Tech Republic

TorGuard VPN Review: The Good, The Bad, The Ugly

TorGuard VPN’s fast facts Starting price: $9.99 per user per monthKey features: Unlimited bandwidth. Stealth proxy. 3,000+ servers in 50+ countries. TorGuard, as its name implies, is a solid choice VPN, especially for those looking for a fast torrenting VPN speed. The VPN has strong security features and an extensive server suite in 50+ countries. However, accessing the free trial involves jumping through many hoops, and the refund process is similarly complicated. It made me question whether this fast VPN is worth the investment. Here is a TorGuard review covering everything you need to know about the VPN, including the good, the bad, and the ugly side, so you can decide if it’s the best VPN for your business or personal use. 1 Semperis Employees per Company Size Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+) Large (1,000-4,999 Employees), Enterprise (5,000+ Employees) Large, Enterprise Features Advanced Attacks Detection, Advanced Automation, Anywhere Recovery, and more 2 ESET PROTECT Advanced Employees per Company Size Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+) Any Company Size Any Company Size Features Advanced Threat Defense, Full Disk Encryption , Modern Endpoint Protection, and more 3 NordLayer Employees per Company Size Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+) Small (50-249 Employees), Medium (250-999 Employees), Large (1,000-4,999 Employees), Enterprise (5,000+ Employees) Small, Medium, Large, Enterprise Is TorGuard a good VPN for streaming? While TorGuard offers maximum VPN security and speed in all its plans, the ability to stream geo-restricted content with the VPN depends on your chosen plan. When I tested the VPN, TorGuard’s regular servers were unreliable for streaming Netflix or Amazon Prime Video in certain regions. Fortunately, the VPN’s Pro plan offers a free dedicated IP address as an add-on, which you can use to obtain a streaming IP address to unblock streaming content in any specific region. SEE: 5 Best VPNs for Streaming in 2024 (TechRepublic) But, if you want a VPN that works out-of-the-box for streaming services, other options like ExpressVPN, NordVPN, or Surfshark VPN might offer a more seamless experience. TorGuard VPN’s pricing TorGuard VPN pricing is divided into two plans, Standard and Pro. Each has monthly and annual billing options. Below is a table summarizing how the pricing plans compare to each other. TorGuard VPN plans Anonymous VPN (Standard) Anonymous VPN (Pro) Monthly $9.99 per month $12.99 per month Annual $59.99 per year $69.99 per year Feature differences x8 Devices, Static IP Pool, Maximum Security, Maximum Speed x12 Devices, x1 Streaming IP, Maximum Security, Maximum Speed Regardless of which TorGuard VPN plan you choose, you’ll receive almost the same maximum security features. Features like access to 3,000 servers across 50 countries, and unlimited speeds and bandwidth are available in all plans. Some differences still exist between the TorGuard pricing plans. TorGuard VPN Pro plan offers a free dedicated IP and streaming option and can simultaneously connect to up to 12 devices, whereas the Standard plan falls short in those offerings and only allows eight simultaneous device connections. SEE: How to Create an Effective Cybersecurity Awareness Program (TechRepublic Premium) Also, as with most VPNs, the longer the billing plan you pick, the more money you will save on subscriptions. If you select the annual billing option in the TorGuard Standard plan, you will save up to 50% of the cost. That will amount to you paying $60 instead of $120 when calculated on a $10 monthly billing basis. The Pro plan, on the other hand, saves you about 42% of the subscription cost when you choose the annual billing option. I recommend the annual billing option if TorGuard is the right VPN service for your needs. That way, you can save substantial billing costs. Otherwise, go for the monthly payment option if you’re only testing the waters. SEE: The 5 Best VPNs with Free Trials in 2024 (TechRepublic) I advise you to use the seven-day money-back guarantee available in all the plans to test the product first before any long-term commitment. TorGuard VPN’s key features TorGuard VPN is known to have one of the fastest torrenting capabilities with no capped download speed. It also offers other useful VPN features like Stealth Protocol and Port Forwarding. TorGuard Stealth protocol Stealth VPN protocol makes it nearly impossible to block VPN usage, and this enables you to bypass deep packet inspection and overcome the toughest firewalls, even in countries that restrict VPN ports. TorGuard offers multiple Stealth VPN protocols for censored and strict countries or firewalls which include — SSTP protocols, OpenVPN obfuscation, and OpenConnect/AnyConnect. SEE: How Much Does a VPN Cost? + Savings Tips (TechRepublic) During testing, TorGuard’s Stealth protocol allowed me to bypass firewalls in China, Russia, and Turkey when I paired it with the Stealth proxy. Figure A: TorGuard Stealth connection Port forwarding Port forwarding allows you to open a port to the internet while connected to a VPN, so you can have remote access to software hosted on your network. This functionality is found in TorGuard’s member’s area, which allows you to quickly enable various port forward rules and apply whitelisted firewall settings to your port forward requests. SEE: 6 Best Anonymous (No-Log) VPNs for 2024 (TechRepublic) However, it is important to note that when exposing a port to the internet, make sure you secure the login to your software and allow only specific IPs to access the port remotely over the VPN. Figure B: TorGuard Remote IP TorGuard VPN ad blocking Ad blocking protects your privacy and plays a key role in strengthening your overall online security. By default, TorGuard VPN’s DNS relies on its internal VPN server DNS, but you can choose the “Ad Blocking DNS” option in the VPN client settings for added protection. TorGuard claims that this feature is regularly updated to ensure ongoing effectiveness. SEE: The 6 Best Small Business VPNs for 2024 (TechRepublic) While TorGuard’s ad blocking is an excellent privacy tool, pairing it with other strategies enhances your security even more. I recommend using privacy-focused browsers

TorGuard VPN Review: The Good, The Bad, The Ugly Read More »

