that—and more sophisticated hardware, like autonomous or driver-assisting vehicles.</p><p>&nbsp;</p><p>The article pointed out that some of the most compelling cases are:</p><p>&nbsp;</p><p>-<span style="font-size:7pt;">&nbsp; </span>Augmented reality: In recent years, Apple has focused significant attention on AR, which can require a lot of constantly updated data that’s processed centrally and streamed to a device, all while responding to movements in the physical environment;</p><p>-<span style="font-size:7pt;">&nbsp; </span>Gaming: Gamers often required wired Ethernet connections in their homes for the best results. 5G will make mobile gaming more responsive;</p><p>-<span style="font-size:7pt;">&nbsp; </span>Rural access: Every generation of cellular technology promises better coverage for rural residents. Every generation often disappoints them, too, because carriers prefer to deploy service where they can more easily make money. However, 5G’s greater efficiency and variety of frequency options, particularly in some new frequency territory around 5 GHz and 6 GHz, should generally improve rural service;</p><p>-<span style="font-size:7pt;">&nbsp; </span>Urban/suburban access: In some cases, carriers and other parties might find it feasible to deliver high-speed urban and suburban residential broadband over 5G. It’s more likely to happen outside the US because in this country there’s sufficient inexpensive wired infrastructure (cable, phone wire, and fiber) in more densely populated areas. I pay $85 per month for unlimited gigabit Internet in Seattle; it’s hard to imagine a wireless provider offering even 100 Mbps at that price for residential-scale video and other use in the US. However, in some developed and developing countries, even relatively populated or dense areas lack wired or fiber-optic infrastructure at the level demanded;</p><p>-<span style="font-size:7pt;">&nbsp; </span>Remote medical procedures: We’ve all become more familiar with telemedicine consultations in the last few months, but with sufficient bandwidth, remote medical procedures are here today. Diagnosis and even robot-assisted surgery can be performed through remote linkages, but setting up a stable, low-latency, high-bandwidth network where a wired, low-latency broadband connection is unavailable, or for facilities that aren’t able to wire Ethernet into existing areas, would open up new possibilities. (That said, would you want a wireless surgeon operating on you? Seems like a hard sell.);</p><p>-<span style="font-size:7pt;">&nbsp; </span>Autonomous cars: A car can’t rely solely on a 5G network for robotic operations while it’s zooming down the highway, but it could overlay its onboard capabilities with information gathered around and ahead of it to deter accidents and improve safety.</p><p>&nbsp;</p><p><span style="color:inherit;"></span></p><p>In short, although 5G is inevitable and may become an important aspect of society’s networking infrastructure, there’s no reason for most people to upgrade to get it right now. It will be interesting to see how all of these technologies develop in the future.&nbsp;</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 17 Nov 2020 11:12:13 +0000</pubDate></item><item><title><![CDATA[Accelerated change in the way we work]]></title><link>https://www.gtconsult.com/blogs/post/Accelerated-change-in-the-way-we-work</link><description><![CDATA[Work, as we know it, is set for major disruption. We can either fight it or we can embrace it.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_rBX6IKTXSYKtzpndGemY8A" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_rE32yKjHRHCPzj09sOzaqA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__3VCw9JrSbaVfLpJ15A5OQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Tivdds0OSsWStgh0cDyvRw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">Work, as we know it, is set for major disruption.&nbsp;</h2></div>
<div data-element-id="elm_aLWeTNFJT7SDTl-tjjMZFA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p><img src="https://images.unsplash.com/photo-1574689049340-bedc8373daa3?ixlib=rb-1.2.1&q=80&fm=jpg&crop=entropy&cs=tinysrgb&w=1080&fit=max&ixid=eyJhcHBfaWQiOjQ1Nzk3fQ"><br></p><p><br></p><p style="text-align:left;">If we go back over the centuries, the biggest impact of the various industrial revolutions that the world has been through is that there has been a significant change in the workplace. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Technology enables productivity but also creates various opportunities that were not present in the past. This has been at the heart of the Fourth Industrial Revolution (4IR) and its impact has only been enhanced by the Covid-19 Pandemic. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Changing landscape</b></p><p style="text-align:left;">If we go back to the industrial revolution, many skeptics were unconvinced that inventions such as the car and the printing press would replace horse drawn carriages and conventional forms of media. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Industrialization saw the mass printing of newspapers and books and the mass production of motor vehicles. This caused unemployment for many who filled these rolls in the past. While technology enables productivity, it also is a catalyst for social change. Many of the jobs that exist today will not exist 20 years from now. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">While there will be significant social change, the role of humans will never totally disappear. While technology is becoming more self-governing, it will not be independent. Humans still need to govern the process. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">So, what does the future of the workplace hold? </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Accelerated change</b></p><p style="text-align:left;">I recently <a href="https://www.businesslive.co.za/fm/features/2020-10-29-the-future-of-work/">read an article</a> which pointed out that the automation and digitization of the workforce has accelerated, partly due to Covid-19, but new jobs are coming and may be more accessible than you think.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that workers around the world are facing &quot;double disruption&quot;: not only is the global workforce automating faster than expected, but the Covid-induced global recession has reversed employment gains, making it even harder for workers, especially those already disadvantaged, to make the transition to new types of jobs.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">This is the core message of the World Economic Forum’s (WEF) 2020 Future of Jobs report, a survey of mostly big, white-collar companies across 26 countries.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Hitting the breaks</b></p><p style="text-align:left;">According to the report, the bad news is that, in contrast with previous years, job creation is slowing while job destruction is accelerating.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">By 2025, the so-called robot revolution is set to disrupt 85-million jobs globally, according to the report. By then the average employer expects to divide tasks roughly equally between humans and machines.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Referencing the report, the article points out that, astonishingly, even half of the lucky ones who retain their jobs will need reskilling. Fortunately, the report finds that 73% of South African firms would look to retrain current staff to meet their changing requirements.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&quot;Of course, it depends on the choices we make today,&quot; notes WEF MD Saadia Zahidi. &quot;It depends on the kinds of investments governments make today and the investments workers make in terms of their own time. And it depends on the choices that business leaders make when it comes to retaining and protecting jobs vs shorter-term decisions that are more focused on quarterly results.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that the report warns that in the absence of support from governments and employers, inequality is likely to worsen because of the double whammy of technology and the pandemic, which has disproportionately affected millions of low-skilled workers.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Key investment</b></p><p style="text-align:left;">The article points out that improving access to online learning is an investment all countries should be making. According to US online learning provider Coursera, there has been a fivefold increase since the start of the pandemic in employers offering online learning to their workers, and a nine fold increase in people accessing it through government programmes, including in developing countries.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">In Costa Rica, for example, the government has worked with employers to identify the skills in demand, partnered with Coursera to build the required online learning programmes, and helped match graduates of these programmes to available jobs.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&quot;No matter what prediction you believe about jobs and skills, what is bound to be true is [a] heightened intensity and frequency of career transitions, especially for those already most vulnerable and marginalised,&quot; says Hamoon Ekhtiari, CEO of FutureFit AI, a Canadian reskilling firm that contributed to the report.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>New roles</b></p><p style="text-align:left;">Refencing the report, the article points out that the good news is that 97-million new roles are expected to emerge over the next five years in existing fields such as the care sector, as well as in newer industries such as those involving big data, artificial intelligence, the green economy, cloud computing and product development.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&quot;We think the future of work is digital, but it’s also human,&quot; said LinkedIn chief economist Karin Kimbrough at the report’s launch. Kimbrough believes the world will increasingly value tasks that involve collaboration, managing and caring. In fact, the pandemic has taught society to revalue in-person, frontline services such as nursing.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Moreover, getting into new digital fields isn’t as difficult as people may think. According to LinkedIn data, about half of all people making career shifts into these new industries come from unrelated fields.