Best Practices for Effective Video Conferencing
17 May

Best Practices for Effective Video Conferencing

To make your video conferencing meetings more productive and rewarding for everyone, review the general video conferencing best practices, and learn how to improve the experience whether you are an onsite participant or a remote participant.

Video conferencing best practices

Follow these tips to ensure a more successful video conferencing meeting.

Prior to a meeting:

  • When using equipment or locations not regularly used, test your meeting connections in advance.
  • When possible, establish online video conferencing connections several minutes before the meeting start time.
  • Create a backup communication plan in case you have trouble connecting with remote participants. A backup plan can include asking onsite participants to connect to the meeting through their laptops, using a mobile or speakerphone, and/or collaborating through an online collaboration tool (e.g., Google docs).

During a meeting:

  • Have all participants share their video and audio. No lurkers.
    • Ensure all participants can see and hear all other participants, as appropriate.
    • Ensure conference room microphones are distributed appropriately to pick up all speakers.
    • Ensure location lighting does not limit a participant’s visibility (e.g., avoid backlighting from windows or lamps).
  • Have participants mute their microphones if their location has excessive background noise or they will not be speaking.
  • Have a meeting facilitator — often, but not always, the person who called the meeting.

The facilitator is responsible for:

  • Providing an agenda to participants — ahead of the meeting is nice, but minimally at the start of the meeting — that includes an overview of topics to be covered and planned outcome;
  • Establishing the visual or verbal cues, such as raising a hand, to indicate when someone wants to actively contribute verbally to the meeting;
  • Engaging participants at all locations to ensure discussion understanding, and alignment;
  • Limiting “side conversations” and multitasking or ensure all participants are made aware of that content;
  • Make sure all participants have equal access to content by sharing all content within the video conferencing connection and using online tools (e.g., Google docs) whenever possible.

Tips to improve a video conferencing meeting if you are onsite

Follow these steps to connect an H.323 or SIP-based room system to a video conferencing meeting.

After you connect with the video conferencing software, you will see a splash screen and be prompted to enter your meeting ID.

Enter the meeting ID that is listed on your meeting invitation email.

The video conferencing software then connects your room system to the meeting.

See the following Zoom video for tips on setting up a room for video conferencing.

Tips to improve a video conferencing meeting if you are remote

If you participate remotely in a video conference, follow these instructions to ensure the best experience.

  1. Try to connect via a wired Ethernet cable. This prevents WiFi dropouts and speed issues.
  2. If connecting from a laptop, plug in the laptop wall power. Battery use can adversely affect video quality.
  3. Test the connection before the call; this is strongly recommended.
    • If you use Zoom: Go to the Zoom site to test your audio connection or test your video connection.
    • If you use WebEx: Go to your WebEx Personal Room. Test your audio connection using the Audio pull-down menu. Test your video connection by viewing the screen in your Personal Room.
  4. Ensure that you have a camera, microphone, and headphones or speakers available. Earbuds or headphones are preferable to avoid audio feedback and echo. Most modern laptops and all-in-one desktops have a headphone jack, microphone, and speakers built-in.
  5. Be aware of your surroundings and how you appear visually.
    • Call from a quiet location with no background noise.
    • Close blinds on windows so that you are easier to see on the video.
    • Wear neutral, solid-colored clothing. Avoid black, white, or striped clothing.
  6. Be aware of your behavior. Because you are in a video conference, people can see what you are doing at all times.
  7. Follow all instructions in the video conferencing invitation and note important supplemental information, such as a backup phone number in case you are disconnected.

Source: https://uit.stanford.edu/videoconferencing/best-practices

Optimize Costs and Maximize Control with Private Cloud Computing
08 May

Optimize Costs and Maximize Control with Private Cloud Computing

A private cloud gives you always-on availability and scalability with a long-term cost advantage.

If you have strict requirements for data privacy or resource management or want to optimize costs over the long term, a private cloud hosted either in your data center or by a third-party provider is a smart option.

Business Advantages with the Private Cloud Computing

  • A private cloud can be hosted on infrastructure in your data center or by a third-party provider as a managed private cloud. Both options deliver services to users via the internet.
  • With a private cloud, you get more control over data and resources, support for custom applications that can’t be migrated to the public cloud, and a lower cost over the long term.

When choosing your best cloud deployment model, you’ll need to take into account your unique business needs—including desired CapEx and OpEx, the types of workloads you’ll be running, and your available IT resources.

Many organizations will need some amount of private cloud services. A private cloud is commonly hosted in your data center and maintained by your IT team, with services delivered to your users via the internet. It can also be hosted off-premises by a third-party provider as a managed private cloud.

Benefits of the private cloud

A private cloud gives you more control over how you use computing, storage, and networking. These always-on resources provide on-demand data availability, ensuring reliability and support for mission-critical workloads. You also get more control over security and privacy for data governance. This way, you can ensure compliance with any regulations, such as the European Union’s General Data Protection Regulation (GDPR).

Furthermore, a private cloud allows you to support internally developed applications, protect intellectual property, and support legacy applications that were not built for the public cloud.

