Reports this year predict that annual bouts of bad weather might be shaping to be ‘below-normal’ – but the season is far from over. Here are some disaster management protocols for the wildest weather.
…Large coffee in one hand, laptop teetering precariously on the other, you turn the corner and – WHAM! Threats to your data are around many corners. Here are the most common causes of data loss to watch out for.
A duo of artists known as KairUs curious about private data breaches and e-waste created an exhibition of artworks entitled “Forensic Fantasies”. Highlighting some key issues and effects related to e-waste dumps in places like Ghana, a topic we’ve covered before, they look at some interesting intersections of technology, the environment, and society.
This time last year we were all anxiously biting our nails over the impending threat of the WannaCry cyberattack, which affected over 300,000 computers worldwide. Even though the ransomware attack was resolved in a matter of days, it swiftly incurred billions of dollars in damages. The reality is, it hasn’t been too long since this major attack, and threats to your own cybersecurity measures are as prevalent now as they were then. It’s important to take precautions when it comes to protecting confidential corporate information, but just what do those precautions entail?
Reduce, Reuse, Recycle, Recover, Repeat.
As we look back on a month full of earth appreciation, common themes of recycling and waste prevention efforts prevail. A topic that experiences significantly less exposure during these conversations is the topic of e-waste recycling.