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&quot;So, you can come from just about anywhere and manage the transition,&quot; says Kimbrough.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Advanced skills not necessary</b></p><p style="text-align:left;">The article points out that you also don’t need advanced levels of digital literacy to make the jump, which is important for a country such as SA where, according to the report, less than 30% of the population has digital skills.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Coursera’s head of data science, Emily Glassberg Sands, points out that, for those without university degrees, there are still lots of opportunities in administering technology, including, for instance, as Google IT support specialists (who are employed by thousands of firms to help debug Google every day).</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article added that it takes just six to eight months to train online as one, she says, and is a useful stepping-stone to unlocking more formal IT qualifications over time. &quot;It’s difficult and requires support, but it’s less the exception than we think.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Kimbrough says if policymakers could identify the small clusters of skills with an outsized effect on opening more sustainable career paths, it could make a real difference to reducing global unemployment.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">But the window of opportunity for managing this change is closing fast, Zahidi warns. &quot;In the future, we will see the most competitive businesses are the ones that have invested heavily in their human capital — the skills and competencies of their employees.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Enhanced thinking</b></p><p style="text-align:left;">When James Cameron brought us <i>The Terminator</i> in 1984, we thought that giving machines the power of enhanced thinking was a bad idea. It really was not a good portrayal of the benefits of technology. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">However, <a href="https://www.techrepublic.com/article/forrester-ai-and-automation-will-help-organizations-rethink-the-future-of-work/">a recent article</a>, referencing a report by Forrester, points out that its not all bad news though. I read an article which points out that artificial intelligence (AI) and automation will help organizations rethink the future of work.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Automation, not surprisingly, is aimed at the employee experience. In 2021, digital transformation initiatives in more than three-quarters of enterprises will focus on automation, the firm said.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&quot;The 'great lockdown' of 2020 will make the drive for automation in 2021 both inevitable and irreversible,'' according to Forrester's Predictions 2021. &quot;Remote work, new digital muscles, and pandemic constraints will create millions of pragmatic automations in 2021; document extraction, RPA (robotic process automation) from anywhere, drones, and various employee robots will proliferate; and, as expected, the mad dash to automate will bring trouble.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Driving efficiency and elasticity</b></p><p style="text-align:left;">The article points out that, while AI didn't predict the pandemic, it will help businesses rethink the future of work; drive more efficiency, elasticity, and scale in operations; and reimagine customer and employee experiences, Forrester said. AI is driving the growth of automated processes, helping them become smarter. Companies that adopt machine learning, a subset of AI, &quot;will massively multiply their number of AI use cases, including for employee augmentation and automation,'' the firm said.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Forrester expects &quot;hypergrowth in AI, along with the proliferation of artificial data and the beginnings of a Blockchain-based approach to data trust.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">AI adoption grew 15 percentage points in the past year, and maturity is rising as firms move past small, incremental deployments, according to Forrester. &quot;In 2021, the grittiest of companies will push AI to new frontiers, such as holographic meetings for remote work and on-demand personalized manufacturing. They will gamify strategic planning, build simulations in the boardroom, and move into intelligent edge experiences.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that Forrester also believes there are many deterrents to AI success: A lack of trust, poor data quality, data paucity, a lack of imagination, and a dearth of the right power tools to scale.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&quot;But 2021 will see companies tackle these head on, not because they want to or suddenly have the wherewithal to overcome these in this unprecedented year--but because they have to,'' Forrester maintained. &quot;They have to rebuild their businesses not for today or even next year but to prepare to compete in an AI-driven future. 2020 has given leaders the impetus, born out of necessity, and coincidence to embrace AI, with all its blemishes.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Don’t shy away</b></p><p style="text-align:left;">The article points out that Forrester advises firms not to shy away from AI. &quot;Plan to quadruple your investment next year. Build your internal AI team, engage consultancies to implement domain-specific solutions, and upgrade your data, analytics, and machine learning platforms to rethink how you use AI.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Automation is also a top priority now, and thanks to the pandemic, it is aimed at the employee experience, Forrester said. In 2021, digital transformation initiatives in more than three-quarters of enterprises will focus on automation—whether for core records, customer operations, or engagement, the firm said. Advances in AI, changes to work patterns as a result of the pandemic, and a fierce global recession have made this drive for automation inevitable—and irreversible, according to Forrester.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that other predictions Forrester is making in AI and automation in 2021:</p><p style="text-align:left;">- No-code automated machine learning (AutoML) will be used to implement more use cases. AutoML can dramatically accelerate ML model development versus the traditional coding approach. In 2021, lucky laggards will use AutoML to implement 5, 50, or 500 AI use cases faster, leapfrogging their competitors. AutoML lets data scientists configure parameters and run hundreds or even thousands of experiments in one go. With AutoML, Forrester estimates that these teams can implement eight times the number of use cases aimed at operational efficiency or personalized customer experience—and greatly amplify the impact of digital transformation;</p><p style="text-align:left;">- A fifth of enterprises will expand investment in intelligent document extraction. Even before the pandemic, there was strong investment in intelligent document extraction platforms (IDEP) as firms wanted to use it to classify many types of documents. Combining computer vision with advances in machine learning has made platforms more valuable and easier to build and maintain;</p><p style="text-align:left;">- A notable failure will occur as a result of the rush to automation. The pandemic accelerated investment in various forms of business process and IT automation. Two-thirds of enterprise organizations that encountered broken processes during the pandemic were pressured to patch in automation solutions. But rushed and haphazard automation exposes systems and the business to serious risk. This can lead to monumental failures that not only damage a company's reputation and customer trust but also limit broader public trust in automation (specifically AI) as a result of media scrutiny. In 2021, up to 30% of organizations will ramp up their focus on quality by better planning and testing automation before deploying it to production or exposing it to employees;</p><p style="text-align:left;">- Intelligent automation suites will provide a quarter of all RPA solutions. Commoditization, major enterprise software acquisitions, new entrants, specialization, and public market ambitions are resulting in a diverse RPA market. Like machine learning, RPA will become an embedded feature of many platforms by the end of 2021;</p><p style="text-align:left;">- A fifth of enterprises will use commercial drones to automate business operations. Recent rapid growth in the consumer drones industry has sparked momentum in the commercial drone market. While social distancing is a factor in drone usage, two forces will accelerate adoption in 2021. First, governments are crafting better regulations to facilitate drone adoption and commercialization. Second, the rapid evolution of computer vision and 5G will enable real-time drone intelligence over ultra-reliable, low-latency communications; and</p><p style="text-align:left;">- Intelligent automation will advance to support one in four home workers. Three times as many information workers will work from home all or most of the time, while many companies will institute hybrid models. As a result of the pandemic, new forms of automation will support one in four remote workers either directly or indirectly by 2022. Direct support in the form of giving a bot to individual workers to support their daily journey will be rare. But indirect support will blossom, with intelligent automation handling employee benefits, questions, and supporting documents, customer service, and line-of-business tasks that are often invisible to the home worker.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Another <a href="https://www.citrix.com/content/dam/citrix/en_us/documents/analyst-report/work-2035.pdf">report</a>, which was the result of a joint study by Citrix, futurist consultancy Oxford Analytica, and business research specialist Coleman Parkes, &nbsp;revealed the expectations of over 500 C-Suite leaders and 1,000 employees.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The report pointed out that:</p><p style="text-align:left;">- Three-quarters (74 per cent) believe that in fifteen years, artificial intelligence (AI) will significantly speed up the decision-making process and make workers more productive;</p><p style="text-align:left;">- New jobs will be created, including roles such as: Robot / AI Trainer, Virtual Reality Manager, and Advanced Data Scientist;</p><p style="text-align:left;">- Work will be more flexible and fuelled by technology. 