8 Best Construction CRM Software

Best for creating and sending quotes and invoices: Jobber Best for tracking projects through a pipeline: Pipedrive Best CRM tool with construction integrations: Capsule Best for design coordination and collaboration: Procore Best CRM tool for field and D2D sales management: SalesRabbit Best for marketing and ongoing support: HubSpot Best for scheduling and tracking calendar tasks: monday CRM Best AI-powered CRM software for customization: Salesforce Construction companies, agencies, and general contractors can all greatly benefit from implementing a customer relationship management tool. The software can act as a hub for all client information as well as facilitate collaboration between architects, site managers, and builders. In addition to basic project management features, the CRM software can also track invoicing, quotes, and payments. 1 monday CRM Employees per Company Size Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+) Any Company Size Any Company Size Features Calendar, Collaboration Tools, Contact Management, and more 2 Creatio CRM Employees per Company Size Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+) Medium (250-999 Employees), Large (1,000-4,999 Employees), Enterprise (5,000+ Employees) Medium, Large, Enterprise Features Dashboard, Document Management / Sharing, Email / Marketing Automation, and more 3 HubSpot CRM Employees per Company Size Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+) Micro (0-49 Employees), Small (50-249 Employees), Medium (250-999 Employees), Large (1,000-4,999 Employees) Micro, Small, Medium, Large Top construction CRM software comparison The top general CRM providers typically offer process management, integrations and other general core features. The main features a construction company might look for in any CRM tool include project management and tracking, mobile application or invoice management. Since a construction business may require more niche features, some of the most popular providers offer specialized versions of their software or help customize their tool to meet the precise needs of the construction industry. Software Star rating Project management Native or third-party integrations Document and design tracking Mobile app Invoicing and quote management Starting price* Jobber 4.1/5 Yes Third-party only Yes Yes Yes $49 per month for 1 user, $29 for additional users Pipedrive 4/5 Yes Third-party only Yes Yes Limited $14 per user per month Capsule 3.9/5 Yes Third-party only Limited Yes Limited $18 per user per month Procore 4/5 Yes Third-party only Limited Yes Yes Contact for quote SalesRabbit 3.9/5 Yes Both Limited Yes Limited Free starting price HubSpot 4/5 Yes Both Yes Yes Yes Free starting price monday CRM 3.5/5 Yes Third-party only Yes Yes Limited $12 per user per month Salesforce 4.3/5 Yes Both Yes Yes Yes $25 per user per month *Starting premium price, when billed annually. Jobber: Best for creating and sending quotes and invoices Image: Jobber Jobber is an easy-to-use field service management tool with additional business operations software. Jobber allows users to build quotes in minutes, price jobs with precision, automate quote follow-ups and more. The quote builder tool keeps the customer in mind with professional and concise quotes and invoices. The software also offers consumer financing with a Wisetack integration, allowing clients to pay over time. Why I chose Jobber Jobber serves over 50 home service industries by offering a platform where businesses can stay on top of requests from prospects, create quotes, schedule and manage jobs, and even make it easy to accept payment. These job tracking and customer communication tools make it a great option for small to mid-sized businesses looking for an industry-specific solution. Jobber’s features make it perfect for general contractors but if you’re interested in a more scalable platform to fit your business size, consider looking into SalesRabbit or Salesforce. Pricing Core: $49 per month, billed annually, or $69 per month, billed monthly. This grants access for one user plus 24/7 self-service hub, job management and quoting tools. Connect: $129 per month, billed annually, or $169 per month, billed monthly. This supports up to five users, digital payments and automated invoice reminders. Grow: $249 per month, billed annually, or $349 per month, billed monthly. This tier supports up to 15 users, two-way message, QuickBooks online, job costing and more. Features Credit card processing: Process payments with convenient payment options, automatic billing and instant payouts from the office or from the field. Time tracking: Automatically track visit times to maintain accurate and up-to-date timesheets. Lead management: Tag prospects as leads to manage them separately from active clients. This tool also integrates with Mailchimp and QuickBooks Online. Sample invoice shown through desktop and mobile app. Image: Jobber Jobber pros and cons Pros Cons 14-day free trial. Limited features available in the Core plan. Free product coaching. Premium add-ons are costly. 20+ built-in reports. Users report limited advanced and custom analytics. Pipedrive: Best for tracking projects through a pipeline Image: Pipedrive Pipedrive is a scalable CRM tool that offers a mixed bag of features for pipeline management, activity tracking, reporting analytics and more. Businesses can create custom pipelines with a highly user-friendly interface to visualize every part of their sales and building process. Pipedrive is also a cloud-based CRM solution that enables users to view contact information, project processes and contact suppliers wherever they have internet access. This way, project managers, site managers and contractors all know the status of each ongoing project. Why I chose Pipedrive Pipedrive is a popular and innovative sales software that offers niche offerings for certain industries like automotive sales, banking and more. Its general tools can be scaled up or down to fit the size of any business, from startups to enterprises in need of a straightforward tool. Pipedrive is a great general CRM software with an intuitive interface, if you’re a contractor or independent contributor wanting a similar option with a free tier, check out Capsule. Head over to our Pipedrive review for more information. Pricing Essential: $14 per user per month, billed annually, or $24 per user, billed monthly. Essential tier offers custom fields, data importing and exporting, product catalogs and more. Advanced: $34 per user per month, billed annually, or $44 per user, billed monthly. This tier includes everything in

