- we should use open-source software when possible
- it’s time to re-think how we approach software, and stop companies from nickel-and-diming us with unnecessary costs
- it’s often FREE to use, fully customizable for any size company’s needs
- it’s reviewed and maintained by a community, which means no secret tricks in the code and better chances to find/fix bugs
- it supports knowledge over possession, instead of paying for the software license you are paying for the knowledge of using the software
- an expert from the community will charge XX/hr to setup and configure, and there are often support plans
- someone internally can invest “sweat equity” as there is often extensive documentation and a forum to post questions
- Examples, most are cross-platform, i.e. works with Windows, Mac, and Linux!
- Firefox for Internet
- Thunderbird for E-mail
- LibreOffice for Documents, Spreadsheets, Presentations
- KeePassX for Password Vault, Password Generator
- VLC Media Player for anything from DVDs to downloaded movie files
- GIMP for image editing
- Virtualbox for virtual computers, servers, and more
- there are so many more out there, try to search with “open source” in your keywords when looking for new software, you will be surprised that there is nearly an option for everything!
- we should start encrypting our communications, especially text messages and phone calls
- it’s time to realize everything is recorded. every call, every text, every e-mail, and it’s alarming what can be done with this type of data. if this sounds paranoid, read the articles from Wired and Forbes regarding Rob Joyce, the NSA “Hacker-in-Chief”, presenting at the Enigma 2016 conference. Then take a look at the NSA Utah Data Center specifications. My favorite parts are the claim of storing a yottabyte at the data center in 2012 which equates to about 250 trillion DVDs, and the sign out front that says: “If you have nothing to hide, you have nothing to fear.”
- Examples, the focus here is free, open-source (for security reasons in this case), and cross-platform.
- Signal Private Messenger for text messages, all messages can only be read from the sending/receiving device, nothing can be read in transit. On Android it can be used as the default text application, and I use it daily!
- Signal Private Messenger for phone calls, the call is setup over the data (cellular data or wifi) connection, and nothing can be listened to in transit. Each party gets a word to confirm to ensure connection is secure.
- E-mails are a bit trickier, as there may be options through your e-mail service (such as gmail, google apps, hotmail, etc), or there may be an option with your e-mail client (Outlook, Thunderbird, etc). Encryption involves having a public/private key pair, which may sound like jibberish but means everything when it comes to encryption as security.
- we should start encrypting sensitive information, especially passwords
- it’s time to ditch the spreadsheets, if a paper copy or “offline” copy is needed it can be printed or saved to a USB then kept in a safe
- we should always have a backup
- it’s time to buy a portable USB drive if you don’t have one, and to make sure you always have your information in two places
- be sure to encrypt the USB drive before storing any information on it, so that if it is stolen the files are inaccessible
Thank you all for the time we spent together and the things we learned, being of service to our customers was a blessing and enlightening experience for me personally, and I truly do wish you each the best in your future endeavors.
Enlightened Communications LLC