75% of the study’s respondents believe that tech platforms will provide instant access to highly specialized, on-demand talent;</p><p style="text-align:left;">- 57% of respondents believe AI has the potential to make the majority of business decisions by 2035 and potentially eliminate the need for traditional senior management teams; and</p><p style="text-align:left;">- “AI-ngels” – digital assistants driven by AI – will draw on personal and workplace data to help employees prioritize their tasks and time and ensure mental and physical wellness.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Efficiency is key</b></p><p style="text-align:left;">One of the advantages of technology replacing human skills (according to employers) is efficiency. Robots are programmed to carry out a task and can do so without error, provided that the inputs are correct. Further, these tasks are carried out more efficiently and technology does not take leave days. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">However, as pointed out at numerous points in this article, human skills will never be fully replaced. This was reinforced in a recent article by the World Economic Forum. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that, to do this, we must mobilize the best of human capabilities, technologies, innovative policies, and market forces in service of a new vision.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Moral and economic imperatives</b></p><p style="text-align:left;">The article points out that, to imagine the future of work, we must start with defining how human beings can adapt and grow.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Every person has the right to a productive life. Every person has the right not just to work, but to realize their purpose so they can participate fully in society. Every business has the moral and economic responsibility to help protect people’s livelihoods, even when they cannot always protect the jobs they do.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that you cannot have a healthy business in a sick world. For businesses to thrive, society must also thrive: from employees, to consumers, to suppliers, shareholders and other stakeholders. When you leave some people to fall through the cracks, you lose all the benefits they bring to society, from their skills and talents, to their experience and unique understanding. And yes, their buying power too.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">It isn’t just a moral imperative, it’s also an economic one. Take gender equality. McKinsey estimates that if no action is taken, global GDP growth could be $1 trillion lower in 2030. Conversely, immediate action to advance gender equality could add $13 trillion to global GDP in 2030.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Re-imagining work</b></p><p style="text-align:left;">The article points out that, to reimagine the working landscape we need to attempt something that seems almost impossible: we must imagine not just what the world of work is going to look like in 10, 15, 20 years, but what we want it to look like. We must imagine what it will look like if human beings are thriving.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">This means involving people as part of the solution rather than as a problem to be solved. Only by doing all this can we continue to build a better business and a better world - for everyone.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Actionable change</b></p><p style="text-align:left;">The article points out that there are three actions that businesses can take to facilitate this change. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">- Support people to find their own sense of purpose and realize their full potential by working with them to develop a purpose-led, future-fit development plan. This is more than just running reskilling programmes. This is &nbsp;about equipping people to lead the change, rather than having change done to them;</p><p style="text-align:left;">- Pioneer new forms of employment to provide flexibility with security. This is about enabling people to choose how they want to work depending on their life stage. A socially responsible alternative to the gig economy; and </p><p style="text-align:left;">- Putting mental health and wellbeing at the forefront of preparing for the <i>Future of Work</i> with meaningful action (not just ‘raising awareness’ campaigns’). This is about providing practical support and coaching to people as they figure out their future options.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that, while the jobs of tomorrow may be resetting, people are not. People are not widgets; they are the soul of any successful business. Businesses can help people to follow reskilling and other career pathways by: putting them at the heart of the future of work; ensuring they understand their own personal purpose; providing the support they need to feel happy and healthy; and giving them a sense of belonging.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">This will ensure that people are able to thrive, adapt and grow as they are empowered to proactively shape the future of work.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Where does GTconsult fit in? </b></p><p style="text-align:left;">“GTconsult has been at the forefront of innovation and embracing enhancing productivity through technology. GTconsult started off as a small company with a big heart and grew because we knew where the future of tech was heading, and the impact that it would have on society. We continuously strive to drive change and focus on how trends impact our journey,” says Craig Tarr, Co-Founder of GTconsult and newly appointed CEO. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><span style="color:inherit;"></span></p><p style="text-align:left;">GTconsult has always focused on how technology can drive change and is involved in a number of projects which are helping clients improve efficiency and productivity. Stay tuned to find out more about these exciting projects.&nbsp;</p></div>
</div><div data-element-id="elm_-6Xcen-oT2y6Jhdtz-Bplw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 10 Nov 2020 09:38:42 +0000</pubDate></item><item><title><![CDATA[Is cyber security still just a fad?]]></title><link>https://www.gtconsult.com/blogs/post/Is-cyber-security-still-just-a-fad</link><description><![CDATA[g&nbsp; This is the last week of Cyber Security Awareness Month, and hopefully you have navigated it with any incident. &nbsp; Risk management plays an i ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_2L32EXdTQgKydpDzmAbWXQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_yHK4fP1qQByOjroTd4VAOg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ZUzXvOZmTbu3Zx-ua0bNag" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_yhBEDDFMRVGUm-3UIJM1yA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true"></h2></div>
<div data-element-id="elm_2VXzld2qSxOhHxpeUScgSQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><img src="https://images.unsplash.com/photo-1586772002345-339f8042a777?ixlib=rb-1.2.1&q=80&fm=jpg&crop=entropy&cs=tinysrgb&w=1080&fit=max&ixid=eyJhcHBfaWQiOjQ1Nzk3fQ">g&nbsp;</p><p style="text-align:left;">This is the last week of Cyber Security Awareness Month, and hopefully you have navigated it with any incident.<br></p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Risk management plays an important role in the financial services industry. Insurers and credit providers take a serious look at risk and invest a lot of time and capital in developing models that will address the identified risk. It gives them an idea of where they are and where they need to be. Its true benefit can be seen in achieving identified deliverables. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Risk management also plays a significant role in the technology industry. However, because of the nature of the evolution of this risk, models need to be fluid and have to be extremely adaptable.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Serious complexity </b></p><p style="text-align:left;">Let’s revisit the financial services industry for a second. The reason why risk management plays an important role in this industry is that it is an effective way to address risk. This is only true because the risks that the industry faces haven’t changed much over the past ten years. The reason why risk management in the technology space becomes a challenge is because cyber security is <a href="https://www.forbes.com/sites/elenakvochko/2020/10/25/why-cyber-security-is-still-so-complex/#4bffb47ef974">seriously complex</a>. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that consumers, businesses, and entire systems all over the world are under threat on a daily basis. Valuable personal and financial information is exposed and ready for the taking. Simple tasks like using a credit card, a phone, or a computer provide an opportunity to take our money, our identities, and your ways of life. Data breaches are capable of rendering large, powerful companies vulnerable.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">As the world evolved and became more technological, attacks evolved along with the new developments. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>A new window to climb through</b></p><p style="text-align:left;">The article points out that when humans learned to domesticate animals and grow food, larger settlements were established and societies started to flourish in multiple locations across the world. </p><p style="text-align:left;">Sedentary societies then placed value not only in food and clothing, but in things such as cattle, crops, land, houses, and machinery. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Commerce was created, value was placed on a new concept - money. Goods were then exchanged for precious metals such as gold, silver, and bronze in the form of coins and paper money years later. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that the value of money prompted societies to create impenetrable fortresses and sophisticated vaults to keep valuables away from the hands of criminals.&nbsp; As societies became more complex, both crime and remediation efforts evolved along with them. Before the rise of computers, trespasses were much easier to prevent. All we had to do was keep a door locked. The internet has given a new window to climb through for digital assets.