8 Best Construction CRM Software Read More »

What It Costs to Hire a Hacker on the Dark Web

The Dark Web is home to illegal and criminal products and services up for sale — and that certainly encompasses the area of cybercrime. From website hacking to DDoS attacks to custom malware to changing school grades, you can buy one of these services from a hacker for hire. But just how much do these types of items cost? In this article, I examine various sources to show you the costs of hiring a hacker on the Dark Web. The idea is not to tempt you into a life of crime but to reveal the latest findings and improve your cybersecurity knowledge. SEE: The Dark Web: A Guide for Business Professionals (Free PDF) (TechRepublic) 1 Semperis Employees per Company Size Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+) Large (1,000-4,999 Employees), Enterprise (5,000+ Employees) Large, Enterprise Features Advanced Attacks Detection, Advanced Automation, Anywhere Recovery, and more 2 ESET PROTECT Advanced Employees per Company Size Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+) Any Company Size Any Company Size Features Advanced Threat Defense, Full Disk Encryption , Modern Endpoint Protection, and more 3 NordLayer Employees per Company Size Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+) Small (50-249 Employees), Medium (250-999 Employees), Large (1,000-4,999 Employees), Enterprise (5,000+ Employees) Small, Medium, Large, Enterprise Hiring a hacker Before I examine the costs, just a brief word on how easy it is for nefarious individuals to find a hacker. According to research from accounting and consulting firm Crowe, “hacker-for-hire services are available in abundance on the Dark Web.” Payments are usually made using cryptocurrency assets to provide the highest level of anonymity. If you’re wondering how big the Dark Web is, then cybersecurity software company Avast explains, “It’s difficult to measure dark web statistics, but it’s estimated that there are tens of millions of URLs on the dark web and tens of thousands of active dark web websites, including thousands of forums and marketplaces.” These alarming facts mean the recruitment process is going to be fairly easy. There are many places to find hackers who are all eager to do unseemly business. SEE: Dell Unveils AI and Cybersecurity Solutions at Microsoft Ignite 2024 (TechRepublic) DDoS attacks Hackers who offer distributed denial-of-service attacks can charge as low as $10 or as high as $750. Based on data from Privacy Affairs’ Dark Web Price Index 2023, $10 would buy you  DDoS attacks on an “Unprotected website, 10-50k requests per second, 1 hour.” If it were a “premium protected website,” then a 24-hour attack would cost around $170. Some hackers will charge by the hour or even by the month to maintain an attack for as long as the buyer wants. Certain hackers will change search engine results to raise or lower a site’s rankings. Others will remove a post that the buyer made on a social network. Some hackers will audit a website’s security, seemingly to show the owner where any vulnerabilities exist. SEE: Cybersecurity: Benefits and Best Practices (TechRepublic Premium) Personal attacks Hackers specializing in personal attacks sell their services for $10 to over $600. A personal attack could include financial sabotage, legal trouble, or public defamation. One tactic touted by a hacker is to frame the victim as a buyer of child pornography. A few hackers offer such services as “scammer revenge” or “fraud tracking,” in which they attack a scammer. Analysis from Crowe, whose team encountered a “hacker-for-hire services menu,” states that gaining access to personal information, addresses, phone numbers, emails, and relatives’ names will, on average, cost $600. The Dark Web Price Index 2023 says a U.S. passport scan could cost as low as $50, which is the price of forged documents. Must-read security coverage Website hacking Website hacking includes attacks against websites and other services hosted online. Hackers can access an underlying web server or a website’s administrative panel. Others can steal databases and administrative credentials. Crowe’s investigation reveals that website and database hacking costs, on average, $1,200. This kind of activity might entail gaining access to the admin dashboard or backend. Computer and phone hacking Based on Crowe’s findings, a computer and phone hacking service runs $950 on average. In this type of attack, the hacker breaks into the victim’s PC or phone to steal data or deploy malware. The operating system doesn’t seem to matter as they boast that they can access Windows, macOS, Linux, Android, or iOS. SEE: Everything You Need to Know about the Malvertising Cybersecurity Threat (TechRepublic Premium) Social media account hacking Hacking into a social media account can range from $20 to $500+. In this service, the hacker will spy on or hijack accounts from such platforms as WhatsApp, Facebook, social platform X, Instagram, Skype, Telegram, TikTok, Snapchat, and Reddit. The malicious activity depends on the service. Criminals who hack into a victim’s Facebook or X account will often steal credentials to give the buyer full access to the account. Those who tap into an account from WhatsApp will likely spy on messages or take screenshots. Email hacking According to Crowe’s data, email hacking sells for $700 on average. In this activity, the hacker steals the victim’s email password and then either gives that password to the buyer or breaks into the account to access data. In some cases, the criminal may set up an email forwarded process to get a copy of all the victim’s emails. SEE: Engaging Executives: How to Present Cybersecurity in a Way That Resonates (TechRepublic) Changing grades Students who want a higher grade can actually pay someone to hack into a school system and alter their grades. Available for both grade schools and universities, this is one of the most common hacking services and one of the most expensive. As a sideline, some hackers also say they can steal the answers to future exams. So, that means a student can get an A+ for exam results but an F- for ethical behavior. According to Crowe, hackers offer access to databases for grading software managed

What It Costs to Hire a Hacker on the Dark Web Read More »

CISA, FBI Release Guidance for Securing Communications Infrastructure

On Dec. 3, the Federal Bureau of Investigation, the Cybersecurity and Infrastructure Security Agency, and international partners issued guidance on strengthening systems against intrusions by threat actors targeting telecommunications. The guidance was informed by recent breaches affiliated with the Chinese government. The recommendations come weeks after the FBI and CISA identified that China-affiliated threat actors had “compromised networks at multiple telecommunications companies.” Initially, the breaches were believed to target specific individuals in government or political roles. However, on Dec. 3, the FBI clarified that these individuals may not have been the intended targets but were instead “swept up” in the operation. T-Mobile was allegedly one of the affected companies. “Threat actors affiliated with the People’s Republic of China (PRC) are targeting commercial telecommunications providers to compromise sensitive data and engage in cyber espionage,” Assistant Director Bryan Vorndran of the FBI’s Cyber Division, said in a press release. “Together with our interagency partners, the FBI issued guidance to enhance the visibility of network defenders and to harden devices against PRC exploitation.” SEE: Live: AWS re:Invent brings new AI infrastructure, foundation models, and more. Must-read security coverage Guide includes recommendations for improving visibility and hardening security The guide focuses on enhanced visibility — defined as “organizations’ abilities to monitor, detect, and understand activity within their networks” — and hardening systems and devices. Strengthening monitoring includes: Implementing comprehensive alerting mechanisms to detect unauthorized changes to your networks. Using a strong network flow monitoring solution. Limiting exposure of management traffic to the Internet, if possible, including restricting management to dedicated administrative workstations. “Hardening systems and devices” covers many aspects of securing device and network architecture. This advisory section is split into two subsections: protocols and management processes and network defense. These recommendations include: Using an out-of-band management network physically separate from the operational data flow network. Employing a strict, default-deny ACL strategy to control inbound and egressing traffic. Managing devices from a trusted network rather than from the internet. Sending all authentication, authorization, and accounting (AAA) logging to a centralized logging server with modern protections. Disabling Internet Protocol (IP) source routing. Storing passwords with secure hashing algorithms. Requiring multi-factor authentication. Limiting session token durations and requiring users to reauthenticate when the session expires. Using role-based access control. FBI and CISA recommend disabling a host of Cisco defaults The report also provides guidance for using Cisco-specific devices and features. It states that Cisco operating systems are “often being targeted by, and associated with, these PRC cyber threat actors’ activity.” For those using Cisco products, the FBI and CISA have a laundry list of recommendations for disabling services and how to safely store passwords. Namely, IT and security professionals in vulnerable organizations should disable Cisco’s Smart Install service, Guest Shell access, all non-encrypted web management capabilities, and telnet. When using passwords on Cisco devices, users should: Use Type-8 passwords when possible. Avoid using deprecated hashing or password types when storing passwords, such as Type-5 or Type-7. Secure the TACACS+ key as a Type-6 encrypted password if possible. The guide goes hand in hand with Secure by Design principles. “The PRC-affiliated cyber activity poses a serious threat to critical infrastructure, government agencies, and businesses,” said CISA Executive Assistant Director for Cybersecurity Jeff Greene. “This guide will help telecommunications and other organizations detect and prevent compromises by the PRC and other cyber actors.” The full list of recommendations can be found in the guide. source

