Meet Laurie in one of the following places:

Boston area -- July 17-August 26, 2015

Boston, September 15-16, 2015

LeadingAge Boston November 1-4, 2015

Health 2.0, Santa Clara, CA, October 4-7, 2015

 

Related News Articles

07/31/2015

Study sponsored by United Health Care: Prepared but concerned about physical, mental challenges, survey finds.

07/24/2015

Technology can help people stay at home longer.

07/14/2015

A new study that suggests the start of middle age is no longer 45 or 50 but, instead, 60.

07/14/2015

At summit, experts discussed making technology accessible to seniors. A study on topic was also released by AARP.

Market Research Reports

Updated: (01-29-2015) Technology Market Overview Report Click here

Published: (06-20-2014) Challenging Innovators 2014 Report Click here

Published (03-08-2013) Next Generation Response Systems Click here

Updated (8-25-2012) Aging and Health Technology Report Click here

Updated (7-31-2012) The Future of Home Care Technology Click here

Published (2-14-2012) Linkage Technology Survey Age 65-100 Report Click here

Published (4-29-2011) Connected Living for Social Aging Report Click here

You are here

Hackers heaven - Our devices and software humiliate us

The Chinese military wants to get inside the Times and your devices. Never mind the NY Times – for your own good, don’t open that PDF. A wide variety of hackers want access to our individual computers, tablets, and phones – even Apple and Facebook are not immune. We walk into an office products or computer store and our enthusiasm for the latest gadget is limitless -- they must be fast enough to view video or to surf bloated websites. So we watch a demo and walk out of the store hundreds of dollars lighter. If the sales rep doesn’t tell us what to buy (extra set-up, patches and updates, virus protection software) and we don’t know any better, we arrive home with our virus-ready, hacker-friendly technology, all set to make us look like idiots to our contacts and colleagues as we send fake emails and phony porn links.

Tech SKUs are unfinished on the shelf, worse than knock-down furniture. The basic utilities that are packaged with commercial and consumer devices are subject to broad-based attacks: the browsers and document content tools invite malware from across the globe. Email with or without attachments is a threat. Even up-to-minute OS releases and updates don’t assure smooth operation. Not all updates address security: many also repair functional issues. So tech geeks spend hours and effort to update and it still isn’t enough. But if you don’t update, your risks are magnified -- and our negligence is noticeable.

Device multiplication exacerbates the need for vigilance. Smart phones, the latest tablets, laptops, desktops (even automobiles) contain complex software components that are never complete, never 100% stable and increasingly challenging to master by the end-user – only 60% of adults agree to update when prompted by the software, and that's assuming it has been installed with a setting to prompt. Well-meaning organizations that want to help seniors connect – like libraries, volunteers in senior centers, and senior housing organizations that seeks a competitive edge – can be overwhelmed by tech that offers nothing more than a mediocre start at a safe-to-use solution.

Special care solutions are not enough -- manufacturers must change. The Geek squad strategy – asking the consumer to pay extra to fix problems after the fact -- is akin to closing the gate when the chickens are in the next state, and the computer or device is not, shall we say, the most state-of-the-art. Hardware vendors – it doesn’t matter which – need pressure from large enterprises that are struggling with BYOD employees (Bring Your Own Device). Let’s hope that the firms like Apple and Facebook get their own security houses in order and then set an example for others. Companies must do a better job of locking down their networks and devices -- and when they get it right, the rest of us in consumer-land can follow their lead. Until then, no need to use your imagination – nefarious nightmares await.

User login