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">This tells us that security has also evolved alongside attacks to give rise to holistic security. Today, digital assets have the highest value. Our neighbourhood is now the entire globe. In response to this new type of cyber criminal, organizations have developed an equally evolved security system. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Be prepared!</b></p><p style="text-align:left;">The article points out that, because of our daily interaction with connected devices, computers, smartphones, and tablets, it’s important that everyone - from the CEO and software developers to suppliers and employees - to be aware. Everyone can play an important part in keeping information safe. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that ransomware has become a headache for businesses and individuals alike. This type of attack can hold data hostage via encryption, which is the process of converting data into unreadable code to prevent access, until the victim pays a large amount of money to get the description keys. Organizations can fall victim to ransomware through drive-by downloads and phishing emails. Millions of people around the world reported encounters with ransomware.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">While attackers are finding new, innovative ways to threaten the security of an organization, holistic and complete security will give enterprises a chance to fight against any attack and protect their data.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that everyone in the company should have the following questions in mind:</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>CEOs; how secure is your company? What risks are you exposed to?</p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>Technical Teams; how can you make data easy and accessible to your team without compromising security?</p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>Product Owners; at what stage do you integrate security? And </p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>Employees; what is your role in cybersecurity? What can you do to protect your company’s data?</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that it is important for cybersecurity to be a company-wide approach - a combination of people, processes and tools. Organizations should develop security operation centres, which are intelligence-led and are focused on creating high-level defence, cyber hygiene, education, and awareness.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The goal? To stress-test your systems, identify, contain and remediate the negative impact fast.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Cyber literacy</b></p><p style="text-align:left;">When my parents were at school, my mom had to do typing lessons as a school subject. It was the same for me when I was at school where a module of Computer Literacy Classes focused on typing. Spoiler alert, I still type with a single finger on each hand looking at the keyboard the whole time. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">We digress. There is a significant push for subject matter such as coding and cyber security to be included in computer literacy classes in classrooms around the world. Cyber risk literacy should be <a href="https://www.helpnetsecurity.com/2020/10/27/cyber-risk-literacy/">part of every defensive strategy</a>.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that while almost 95% of cybersecurity issues can be traced back to human error, such as accidentally clicking on a malicious link, most governments have not invested enough to educate their citizens about the risks, according to a report from the Oliver Wyman Forum.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Cyber risk literacy of the population</b></p><p style="text-align:left;">The article adds that cyber literacy, along with financial literacy, is a new 21<sup>st </sup>century priority for governments, educational institutions, and businesses.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Cyberattacks are now one of the fastest growing crimes globally and are expected to cost organizations more than $600 billion dollars a year by 2021,” Paul Mee of the Oliver Wyman Forum told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“The situation has become even more pressing during the pandemic as our reliance on the internet has grown. Yet many citizens still lack the basic skills to keep themselves, their communities, and their employers safe.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Fifty geographies were assessed, including the European Union, on the present cyber risk literacy of its population, and the nature of related education and training available to promote and enable future cyber risk literacy.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that the index measures five key drivers of cyber risk literacy and education: the public’s motivation to practice good cybersecurity hygiene; government policies to improve cyber literacy; how well cyber risks are addressed by education systems; how well businesses are raising their employees cyber skills, and the degree to which digital access and skills are shared broadly within the population.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>How are assessed countries doing?</b></p><p style="text-align:left;">The article added that Switzerland, Singapore and the UK topped the list because of their strong government policies, education systems and training, practical follow through and metrics as well as population motivation to reduce risk.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Switzerland, the number one ranked country, has a comprehensive implementation document that lays out specific responsibilities along with what national or provincial legislation is required. Specific milestones are set, and timelines are assigned to ensure accountability regardless of who oversees the government.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Singapore, which is ranked second, has prioritized cybersecurity education efforts from early childhood to retirees. It established the Cyber Security Agency of Singapore to keep its cyberspace safe and secure. Its cyber wellness courses occur over multiple grades and focus on social and practical safety tips such as understanding cyber bullying.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that The UK ranked third, has the most integrated cyber system because it incorporates cyber risk into both primary and secondary education. The UK’s National Cyber Security Strategy of 2016-2021 is also one of the strongest plans globally. The US ranked 10th.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Countries that rank lower lack an overall national strategy and fail to emphasize cyber risk in schools. Some countries in emerging markets are only beginning to identify cybersecurity as a national concern.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Governments that want to improve the cyber risk literacy of their citizens can use the index to strengthen their strategy by way of adopting new mindsets, trainings, messaging, accessibility and best practices,” Mee told helpnetsecurity.com. “With most children using the internet by the age of four, it is never too early to start teaching your citizens to protect themselves.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Problematic issues</b></p><p style="text-align:left;">Another article by helpnetsecurity.com pointed out that cybersecurity <a href="https://www.helpnetsecurity.com/2020/10/23/cybersecurity-is-failing-due-to-ineffective-technology/">is failing due to ineffective technology</a>.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">A failing cybersecurity market is contributing to ineffective performance of cybersecurity technology, a Debate Security research reveals.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that, based on over 100 comprehensive interviews with business and cybersecurity leaders from large enterprises, together with vendors, assessment organizations, government agencies, industry associations and regulators, the research shines a light on why technology vendors are not incentivized to deliver products that are more effective at reducing cyber risk.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The report supports the view that efficacy problems in the cybersecurity market are primarily due to economic issues, not technological ones. The research addresses three key themes and ultimately arrives at a consensus for how to approach a new model.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Cybersecurity technology is not as effective as it should be</b></p><p style="text-align:left;">The article pointed out that 90% of participants reported that cybersecurity technology is not as effective as it should be when it comes to protecting organizations from cyber risk. Trust in technology to deliver on its promises is low, and yet when asked how organizations evaluate cybersecurity technology efficacy and performance, there was not a single common definition.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Pressure has been placed on improving people and process related issues, but ineffective technology has become accepted as normal – and shamefully – inevitable.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>The underlying problem is one of economics, not technology</b></p><p style="text-align:left;">The article added that 92% of participants reported that there is a breakdown in the market relationship between buyers and vendors, with many seeing deep-seated information asymmetries.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Outside government, few buyers today use detailed, independent cybersecurity efficacy assessment as part of their cybersecurity procurement process, and not even the largest organizations reported having the resources to conduct all the assessments themselves.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">As a result, vendors are incentivized to focus on other product features, and on marketing, deprioritizing cybersecurity technology efficacy – one of several classic signs of a “market for lemons”.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Coordinated action between stakeholders only achieved through regulation</b></p><p style="text-align:left;">The article pointed out that, unless buyers demand greater efficacy, regulation may be the only way to address the issue. Overcoming first-mover disadvantages will be critical to fixing the broken cybersecurity technology market.