CISA, FBI Release Guidance for Securing Communications Infrastructure Read More »

The State of Australian Data Centres Amid the AI Revolution

Gavin Dudley launched his IT career by selling internet services to business customers — a role that offered a front-row seat to the transformative power of emerging technology. Reflecting on those early days, he recalls a conversation that serves as a cautionary tale for businesses today that underestimate the inevitable impact of AI on their future. “I remember talking to a guy that owned a couple of panels beating stores,” Dudley recalled in a conversation with TechRepublic. “He said to me: ‘I will never need the internet, don’t talk to me about the internet, it will never impact my business.’ Well, I think it’s a bit like that with AI at the moment. And AI is going to impact every business.” Now VP of sales at Macquarie Data Centres, an Australian data centre company, Dudley said the AI boom is only “just beginning.” He believes that significant amounts of AI will be deployed in the next 10 years. The result? The Australian market, like the rest of the world, is going to have huge data centres that need to be met. What are the key trends in data centre construction? As the AI boom gains momentum, the demand for massive computational power is reshaping the infrastructure behind it. Cutting-edge data centres are serving as the backbone of this technological revolution. In Australia, the need for AI processing is leading to deploying powerful — and hotter — GPUs in data centres. Dudley said the shift in hardware had caused a move toward “fungible” data centre construction, which allows operators to pivot between air and liquid cooling depending on the computing being used. “We’ve spent some time in the U.S. working with people that are already running genuine AI clusters,” Dudley said. “We’re seeing a [data centre] structure look more like three racks or four racks of high-performance computing, and then up to 12 racks of storage and CPUs.” SEE: AI Causing Data Centre Power and Cooling Conundrum in Australia This computing mix creates a blended need for air and liquid cooling. Dudley said data centre halls also need to be designed beyond the 100% cooling capacity of the past, toward 140-150% cooling capacity. He explained that this provides the flexibility of pivoting between air and liquid cooling techniques. Macquarie Data Centres, which is currently building a new AUD $350 million IC3 Super West data centre in Sydney, is also designing Australian government security protocols, as the company anticipates AI platforms will need to be “severely locked down” to safeguard sovereign AI security and value. More about data centers How are customers approaching data centre needs? Macquarie Data Centres predicts that increasing customer demands for AI will require more capacity from hyperscale cloud providers. However, the high costs of extensive computing in cloud environments may drive more enterprises to invest in their own platforms. “That’s going to drive both the hyperscale cloud and a new breed, a new round of internal infrastructure that companies will go and buy to implement,” Dudley said. “At present, Macquarie Data Centres is seeing different types of customers with different needs for data centres in Australia” Hyperscale cloud providers Hyperscale cloud providers now have their own immense hunger for power and space, driven by the rapid growth of AI applications and cloud services. Their needs are “through the roof,” Dudley said, with some providers in the market now willing to purchase any capacity available in strategic locations. They are pursuing a blended approach: investing in their own purpose-built facilities, partnering with co-location providers, and commissioning build-to-suit data centers tailored to specifications. Dudley said hyperscalers are now planning five to 10 years in advance to secure the resources they need. Government agencies Government clients are currently only “dabbling” in AI, with most federal agencies relying on SaaS and hyperscale cloud services rather than investing heavily in their own infrastructure. However, defense and other large government agencies are now beginning to procure AI capacity to support critical operations. SEE: AI Surge Could Trigger Global Chip Shortage by 2026, Research Finds Private sector enterprises Dudley said many large “stealth projects” are underway in large enterprises in Australia. These projects involve securing infrastructure by engaging with high-performance compute OEMs backed by chip manufacturers. He said the rest of the local Australian enterprise market is still experimenting with AI and leveraging the hyperscale cloud to do so. This computing is happening at a “super premium rate” as organisations build out strategies for utilising AI in the future. What role will sovereign AI have in Australia’s future? Macquarie Data Centres expects the sheer value held in AI models in the future to prompt regulation around protecting this intellectual property in sovereign data centres. Dudley explained that business AI models, as they learn and grow, will become increasingly valuable assets and central to business value. Australia will also have compelling reasons to develop sovereign AI models locally: Culture: Reliance on offshore AI models could dilute Australian values, delivering decisions influenced by foreign norms rather than reflecting local societal and cultural principles. A sovereign AI approach will ensure technologies align with Australian community values and support a strong national identity. AI ecosystem: Sovereign AI could drive productivity, foster local AI development, and position Australia to reap the benefits of innovation in AI, Dudley said. By cultivating in-country AI expertise and infrastructure, Australia could stimulate growth and maintain its competitiveness in the global economy. SEE: Is it time for Australia to build its own LLM? Security and governance: Locally hosted AI ensures Australian laws govern sensitive data such as medical records and personal information. This protects intellectual property and establishes clear legal accountability for AI-driven decisions — an essential safeguard for ethical and legal integrity. Government leadership may be needed to foster a strong sovereign AI ecosystem, Dudley said, including clarification of AI regulatory frameworks and investment to encourage local AI market innovation. To be ready for sovereign AI, data centre infrastructure will also need to be expanded and optimised for a mix of client

The State of Australian Data Centres Amid the AI Revolution Read More »

Meta to Face €550 Million Lawsuit in Spain

A date has been set for Meta to face a €550 million lawsuit in Spanish court next year. The Association of Information Media, representing 90 Spanish media outlets, accuses Facebook’s parent company of violating E.U. data protection laws. Meta allegedly built its advertising empire by unlawfully collecting and using European users’ personal data without their explicit consent between May 2018 and July 2023, violating the General Data Protection Regulation. According to Regulation (EU) 2016/679, user consent must be granted before processing their personal data for advertising purposes, but Meta has ignored this. AMI contends that 100% of Meta’s revenue from targeted advertising was earned with data obtained through “systemic and massive non-compliance.” This gave it an illegitimate advantage when selling digital advertising space, jeopardising smaller media outlets in Spain. The sum being demanded is compensation for their lost revenue. AMI argues that Meta’s dominance in the industry has prevented the fair monetization of news content from media companies. It filed the lawsuit late last year, with the preliminary hearing taking place on Nov. 27, 2024. Trial sessions are scheduled for Oct.1-2, 2025. Must-read big data coverage E.U. is fighting a years-long battle against Meta’s data processing policies Mark Zuckerberg’s company has been embroiled in a series of similar fines levied by the E.U. in recent years. Unions representing television and radio in Spain have also filed a €160 million suit for the same reason as AMI. In January 2023, the E.U.’s Ireland-based Data Protection Commission levied over $400 million in fines after ruling that E.U.-based users have been illegally forced to accept personalized, targeted ads from both Facebook and Instagram. SEE: Apple Must Pay Back €13 Billion in Unpaid Taxes to Ireland, E.U. Court Rules Meta agreed to change its practices regarding how it processes some user data in the region in March, but this was not enough for the European Data Protection Board. In November, the board banned Meta’s data processing practices for targeted advertising in the European Economic Area. Meta conceded by introducing a subscription option that removes targeted ads entirely from Facebook and Instagram for European users, starting at €13 a month on mobile. The fee was intended to recoup the financial losses it would feel if many European users did not consent to targeted ads. However, on July 1 this year, the European Commission ruled that this amounted to a “pay or consent” advertising model and violated its Digital Markets Act on a preliminary basis. The authority claimed that Meta essentially “forces” users to consent to their data being used for advertising and does not provide a less personalised, free equivalent service for those who don’t consent. Last month, Meta started allowing users in the E.U. to opt to see less personalised adverts on Facebook and Instagram to appease regulators. In its announcement, the tech giant said that the E.U.’s ad-related demands go “beyond what is required in the law,” but it is relenting regardless. The European Commission also fined Meta nearly €800 million for restricting competition by tying Facebook Marketplace, its classified-ad service, to Facebook and using non-public advertising data from its competitors. Why is Meta conceding to these regulations? In recent years, the E.U. has worked hard to protect citizens’ digital autonomy and hold large tech companies accountable for their data collection and privacy practices. Meta has spent much time in its crosshairs, as Facebook and Instagram rely heavily on user data collection to conduct behavioural analytics and granularly target advertising campaigns. Much of these platforms’ revenue comes directly from the clicks and engagement targeted ads generate. Thus, losing a segment of user data as big as the E.U.’s 27-nation bloc’s population could mean major trouble for their continued growth, so Meta has a financial interest in conceding with the E.U.’s demands. In the third quarter of this year, 23.5% of its advertising revenue was generated by European users. SEE: Google Abusing Dominant Position in Ad Tech Sector, Says U.K. Government Meta has not conceded to every challenge regarding its alleged anticompetitive practices Elsewhere, Meta has retaliated against regulations that could restrict its power over the media industry. In 2021, it temporarily blocked content from Australian news outlets from being shared on Facebook after the country’s government voted for digital platforms to compensate news publishers for their content. The tech giant has also suggested the ban may return if the law is applied. Indeed, Meta enforced the ban in Canada last year after a similar act was enforced. However, not every attempt to curb its alleged anticompetitive practices has been met with such aggression. In August, the U.K.’s Competition and Markets Authority approved Meta’s revised approach to handling advertising customers’ data, introduced in response to an investigation into whether it had been using the data to unfairly benefit its own services. source

Meta to Face €550 Million Lawsuit in Spain Read More »