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Many research participants believe that coordinated action between all stakeholders can only be achieved through regulation – though some hold out hope that coordination could be achieved through sectoral associations.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article added that, in either case, 70% of respondents feel that independent, transparent assessment of technology would help solve the market breakdown. Setting standards on technology assessment rather than on technology itself could prevent stifling innovation.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Defining cybersecurity technology efficacy</b></p><p style="text-align:left;">The article pointed out that participants in this research broadly agree that four characteristics are required to comprehensively define cybersecurity technology efficacy.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">To be effective, cybersecurity solutions need to have the capability to deliver the stated security mission (be fit-for-purpose), have the practicality that enterprises need to implement, integrate, operate and maintain them (be fit-for-use), have the quality in design and build to avoid vulnerabilities and negative impact, and the provenance in the vendor company, its people and supply chain such that these do not introduce additional security risk.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“In cybersecurity right now, trust doesn’t always sell, and good security doesn’t always sell and isn’t always easy to buy. That’s a real problem,” Ciaran Martin, Advisory Board Member at Garrison Technology told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Why we’re in this position is a bit of a mystery. This report helps us understand it. Fixing the problem is harder. But our species has fixed harder problems and we badly need the debate this report calls for, and industry-led action to follow it up.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Company boards are well aware that cybersecurity poses potentially existential risk, but are generally not well equipped to provide oversight on matters of technical detail,” John Cryan, Chairman Man Group told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Boards are much better equipped when it comes to the issues of incentives and market dynamics revealed by this research. Even if government regulation proves inevitable, I would encourage business leaders to consider these findings and to determine how, as buyers, corporates can best ensure that cybersecurity solutions offered by the market are fit for purpose.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“As a technologist and developer of cybersecurity products, I really feel for cybersecurity professionals who are faced with significant challenges when trying to select effective technologies,” said Henry Harrison, CSO of Garrison Technology told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“We see two noticeable differences when selling to our two classes of prospects. For security-sensitive government customers, technology efficacy assessment is central to buying behaviour – but we rarely see anything similar when dealing with even the most security-sensitive commercial customers. We take from this study that in many cases this has less to do with differing risk appetites and more to do with structural market issues.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Be cyber smart</b></p><p style="text-align:left;">Cyber security is advancing at a rapid rate. Companies are no longer able to keep a constant eye on their employees and offer the protection that they need. a measure of this responsibility rests on the shoulders of <a href="https://www.dqindia.com/5-cybersecurity-tips-secure-data-become-cybersmart/">those below board level</a>. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Use a strong password</b></p><p style="text-align:left;">The article points out that having to manage a large number of applications and software, the easiest option for most users would be to pick a password that is easy to remember, and then apply it across the board. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">While this might be a convenient option, it is definitely not the safest. Cybercriminals these days use tools that sniff out passwords reused on other sites to make their work easier and to make the stolen passwords and data more lucrative on the dark web. Hence, it is recommended that you choose strong passwords, using different alpha-numerical combinations, as well as change them periodically.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Opt for two factor authentication</b></p><p style="text-align:left;">The article adds that the rule of thumb should be when creating any digital account, always set up two-factor authentication (2FA). </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">It’s a common practice to login to accounts using multiple devices, most often of colleagues, or people we trust. Just trusting the person is never enough. It is their machines that you must trust. In case, you have logged into a network on a PC with malware, you are essentially letting cybercriminals access your data. In such cases, having 2FA, helps to prevent egregious attacks where a cybercriminal tries to login to your account and steal your data.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Safeguard your entry points</b></p><p style="text-align:left;">The article points out that all it takes is one weak entry point, to allow a cybercriminal access to your entire network. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">By forgetting to close down the access points that are not being used, this can be an open door for hackers to enter, and place malware on to your network.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Lookout for signs of a scam</b></p><p style="text-align:left;">The article points out that phishing attacks have become increasingly common these days, and are using several tactics to target vulnerable users. At the same time, there are often several tell-tale signs of a scam in the making, which you can easily spot, if you keep a sharp lookout for them. For example, emails with improper grammar, and spelling mistakes are one of the biggest giveaways. Additionally, links that promise freebies and then request you to enter card details too are illegitimate.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Frequently update your system</b></p><p style="text-align:left;">The article adds that inexpensive home internet devices are prime targets for hackers. A best practice is to update these frequently, and apply all security patches quickly. In the case of older devices, which no longer receive firmware updates, they should be immediately switched out for newer models, to prevent hackers from controlling traffic through routers, and implementing various attacks.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Cybercrime is advancing at a rate which we can no longer afford to take lightly, or ignore. No organization or user today can be considered too small to be a potential victim, hence there is a strong need to create awareness on phishing or targeted attacks. Furthermore, the increased dependence on technology to stay connected, and ensure business continuity, has opened the floodgates to a whole new set of potential cybersecurity vulnerabilities that users must be conscious of. By practising these simple tips and maintaining good IT hygiene, we can be cybersmart, and safe on the internet.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">There are other helpful, yet simple, <a href="https://whnt.com/news/online-safety-tips-for-national-cyber-security-awareness-month/">tips to follow</a>: </p><p style="text-align:left;">- increase your online privacy. Protect your online accounts by implementing multifactor authentication and using strong passwords, which consist of letters, numbers and special characters. Individuals should also refrain from accessing banking information or making online purchases when connected to an unsecured public network;</p><p style="text-align:left;">- stay secure while you work. As more employees work virtually during the COVID-19 crisis, they should be more vigilant about internet scams and online fraud. Business and personal information should be treated with the same care; avoid sharing it with unfamiliar parties or over unsecured networks. It is important to keep the security software on your business devices up to date, because only one employee needs to be compromised for an entire organization to experience a data breach;</p><p style="text-align:left;">- use social media responsibly. Social media is a great way to connect with friends and family, but it can also allow scammers and cybercriminals to target you. Only accept friend requests from people you trust, avoid clicking links in messages from strangers, and refrain from posting your personal information online. Remember to be careful about what you share. Remember, there is no “delete” button online.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><span style="color:inherit;"><span style="font-size:11pt;">“The responsibility to fight cyber crime is upon all of us. We cannot stand back and say that it should be an issue that needs to be tackled at board level. We are all exposed and we can all take a stand against this. Simple interventions, and being aware, can definitely go a long way to address this. Are you going to play an active role?” asks Craig Tarr, CEO of GTconsult.&nbsp;</span></span><br></p></div>
</div><div data-element-id="elm_0nA7lU8VRRKuqFetk31NYQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 27 Oct 2020 08:38:59 +0000</pubDate></item><item><title><![CDATA[A place for everything in cyber security]]></title><link>https://www.gtconsult.com/blogs/post/a-place-for-everything-in-cyber-security</link><description><![CDATA[When faced with two challenges, it important to know the difference between the two so that you can devise an appropriate strategy to address them. ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_qmThPrXzR3anFMB1BvfgWw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_T-qvmJJWScG2hIfMC35Hzg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_Utwpsu_PTliHmqPMbM1l8A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Ak_V0QsKQgyrj7m1BHCLZQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Ak_V0QsKQgyrj7m1BHCLZQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">The face of the moon was in shadow</h2></div>