How to Mass Delete Emails on Gmail: Best Way to Declutter

Having an email inbox full of read, unneeded messages can cause problems, especially in the Gmail mobile app. When you have thousands of emails, the Gmail app search function can get bogged down. In addition, all those obsolete emails require storage space, and soon, Gmail will force you to delete emails to free up storage or upgrade to a paid subscription. SEE: Gmail vs Google Workspace: Key Differences for Users & Businesses So, what do you do? I’m going to show you a handy trick for mass deletion. Unfortunately, this only works on web-based Gmail. Using the Gmail app, you can select several messages by selecting them one at a time and then deleting all the selected messages. The good news is that your Gmail app will thank you for taking care of this. What you’ll need The only thing you need is a Google account and a Gmail inbox filled with read emails that you don’t need to keep. If you have read emails that you want to keep, mark them as unread or move them to another folder; otherwise, they will be deleted. How to delete many read messages at once Open Gmail, click the “Select” dropdown and then choose “Read” from the dropdown. This will select the read messages in your inbox, but not all of them; more about that later. Select “Read” messages. Image: TechRepublic After selecting the read messages, Gmail will display contextual options and highlight the selected messages. To delete the highlighted messages, click the “Delete” option. That icon resembles a trash can, as seen below. Click “Delete” to move the highlighted messages to the Trash folder. Image: TechRepublic More Google news & tips How to delete more messages at the same time For better or worse, Gmail doesn’t allow users to delete more than a few messages at a time. They claim the limit protects you from hackers. But once you’ve amassed thousands of messages, deleting them all will take some time — and there’s no way around it. When deleting read messages, you must be aware that you’re selecting and subsequently deleting the page. By default, Gmail displays 50 messages per page. When selecting messages, Gmail works with the current page, not all of your email messages. In other words, if Gmail displays 50 messages per page and you have 30 read messages on the current page, the selection method will delete 30 messages. You might have 10,000 read messages, but Gmail will delete the 30 selected messages on the current page. SEE: How to recover a Google account Fortunately, there is another option, but it too might require some time to get things in order before using it: Choose “All” from the “Select” dropdown. Doing so displays the link “Select All x conversations” in “Primary.” To remove all messages in the “Primary” tab, click that link and click Delete. Confirm the delete bulk to move all of your email messages to the Trash folder. Delete “All” email messages. Image: TechRepublic Before using this method, you’ll want to move messages you want to keep to another folder — and that’s problematic. Finding a selection or search method to select messages to find messages you don’t want to delete can become messy and tedious. You’re also opening yourself up to errors; it’s easy to miss important messages you should keep. Gmail users often report that the results of this bulk delete are a bit sticky — the messages disappear but then reappear later. I suspect these bulk delete requests are too large and are ultimately released by the server uncommitted. Narrowing the selection to smaller batches might help, but doing so requires temporarily moving messages. It’s certainly not a silver bullet by any means. How to delete old messages using a date search If you’re still dealing with large numbers of messages that you can’t quickly delete, consider deleting older messages by specifying a benchmark date in a search. For example, if you want to delete all messages that are a month old and the current date is June 25, 2023, you’d enter the search string before 05/25/2023. Once Gmail highlights those messages, click Delete. Use a date search to select old messages. Image: TechRepublic If the messages reappear, reduce the selection size by changing the search date. You might need to run a few batches, but doing so might still be faster than deleting read messages by page. Deleting to reclaim storage If you’re deleting to reclaim storage space, you must permanently delete messages in the Trash folder. In addition, don’t forget about the Promotions and Social tabs — you’ll want to clean up those folders occasionally. SEE: Google Steps Up The Battle Against Gmail Spam And that’s how you delete emails in bulk in Gmail. Enjoy that reclaimed space and more efficient Gmail app searching. Keep in mind that we’ve reviewed only a few possibilities. Once you become more familiar with selecting and searching, you will find ways that are more meaningful to you. Other tips for maintaining a clean inbox Set up filters To set up filters in Gmail and keep your inbox organised, go to “Settings” by clicking the gear icon, followed by “See all settings,” “Filters and Blocked Addresses,” and “Create a new filter.” In the pop-up window, define your criteria by specifying sender, recipient, subject, keywords, size, or attachments. Once done. Click “Create filter” and choose actions like archiving, marking as read, applying labels, or deleting emails. For example, you can filter newsletters to skip the inbox, acquire a “Promotions” label, and then go directly into a “Promotions” folder. Unsubscribe from any unwanted newsletters Unsubscribing from unwanted newsletters within Gmail is as simple as opening up a newsletter email and clicking the “Unsubscribe” link either near the sender’s name at the top or the bottom of the message. Clicking it will either unsubscribe you directly or redirect you to the sender’s website to confirm. Alternatively, you can create a filter to delete future emails from that

How to Mass Delete Emails on Gmail: Best Way to Declutter Read More »

Call Center Software Pricing: How to Accurately Calculate Cost

Whether you’re getting call center software for the first time or you’re looking to compare prices for alternative options, there are a lot of factors that go into call center software pricing. This guide covers everything to keep in mind so you know what to expect. 1 RingCentral RingEx Employees per Company Size Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+) Medium (250-999 Employees), Large (1,000-4,999 Employees), Enterprise (5,000+ Employees) Medium, Large, Enterprise Features Hosted PBX, Managed PBX, Remote User Ability, and more How much does call center software cost? Call center software ranges from $60 to $200+ per agent per month. This is quite a big range and doesn’t necessarily tell the full story. It’s like asking how much a car costs or how much it costs to build a house. You can get an idea of what you’ll pay, but that won’t be enough information to know how much you’ll end up paying when it’s all said and done. Factors that influence call center software pricing There are a lot of elements that will impact call center software pricing. You can use the sections below to help you find a more exact cost, or at least a closer estimate. Software provider Providers can charge whatever they’d like. It can vary significantly from one to the next. Here’s how much a few of the best call center software providers charge to show you want I mean: RingCentral — Starts at $65 per agent per month. Dialpad — Starts at $80 per agent per month. Nextiva — Starts at $129 per agent per month. Five9 — Starts at $175 per agent per month. These are the starting rates for each provider’s cheapest plan. Everything goes up from there and depends on a wide range of other factors. Call volume Most providers charge usage-based fees on their call center plans. These are typically billed per minute. How much you pay per minute often depends on call volume and the type of call. For example, RingCentral’s base monthly price per agent includes unlimited domestic inbound minutes but you have to pay for outbound calls. Nextiva offers both agent-based pricing and usage-based pricing, with rates starting at $0.018 per minute. Some also charge different rates for inbound and outbound calls. Others offer unlimited inbound minutes, but you’ll pay a fee if the caller dials your 800 toll-free number. SEE: Check out our RingCentral review and Nextiva review to learn more about our favorite call center solutions.  VoIP vs. on-premise deployment On-premise deployments require significant up front investments, easily crossing the $10,000 to $20,000 mark if you have no infrastructure in place. You’ll need on-site servers, networking components, other hardware, and space to put it all. While your ongoing usage costs may be lower per month, you’ll need to consider ongoing maintenance and hiring staff to manage your system. Cloud-based VoIP systems are much easier to set up and use. Plus, they usually have no up front costs. Call center vs. contact center The terms “call center” and “contact center” are often used interchangeably, but they aren’t the same thing. A true call center just refers to voice-based calling capabilities. Modern call center software comes with loads of other features, but calling is the primary function. Contact centers usually include voice, but they often include other communication options — like live chat, SMS messaging, social media, ticket support, and more. Omnichannel contact center software costs more than voice-only call center solutions. The only instance where a contact center could cost less is if the voice component is removed altogether and you’re just using a basic helpdesk software to manage ticket support. Tools like LiveAgent offer this for just $15 per agent per month. SEE: Learn more about call centers vs contact centers.  Phone numbers Instead of paying per number, you usually will pay per agent instead. A main call center line will likely be included, and callers will be routed to the right agent based on your call routing rules. That said, you’ll need to pay extra if you want to purchase additional lines, 800 toll-free numbers, or vanity numbers. RingCentral, for example, charges a one-time $30 setup fee to purchase toll-free and vanity numbers and then $4.99 per month to maintain the number. This is a solid deal, as most other providers tend to charge $10 to $15 per month for toll-free numbers. Features and add-ons Call center software comes with a lot of features. In most cases, many of them are only available on higher tiers or as add-ons. You’ll likely need to upgrade or pay extra for things like: Power dialers. Auto dialers. Progressive dialers. Gamification features. IVR with speech recognition. Workforce management features. Live call monitoring. Call recording. Additional cloud storage. AI-powered customer satisfaction scores. AI call transcriptions. Built-in payments. Real-time AI agent assist. Most of these are more useful for larger teams who can afford the higher costs associated with unlocking them. However, every provider has different plan structures that include different features. You may be able to save a bit of money on a lower plan with one provider while another requires you to be on a higher tier. International rates International calls are typically charged based on usage. The per-minute rate varies depending on the country you’re calling. Some call center software providers have specialized international plans that can help you save some money if you’re planning on making a high volume of calls to a particular country or region. Zoom and 8×8, for example, both offer international options to help keep costs low. SEE: Read our Zoom Phone review and 8×8 review to learn more.  Integrations Many call center software providers limit integrations to higher tiers. Some may also require you to pay extra to use them. For example, integrating with your CRM is an important part of getting the most out of both pieces of software. In some cases, the two tools may have a pre-built integration you can take advantage of.

Call Center Software Pricing: How to Accurately Calculate Cost Read More »

Bitwarden Review (2024): Is It a Safe Password Manager?

Bitwarden fast facts Our rating: 4.6 stars out of 5Pricing: Starts at $0.83 per monthKey features Free version with unlimited password storage. Affordable subscription plans. Encrypted file-sharing system. Bitwarden is an open source password manager that offers a generous free version, an impressive privacy and security architecture, and affordable pricing across the board. Its free version is one of the most complete offered by password managers, making it an enticing option for those on a tighter budget. While its desktop application isn’t the most intuitive, its overall package still makes it one of the top password management apps today. NordPass Employees per Company Size Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+) Micro (0-49 Employees), Small (50-249 Employees), Medium (250-999 Employees), Large (1,000-4,999 Employees), Enterprise (5,000+ Employees) Micro, Small, Medium, Large, Enterprise Features Activity Log, Business Admin Panel for user management, Company-wide settings, and more Dashlane Employees per Company Size Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+) Micro (0-49 Employees), Small (50-249 Employees), Medium (250-999 Employees), Large (1,000-4,999 Employees), Enterprise (5,000+ Employees) Micro, Small, Medium, Large, Enterprise Features Automated Provisioning ManageEngine ADSelfService Plus Employees per Company Size Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+) Any Company Size Any Company Size Features Access Management, Compliance Management, Credential Management, and more Is Bitwarden free? Yes, Bitwarden has a dedicated free forever version. Bitwarden’s Free Plan is one of the best free password managers available, as it offers unlimited passwords and access for an unlimited number of devices. This is in contrast to some password managers, such as Dashlane, whose free version only allows access on one device at a time and only stores 25 passwords. Bitwarden’s Free Plan comes with all of Bitwarden’s core password management features, such as zero-knowledge encryption, username and password generator, and two-step logins. However, it doesn’t come with Bitwarden’s 24/7 email support, emergency access, and encrypted file attachments like the paid subscriptions. Bitwarden’s free tier is one of the most complete free versions available. It’s perfect for users on a tight budget wanting a fully-functioning password management system. SEE: Bitwarden Free vs Premium: Which Plan Is Best for You? (TechRepublic) Bitwarden pricing Bitwarden offers pricing plans for both personal and business use. Personal plan pricing Personal Plan Free Premium Families Price $0 Around $0.83 per month ($10 billed annually) $3.33 per month Sharing vault items with other users 2 users 2 users 6 premium accounts Bitwarden Send (encrypted sharing) Text only Text and Files Text and Files Two-step Login Email, Authentication App, Hardware Security Key Yubico OTP, Duo, Hardware Security Key, Email, Authentication app Yubico OTP, Duo, Hardware Security Key, Email, Authentication app Emergency Access No Yes Yes Aside from having a strong free version, Bitwarden continues to be a great value option with its affordable pricing for its personal plans. As premium subscriptions range from $1.66 (RoboForm) to $4.99 (Dashlane) per month, Bitwarden Premium offers a yearly fee of just $10 per year, or around $0.83 per month, to be exact. This makes Bitwarden one of the most affordable password managers available. Given the lower price, I would say Bitwarden Premium isn’t the most feature-packed password manager. It lacks extra features like Dashlane’s built-in VPN or 1Password’s more polished user interface. However, you are getting the fundamental features you need at a very affordable price. For first time users, I recommend trying out Bitwarden’s free version. It’s easy to set up and gives you a decent feel for their service. It also helps that upgrading to a premium version isn’t that expensive either. Business plan pricing Business Plan Teams Enterprise Price $4 per user, per month $6 per month/ per user No. of users Unlimited Unlimited users Self-host Option No Yes Passwordless SSO Integration No Yes Policies No Yes Bitwarden’s business-tailored Teams plan falls within the usual pricing compared to the competition. You get 10 users, all of Bitwarden’s core and premium features, event and audit logs, user groups, and a directory connector. In 2023, Bitwarden’s Teams plan was actually called Teams Starter and was priced at $20 per month for up to 10 users. In 2024, it’s now just called Teams and is priced per user at $4 per month. It maintains the same feature set, such as all Bitwarden premium features, event and audit logs, and user groups.  While I personally like how Teams is now priced at a per user basis, which can be great for businesses that don’t necessarily need all 10 seats filled, it’s unfortunate that it’s now also double the price. This means that the same 10 users would be priced at $40 per month. If you’re looking for a more affordable subscription for your small team, 1Password’s Team Starter Pack is priced at $19.95 per month for up to 10 users. Thankfully, Bitwarden’s cost-effective Enterprise subscription at $6 per month, per user was retained from last year. When compared with other business-to-enterprise level plans, it still sits as one of the more affordable options. LastPass’ Business plan is priced at $7 per month; while 1Password’s Business subscription is at $8 per user, per month. For features, self-hosting and passwordless SSO integration are only available on Bitwarden’s Enterprise subscription. You get unlimited users, policies, account recovery administration, and free Families Plan for users. Overall, Bitwarden’s affordable pricing on most of its subscriptions is one of its strongest features. If you want an affordable password manager that doesn’t skimp out on key features, Bitwarden is a great pick. Is Bitwarden really secure? More about Cloud Security Yes, Bitwarden is a safe password manager. It operates on a zero-knowledge architecture, which means that the end-user is the only one with real access to their data. It’s also unique in that it is open source software, allowing the public to review their code and monitor it for any vulnerabilities. This is an amazing bit of transparency that I know privacy enthusiasts will find valuable. In addition, Bitwarden utilizes industry leading AES 256 encryption and undergoes