<div data-element-id="elm_nokAdMq3Q-uxYQrfD0RI1A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nokAdMq3Q-uxYQrfD0RI1A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><img src="https://images.unsplash.com/photo-1543248939-4296e1fea89b?ixlib=rb-1.2.1&q=80&fm=jpg&crop=entropy&cs=tinysrgb&w=1080&fit=max&ixid=eyJhcHBfaWQiOjQ1Nzk3fQ"><br></p><p><br></p><p>When faced with two challenges, it important to know the difference between the two so that you can devise an appropriate strategy to address them. </p><p>&nbsp;&nbsp;</p><p>We are into the third week of Cyber Security Awareness Month and we are presented with the challenge of differentiating between cyber security and cyber resilience. Most companies confuse the two and then come up with these hybrid strategies which are mostly ineffective.</p><p>&nbsp;&nbsp;</p><p>Acknowledging that these strategies are separate, and <a href="https://www.forbes.com/sites/bernardmarr/2020/10/14/the-important-difference-between-cybersecurity-and-cyber-resilience-and-why-you-need-both/#30bb98ca1721">equally important to companies</a>, is the first step towards effective protection. </p><p>&nbsp;&nbsp;</p><p>The article pointed out that cyber threats like hacking, phishing, ransomware, and distributed denial-of-service (DDoS) attacks have the potential to cause enormous problems for organizations. Not only can companies suffer serious service disruption and reputational damage, but the loss of personal data can also result in huge fines from regulators.</p><p>&nbsp;&nbsp;</p><p>Take British Airways as an example. In 2019, the airline was fined more than £183m by the UK's Information Commissioner's Office (ICO) after customer data was compromised in a cyber-attack. Customer details, including name, address, logins, and payment card, were harvested by hackers – affecting half a million customers in total. The fine, which amounts to around 1.5% of British Airways’ global 2018 turnover, was the first proposed by the ICO under the new General Data Protection Regulation (GDPR).</p><p>&nbsp;&nbsp;</p><p>The article adds that cyberattacks like this are hitting the headlines with increasing frequency. But while a company the size of British Airways can, in theory, swallow such a huge fine and cope with the aftermath, for other businesses, the effects of a cyber-attack can be permanent and devastating. This is why all companies need to invest in cybersecurity and cyber resilience.</p><p>&nbsp;&nbsp;</p><p><b>What’s the difference between the two?</b></p><p>In a nutshell, cybersecurity describes a company's ability to protect against and avoid the increasing threat from cybercrime. Meanwhile, cyber resilience refers to a company's ability to mitigate damage (damage to systems, processes, and reputation), and carry on once systems or data have been compromised. Cyber resilience covers adversarial threats (such as hackers and other malicious actors), as well as non-adversarial threats (for example, simple human error).</p><p>&nbsp;&nbsp;</p><p>The article pointed out that one way of thinking about the difference is that cyber resilience involves accepting the fact that no cybersecurity solution is perfect or capable of protecting against every possible form of cyber threat. This is why every company needs both aspects. The cybersecurity strategy is designed to minimize the risk of attacks getting through. But when they inevitably do, the cyber resilience strategy is there to minimize the impact.</p><p>&nbsp;&nbsp;</p><p><b>What does all this mean in practice?</b></p><p>The article adds that practical cybersecurity steps are perhaps more immediately obvious than those for cyber resilience. At the very least, cybersecurity involves ensuring:</p><p>&nbsp;&nbsp;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>All your devices are running the most up-to-date firmware;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>That firewalls, VPNs, and antivirus/malware protection is running and up-to-date;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>That all software and tools are fixed with the latest patches; and</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>That employees at all levels of the business are educated on the potential threats and how their actions help to defend the organization.</p><p>&nbsp;&nbsp;</p><p>The article points out that cyber resilience steps will vary from business to business, but a good starting point is to work out where cyber events and incidents could have the most damaging effects on the business. Drawing up a list of where your operations are reliant on technology, as well as where sensitive and valuable data is stored and used, will help you to gain an overall understanding of how continuity of service could be affected. This is where the concept of a “digital twin” can play an important role in cyber resilience. A digital, simulated model of your organization or its processes can help you understand the impact on overall output and efficiency.</p><p>&nbsp;&nbsp;</p><p>Having gained an understanding of how core functions could be affected, cyber resilience involves putting in place measures to mitigate the damage as best as possible in the event of an attack. For example, you might develop offline emergency processes to keep essential functions such as customer service, quality assurance, finance, and security running as well as possible until the breach can be fixed.</p><p>&nbsp;&nbsp;</p><p>The article adds that, in addition, you’ll need a solid cyber incident response plan to clarify:</p><p>&nbsp;&nbsp;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>&nbsp;What needs to be done in the event of a failure or breach;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>Who is responsible for taking those steps;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>How to communicate the incident to stakeholders (customer services will have a core role to play here);</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>How failures should be reported to regulators (which may be a regulatory requirement in your jurisdiction);</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>How to assess and report the impact of resilience measures;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>How to get back to normal operations as quickly as possible; and</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>How to recover data, if data has been lost or accidentally erased (cyber resilience promotes the idea that it’s impossible to certify that any piece of data is totally “safe,” even if the data is backed up, and therefore steps should be in place to recover it when it is lost).</p><p>&nbsp;&nbsp;</p><p>To help put this plan into action in the event of an incident, many organizations find it helps to create a response team, with representatives from every business department who are responsible for declaring a “state of emergency” and coordinating first responses.</p><p>&nbsp;&nbsp;</p><p>The article points out that technology brings incredible new opportunities and business advantages, but it also brings unprecedented new threats. Cybersecurity and resilience both require an investment in time, resources, and education, but that investment will be repaid many times over once you’ve withstood your first cyber-attack.</p><p>&nbsp;&nbsp;</p><p><b>Accelerated focus</b></p><p>What is encouraging to see is that there is an accelerated focus on cyber security adoption. Recent studies show that 83% of enterprises <a href="https://www.forbes.com/sites/louiscolumbus/2020/10/18/83-of-enterprises-transformed-their-cybersecurity-in-2020/#30bbb8a937c8">transformed their cybersecurity in 2020</a>. </p><p>&nbsp;&nbsp;</p><p>The article points out that this, and many other insights are from a recent survey of IT leaders completed by CensusWide and sponsored by Centrify. The survey's objectives on understanding how the dynamics of IT investments, operations and spending have shifted over the last six months. The study finds that the larger the enterprise, the more important it is to secure remote access to critical infrastructure to IT admin teams. Remote access and updating privacy policies and notices are two of the highest priorities for mid-size organizations to enterprises today. The methodology is based on interviews with 215 IT leaders located in the U.S.&nbsp; </p><p>&nbsp;&nbsp;</p><p>Some of the key highlights of the study include:</p><p>&nbsp;&nbsp;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>73% of enterprises (over 500 employees) accelerated their cloud migration plans to support the shift to remote working across their organizations due to the pandemic;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>81% of enterprises accelerated their IT modernization processes due to the pandemic;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>48% of all companies surveyed have accelerated their cloud migration plans, 49% have sped up their IT modernization plans because of Covid-19;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>32% of large-scale enterprises, over 500 employees, are implementing more automation using artificial intelligence-based tools this year.</p><p>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p><b>SMB adoption</b></p><p>The article points out that the overwhelming majority of enterprises have transformed their cybersecurity approach over the last six months, with 83% of large-scale enterprises leading all organizations. It's encouraging to see small and medium-sized businesses adjusting and improving their approach to cybersecurity. </p><p>&nbsp;&nbsp;</p><p>Reflecting how digitally-driven many small and medium businesses are, cybersecurity adjustments begin in organizations with 10 to 49 employees. 60% adjusted their cloud security postures as a result of distributed workforces. </p><p>&nbsp;&nbsp;</p><p><b>Leading the way</b></p><p>The article adds that 48% of all organizations had to accelerate cloud migration due to the pandemic, with larger enterprises leading the way. </p><p>&nbsp;&nbsp;</p><p>Enterprises with over 500 employees are the most likely to accelerate cloud migration plans due to the pandemic. 73.5% of enterprises with more than 500 employees accelerated cloud migration plans to support their employees' remote working arrangements, leading all organization categories. </p><p>&nbsp;&nbsp;</p><p>This finding reflects how cloud-first the largest enterprises have become this year. It's also consistent with many other surveys completed in 2020, reflecting how much the cloud has solidly won the enterprise. </p><p>&nbsp;&nbsp;</p><p><b>Modernization</b></p><p>The article points out that 49% of all organizations and 81% of large-scale enterprises had to accelerate their IT modernization process due to the pandemic. </p><p>&nbsp;&nbsp;</p><p>For the largest enterprises, IT modernization equates to digitizing more processes using cloud-native services (59%), maintaining flexibility and security for a partially remote workforce (57%) and revisiting and adjusting their cybersecurity stacks (40%).