Bitwarden Review (2024): Is It a Safe Password Manager? Read More »

How To Implement Zero Trust: 4 Steps and Best Practices

A couple of years ago, organizations relied heavily on the traditional perimeter-based security model to protect their systems, networks, and sensitive data. However, that approach can no longer suffice due to the sophisticated nature of modern day attacks through techniques such as advanced persistent threat, application-layer DDoS attacks, and zero-day vulnerabilities. As a result, many organizations are adopting the zero trust approach, a security model based on the principle that trust should never be assumed, regardless of whether a device or user is inside or outside the organization’s network. While zero trust promises to be a more proactive approach to security, implementing the solution comes with several challenges that can punch holes in an organization’s security before it’s even in place. The core components of zero trust include least privileged access policies, network segmentation, and access management. While best practices can help improve the behavior of your employees, tools such as the device trust solutions will secure access to protected applications to build a resilient security infrastructure for an organization. 1 NordLayer Employees per Company Size Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+) Small (50-249 Employees), Medium (250-999 Employees), Large (1,000-4,999 Employees), Enterprise (5,000+ Employees) Small, Medium, Large, Enterprise 2 Twingate Employees per Company Size Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+) Medium (250-999 Employees), Large (1,000-4,999 Employees), Enterprise (5,000+ Employees) Medium, Large, Enterprise 3 ManageEngine AD360 Employees per Company Size Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+) Any Company Size Any Company Size Features Access Management, Active Directory Administration, Activity Dashboard, and more Understanding zero trust Zero trust isn’t only a set of tools or a specific technology. It’s a security philosophy that centers around the fundamental idea of not automatically trusting any user or system, whether they’re inside or outside the corporate network. In a zero trust environment, no user or device is trusted until their identity and security posture are verified. So, zero trust aims to enhance security by focusing on continuous verification and strict access controls. SEE: Recommendations for Implementing Zero Trust Security in a Hybrid Cloud Environment (TechRepublic Forums) Another key ingredient of the zero trust approach is that it operates on the principle of least privilege, meaning that users and systems are granted the minimum level of access needed to carry out their tasks. This approach cuts down the attack surface and limits the potential damage a compromised user or device can cause. Core components of zero trust Below are some key components of zero trust and best practices to make the most out of them. Access management Access management revolves around controlling who can access resources within an organization’s network. Here are some best practices for effective access management: Implement viable authentication: Implementing viable multifactor authentication mechanisms helps to ensure users are who they claim to be before being granted access to any resources within a network. A viable MFA usually involves a combination of two or more authentication methods, such as a password, facial recognition, mobile authenticator, or biometric checks. Leverage OAuth tools: Access management in zero trust can further be enhanced using OAuth (Open Authorization) tools. OAuth is an open standard for access delegation that provides a secure way for users to grant third-party applications and websites limited access to their resources without sharing their credentials. Employ device trust solutions: As an extra layer of protection between devices and company applications, device trust solutions integrate with OAuth tools to ensure the identity of the user and security of the device during the authentication flow. Implement role-based access control: RBAC is a crucial component of access management that involves assigning permissions to roles rather than individuals. With RBAC, it becomes easier for security teams to manage access across the organization and ensures employees are assigned specific permissions based on their job functions. Monitor user activity: User activities should be continuously monitored to detect anomalies and potential security breaches. Adopting user behavior analytics solutions can be beneficial in identifying unusual patterns of behavior that may indicate a security threat. Least privilege The principle of least privilege emphasizes that users and systems should have only the minimum level of access required to perform their tasks. Highlighted below are the best ways your organization can go about least privilege: Deny access by default: Implement a default-deny policy, where access is denied by default and only approved permissions are granted. This approach reduces the attack surface and ensures that no unnecessary access is given. Regularly review and update access permissions: A good least privilege practice involves reviewing and auditing user access to organizational resources to ensure permissions are aligned with job roles and responsibilities. Such practice also includes revoking access once an employee leaves the organization or has no need for access. Implement segmentation: Segmenting the network into isolated zones or microsegments can help contain the lateral movement of attackers within the network. Each zone should only allow access to specific resources as needed. Least privilege for admins: Admins are no exception to the principle of least privilege. So, efforts must be made to ensure the principle of least privilege cuts through administrative accounts. Doing this can help checkmate the possibility of insider attacks. Data protection The zero trust framework also emphasizes the need to secure sensitive data, both at rest and in transit, to prevent unauthorized access and data breaches. Here is how your organization can implement data protection: Choose strong encryption: Implement strong encryption protocols using the best encryption tools. Encryption should cover data stored on servers, databases, or devices, and data being transmitted over networks. Use industry-standard encryption algorithms and ensure encryption keys are managed securely with an encryption management tool that provides centralized management. Data classification: Data assets should be classified based on how sensitive and important they are to the organization. Apply access controls and encryption based on data classification. Not all data requires the same level of protection, so prioritize resources based on their value. Implement data loss prevention: Deploy DLP solutions to monitor and prevent

How To Implement Zero Trust: 4 Steps and Best Practices Read More »