</p><p>&nbsp;&nbsp;</p><p><b>Highest priority</b></p><p>The article adds that 51% of enterprises with 500 employees or more are making remote, secure access their highest internal priority. In contrast, 27% of all organizations' IT leaders say that providing secure, granular access to IT admin teams, outsourced IT and third-party vendors is a leading priority. </p><p>&nbsp;&nbsp;</p><p>The larger the enterprise, the more important remote access becomes. The survey also found organizations with 250 – 500 employees are most likely to purchase specific cybersecurity tools and applications to meet compliance requirements. </p><p>&nbsp;&nbsp;</p><p><b>Lesson learning</b></p><p>The article points out that IT leaders are quickly using the lessons learned from the pandemic as a crucible to strengthen cloud transformation and IT modernization strategies. One of every three IT leaders interviewed, 34%, say their budgets have increased during the pandemic. In large-scale enterprises with over 500 employees, 59% of IT leaders have seen their budgets increase.</p><p>&nbsp;&nbsp;</p><p>All organizations are also keeping their IT staff in place. 63% saw little to no impact on their teams, indicating that the majority of organizations will have both the budget and resources to maintain or grow their cybersecurity programs. 25% of IT leaders indicated that their company plans to keep their entire workforce 100% remote.</p><p>&nbsp;&nbsp;</p><p>The article adds that it's encouraging to see IT leaders getting the support they need to achieve their cloud transformation and IT modernization initiatives going into next year. With every size of organization spending on cybersecurity tools, protecting cloud infrastructures needs to be a priority. Controlling administrative access risk in the cloud and DevOps is an excellent place to start with a comprehensive, modern Privileged Access Management solution. Leaders in this field, including Centrify, whose cloud-native architecture and flexible deployment and management options, deliver deep expertise in securing cloud environments.</p><p>&nbsp;&nbsp;</p><p><b>The bottom line</b></p><p>The bottom line is that it’s time for a <a href="https://gcn.com/articles/2020/10/19/security-optimization.aspx">better approach to cybersecurity</a>. You may be sufficiently covered and up to speed with the latest industry trends. The fact of the matter is that this industry is constantly evolving, and at a pace that is much quicker than most companies can cope with. </p><p>&nbsp;&nbsp;</p><p>The role of chief security officer has never been easy, especially in the complex bureaucracies of the federal government. Stakes are high, IT infrastructure is sprawling and Congressional oversight could lead to a hearing in an instant. Additionally, nation-states and criminals are increasing their attacks against government agencies, shifting from disruptive and destructive tactics to large-scale social manipulation through disinformation operations.</p><p>&nbsp;&nbsp;</p><p>The article points out that security teams are tasked with defending U.S. government critical assets against cyberthreats, yet they often lack insight into the effectiveness of their security controls.&nbsp; Unless they are exercised regularly, security controls fail through misconfiguration or user mistakes. Security leaders can help solve this problem by focusing their teams on the threats that matter most and by shifting their approach to a data-driven strategy with performance effectiveness at the center. </p><p>&nbsp;&nbsp;</p><p>The need for increased security effectiveness is clear. Today government agencies face elevating cyberthreats since the onset of COVID-19 and heightened tensions in American society, particularly in advance of the 2020 presidential election. Unemployment and civil unrest provide nation-state groups with preconditions for operations, as a recent Harvard University study on disinformation outlined. The FBI and Department of Homeland Security recently warned against Chinese and other state-sponsored attackers increasing malicious operations amidst the pandemic. Within government, the pandemic has strained workforces, leaving them ill-equipped to address the increasing number of threats. With Gartner forecasting global government IT spending will decline 0.6% in 2020, it’s unclear how agencies can remain secure on a leaner budget.</p><p>&nbsp;&nbsp;</p><p><b>How to do more with less</b></p><p>The article adds that government IT managers need a way to optimize their security strategy by continuously validating their networks and gauging the effectiveness of current controls to ensure their investments work as intended.</p><p>&nbsp;&nbsp;</p><p>Security optimization is the management practice of maximizing the efficiency and effectiveness of an organization’s total security program by ensuring that existing control investments are measured, monitored and modified continuously from a threat-informed perspective. Security optimization is not about cost cutting; it is about programmatically aligning security and risk services within the organization.</p><p>&nbsp;&nbsp;</p><p>The article points out that It all comes down to data. To achieve efficiency and effectiveness across a security program, government agencies must shift from a project-centric to a program-oriented mindset with performance data at the center.</p><p>&nbsp;&nbsp;</p><p><b>Nuts and bolts</b></p><p>What would that program look like? First, it would be underpinned by the MITRE ATT&amp;CK framework. Second, it would include automated testing, pitting cyberdefenses against known threats. Third, it would use automated testing to generate real data about the security team’s operational performance.</p><p>&nbsp;&nbsp;</p><p>The article points out that this is a shift in security program strategy. By organizing teams around a shared view of threats, automation and performance data, security leaders can make programmatic improvements in people, process and technology to gain the best return on investment. </p><p>&nbsp;&nbsp;</p><p>Traditionally, “blue team” network defenders focus their operations on meeting baseline cybersecurity best-practices: correcting misconfigurations, administering patches and deploying best-in-class commercial products. If defenses are not oriented toward the most important threats, however, those resources are wasted. If they are not tested actively against probable threats, they are likely to fail when challenged by the adversary, letting the attacker slip past. </p><p>&nbsp;&nbsp;</p><p>The article adds that security organizations typically turn to “red teams” and penetration testing to help secure the enterprise. Red teaming is the process of testing technologies, policies, systems and assumptions by adopting an adversary’s approach.&nbsp; Although red teams often discover faults in cyberdefense programs, red-team testing is notoriously sporadic, under-resourced and ineffective in validating security controls continuously and at scale to achieve real security effectiveness. </p><p>&nbsp;&nbsp;</p><p><b>Purple teams</b></p><p>The article points out that one way to improve the efficiency of this approach is by having blue- and red-focused teams adopt a purple team mindset for cyberdefense operations. </p><p>&nbsp;&nbsp;</p><p>Purple team doctrine ensures that organizations optimize their cybersecurity continuously by validating their controls against a library of known attack methods. Purple teams focus on the overarching threat landscape. They understand their security technologies, their organization and its operational attributes. When combined with automation, security teams can test these operations at scale, across the organization, and discover ways to improve security efficiency and effectiveness. The Defense Department has conducted purple team operations to achieve cybersecurity effectiveness for military networks. Other government agencies should adopt a threat-informed, purple team mindset to improve their cybersecurity effectiveness at a programmatic level.&nbsp; </p><p>&nbsp;&nbsp;</p><p>By ensuring that existing security investments are measured, monitored and modified continuously from a threat-informed perspective, senior security leaders can use performance data to make sound investment decisions, improve the cybersecurity of government agencies and better protect Americans’ data.</p><p>&nbsp;&nbsp;</p><p><b>Important tips</b></p><p>In the modern age, small and medium businesses contribute a lot towards economic development. However, these are the companies who are most vulnerable to cyber attacks. </p><p>&nbsp;&nbsp;</p><p>Here are <a href="https://www.webtitan.com/blog/10-cybersecurity-tips-for-small-businesses/">some important tips</a> for these companies to follow:</p><p>&nbsp;&nbsp;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>Implement a Robust Firewall. A firewall is a cybersecurity solution that sits between a small business network and the outside world and prevents unauthorized individuals from gaining access to the network and stored data. Not all firewalls are created equal. Extra investment in a next generation firewall is money well spent. Don’t forget to also protect remote workers. Ensure that they are also protected by a firewall;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>Create and Enforce Password Policies. You should implement password policies that require all users to set strong, secure passwords. A strong, unique password should be used for all systems. Passwords should include capitals, lower-case letters, a number, and a special character, and should be at least 10 digits long. Teach employees how to create secure passwords and enforce your password policies. Consider using a password manager so passwords do not need to be remembered.&nbsp; Consult NIST for the latest password guidance;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>Security Awareness Training. Make sure you provide the workforce with regular security awareness training. This is the only way that you can create a culture of cybersecurity. Be sure to cover the security basics, safe Internet use, how to handle sensitive data, creation of passwords, and mobile device security. You should provide training to help employees avoid phishing attacks and consider phishing simulation exercises to test the effectiveness of your training program;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>Backups. It is essential to have a good backup policy. In the event of disaster, such as a ransomware attack, you need to be able to recover critical data. Backups must also be tested to make sure files can be recovered. Don’t wait until disaster strikes to test whether data can be recovered. A good strategy is the 3-2-1 approach. Three backup copies, on two different types of media, with one copy stored securely offsite.</p><p>&nbsp;&nbsp;</p><p><b>So where does GT fit in?</b></p><p>GTconsult has a long history of assisting companies with their cybersecurity and cyber resilience. A lot of our clients are large companies; however, we specialise in SMBs as that is where our A Team can give focused advice and assistance. </p><p>&nbsp;&nbsp;</p><p><span style="color:inherit;"></span></p><p>GTconsult offers a range of cyber security services that will ensure that you are protected against any threats. We also have our A Team which will assist you with any concerns you have. Contact us today to find out more.</p></div>
</div><div data-element-id="elm_qNpvkFi6SmWMlPB_gVAb1Q" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 22 Oct 2020 10:16:10 +0000</pubDate></item><item><title><![CDATA[Net-neutrality is the latest big thing in technology]]></title><link>https://www.gtconsult.com/blogs/post/net-neutrality</link><description><![CDATA[The advancement of technology, in particular, the growth of the internet and connectivity, has dramatically changed the shape of the world that we liv ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_thFVWpxDRKK76EQvlrhICg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_5hSGQ-7CTSO2mmyqmS4Kgw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mDlMOlzcS4mbmiAPLw_FRA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_hMBff9DERoS6_ZlRqgYa6g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_hMBff9DERoS6_ZlRqgYa6g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p>The advancement of technology, in particular, the growth of the internet and connectivity, has dramatically changed the shape of the world that we live in.</p><p>Gone are the days of being bound to an office with specific rules and boardrooms where the air-conditioning doesn’t work. Connectivity allows a person to telecommute to an office or a boardroom meeting should they be unable to attend it.</p><p>It also creates a level playing field for companies of different shapes and sizes to compete on a level footing for the same customers. Or does it?</p><p><strong>The world of net-neutrality</strong></p><p>Those of us who have uncapped internet are all too familiar with <em>throttling</em>, a practice whereby internet service providers (ISP) throttle bandwidth during peak hours or at times when clients are not adhering to their fair usage policies.</p><p>While frustrating, the practice of throttling bandwidth has little effect in South Africa, other than it being the proverbial thorn in the side. But in the US, this is big business with significant ramifications.</p><p>ISPs are major players in the US market with significant ownership of tech companies. Hulu is partly owned by Comcast. If you are a Comcast customer, and you want to watch a video on say Netflix, preferential bandwidth is given to Hulu to the extent that the same video will be shown at a faster speed than on Netflix.</p><p>This dissuades people from using a video broadcast website that is not affiliated with the said ISP. However, this also means that advertisers are being unfairly treated by the preferential treatment.</p><p>The US is all about doing business as fairly as possible, and they have a proud reputation regarding this. so it was unsurprising when former President Barack Obama passed net-neutrality laws which prevented ISPs from their throttling ways.</p><p>However, as some would say predictably, President Donald Trump looks set to scrap this law. What will this mean for business?</p><p><strong>A case for fair business</strong></p><p>A <a href="http://economictimes.indiatimes.com/articleshow/58583542.cms">recent article on economictimes.indiatimes.com</a> pointed out that data traffic management practices employed by telecom service providers should not allow application-based restrictions and should not discriminate.</p><p>The telecom regulatory body had put out a consultation paper on net neutrality in January and had asked for submissions on the kind of traffic management practices that should be allowed. The paper said it was “important to identify core principles of net neutrality for India and the types of practices that might be regarded as being in violation of these core principles”.</p><p>“Net Neutrality regulations should ensure that traffic management practices do not impose arbitrary restrictions and discriminatory practices, including blocking, throttling, or altering of specific content, application, or services and should be strictly forbidden and any such actions should be punishable,” R Chandrasekhar, Nasscom president, told ET.</p><p>The article goes on to add that Nasscom made a joint submission to the Data Security Council of India. He added that traffic management should not directly or indirectly discriminate based on the data whether on price, the source of data or destination of the data.</p><p>“We also think that traffic management systems should be temporary and targeted at solving a problem. It should only take place in times on congestion,” said Chandrasekhar.</p><p>If we think of this, it’s only fair right? Net neutrality is the principle that all data on the internet should be treated equally by internet providers. It prevents internet service providers from privileging or punishing different kinds of data usage. It creates a free market system, a system whereby the smaller players keep the bigger players in check.</p><p>As discussed in previous articles, Millennials are the customers of today, and their loyalty is fickle at best. They spend considerable time fighting against practices that marginalize smaller companies. And once their loyalty is gone…as the Italian mobsters say…forget about it.</p><p><strong>A look into the future</strong></p><p>Let’s say that net-neutrality is scrapped. ISPs will be able to charge what they want for preferential treatment at free will.</p><p>They will tell you that it is not a big thing, but to quote George Orwell’s Animal Farm: <em>all animals are equal, but some will be more equal than others.</em></p><p>An article on networkworld.com points out what would happen in this world. The new regulations would split the Internet of Things (IoT) industry into the haves and the have-nots. Larger IoT firms would flourish, as they can pay the higher access fees to connect their sensors to the cloud.</p><p>Startups that cannot afford the higher fees will struggle to survive. Venture Capital funding to new IoT startups will dry to a trickle. Sales of the carrier’s own IoT services will soar because they didn’t have to pay the higher access fees thereby becoming <em>more equal</em>. This will be the death kneel for smaller companies; the proverbial nail in the coffin.</p><p><strong>The news gets worse</strong></p><p>The article goes on to paint an even worse picture.</p><p>IoT devices would still be able to connect to the network, but they have to be carrier-certified first. The long lead times and high costs for IoT device certification would slow down the rate of innovation. On the plus side, certification has become a lucrative profit center for the carriers.</p><p>Health-monitoring applications that produce a high volume of sensor data were the first to suffer. Their popularity declined as sensor readings became less dependable due to higher network latency and increased packet loss. IoT-based predictive maintenance and security monitoring services were the next to fade. In theory, network traffic was still treated fairly by the carriers, but in practice, traffic from profitable applications was treated more fairly.</p><p>Can we honestly say we want to live in a world such as this?</p><p>No, and it is up to us to fight for our rights as smaller or medium sized businesses before it is too late.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 18 May 2017 15:08:52 +0000</pubDate></item><item><title><![CDATA[BoardPacks scores 4.75 out of 5 on sharepointreviews.com]]></title><link>https://www.gtconsult.com/blogs/post/boardpacks-scores-sharepoint</link><description><![CDATA[“This product is highly recommended for those looking for a toolset that will help bring that extra level of professi 1/BoardPacks-1024x734.png)](/cont ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_J8rEaXfuTz2raSAbUNIl_w" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_N2rFG4eYQ52Ic6zJ-VWUig" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_A5Im_LqcRy6tsk1gUeTS4Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_90YvZcCdT8uofTIPrTY3KQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><blockquote><p>“This product is highly recommended for those looking for a toolset that will help bring that extra level of professi<img src="/wp-content/uploads/2020/06/BoardPacks-1024x734.png" alt="BoardPacks">1/BoardPacks-1024x734.png)](/content/images/2015/11/BoardPacks.png)</p></blockquote><p>A product validation report performed by Ron Charity evaluated the overall benefit and performance of <a href="http://boardpacks.com/">Boardpacks</a>, a <em>more than meeting management</em> tool from eShare.</p><p>Charity&nbsp;evaluated the product for a period of five days and shared experiences and ratings in areas ranging from first impressions to features and support. Providing&nbsp;an overall score of <strong>4.75 out of 5</strong>, he&nbsp;states, “SharePoint is a great platform for collaboration whether it be for meetings or other forms of teamwork. Adding BoardPacks enriches SharePoint’s feature set offered to your organization by providing an intuitive interface to meeting manage accessible through common devices (tablets, laptops) available in organizations today.”</p><p>Hop on over to the <a href="http://sharepointreviews.com/sharepoint-reviews-articles/product-validation-reports/2133-boardpacks-meeting-solution-sharepoint-online">ITUnity Review site: SharePoint Reviews</a>&nbsp;and check out the full report.</p><p>====</p><p>*GTconsult is proud to be a BoardPacks partner. *</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 13 Nov 2015 16:14:15 +0000</pubDate></item></channel></rss>