It’s also the best path for optimizing your computing costs. Over the long term, running certain workloads on a private cloud can deliver a lower TCO as you deliver more computing power with less physical hardware. However, setting up and maintaining a private cloud on-premises requires a higher cost upfront as you purchase IT infrastructure.

Because private clouds give you both scalability and elasticity, you can respond quickly to changing workload demands. Your IT team can set up a self-service portal and spin up a virtual machine in minutes. They can also enable a single-tenant environment in which software can be customized to meet your organization’s needs.

Private cloud use cases

There are certain scenarios in which private infrastructure is best for hosting cloud services. While these use cases are most common among government, defense, scientific, and engineering organizations, they can also occur in any business, depending on the specific needs. In short, a private cloud is ideal for any use case in which you must do the following:

  • Protect sensitive information, including intellectual property
  • Meet data sovereignty or compliance requirements
  • Ensure high availability, as with mission-critical applications
  • Support internally developed or legacy applications

In some cases, you may want to set up a virtual private cloud, an on-demand pool of computing resources that provides isolation for approved users. This gives you an extra layer of control for privacy and security purposes.

A private cloud gives you more control over your data and resources, support for proprietary or legacy applications, and a better TCO over the long term.

Need help to determine what is the best cloud solution that suits your business?

Call us today at 855-225-4535 for a free consultation or click here

Source: https://www.intel.com/content/www/us/en/cloud-computing/what-is-private-cloud.html

Learn More – Cloud computing: A complete guide

Cloud computing: A complete guide
08 May

Cloud computing: A complete guide

Cloud computing is no longer something new — 94% of companies use it in some form. Cloud computing is today’s standard for competing effectively and speeding up your digital transformation.

What is cloud computing?

Cloud computing, sometimes referred to simply as “cloud,” is the use of computing resources — servers, database management, data storage, networking, software applications, and special capabilities such as blockchain and artificial intelligence (AI) — over the internet, as opposed to owning and operating those resources yourself, on premises.

Compared to traditional IT, cloud computing offers organizations a host of benefits: the cost-effectiveness of paying for only the resources you use; faster time to market for mission-critical applications and services; the ability to scale easily, affordably and — with the right cloud provider — globally; and much more (see “What are the benefits of cloud computing?” below). And many organizations are seeing additional benefits from combining public cloud services purchased from a cloud services provider with private cloud infrastructure they operate themselves to deliver sensitive applications or data to customers, partners and employees.

Increasingly, “cloud computing” is becoming synonymous with “computing.” For example, in a 2019 survey of nearly 800 companies, 94% were using some form of cloud computing (link resides outside WEBSITEFLIX). Many businesses are still in the first stages of their cloud journey, having migrated or deployed about 20% of their applications to the cloud, and are working out the unique security, compliance and geographic implications of moving their remaining mission-critical applications. But move they will: Industry analyst Gartner predicts that more than half of companies using cloud today will move to an all-cloud infrastructure by next year (2021) (link resides outside WEBSITEFLIX).

A brief history of cloud computing

Cloud computing dates back to the 1950s, and over the years, it has evolved through many phases that were first pioneered by IBM, including grid, utility, and on-demand computing.

What are the benefits of cloud computing?

Compared to traditional IT, cloud computing typically enables:

  • Greater cost-efficiency. While traditional IT requires you to purchase computing capacity in anticipation of growth or surges in traffic — a capacity that sits unused until you grow or traffic surges — cloud computing enables you to pay for only the capacity you need when you need it. Cloud also eliminates the ongoing expense of purchasing, housing, maintaining, and managing infrastructure on-premises.
  • Improved agility; faster time to market. On the cloud you can provision and deploy  (“spin up”)  a server in minutes; purchasing and deploying the same server on-premises might take weeks or months.
  • Greater scalability and elasticity. Cloud computing lets you scale workloads automatically — up or down — in response to business growth or surges in traffic. And working with a cloud provider that has data centers spread around the world enables you to scale up or down globally on demand, without sacrificing performance.
  • Improved reliability and business continuity. Because most cloud providers have redundancy built into their global networks, data backup and disaster recovery are typically much easier and less expensive to implement effectively in the cloud than on-premises. Providers who offer packaged disaster recovery solutions— referred to disaster recovery as a service, or DRaaS — make the process even easier, more affordable, and less disruptive.
  • Continually improving performance. The leading cloud service providers regularly update their infrastructure with the latest, highest-performing computing, storage, and networking hardware.
  • Better security, built-in. Traditionally, security concerns have been the leading obstacle for organizations considering cloud adoption. But in response to demand, the security offered by cloud service providers is steadily outstripping on-premises solutions. According to security software provider McAfee, today 52% of companies experience better security in the cloud than on-premises (link resides outside WEBSITEFLIX). Gartner has predicted that by this year (2020), infrastructure as a service (IaaS) cloud workloads will experience 60% fewer security incidents than those in traditional data centers (link resides outside WEBSITEFLIX).

With the right provider, the cloud also offers the added benefit of greater choice and flexibility. Specifically, a cloud provider that supports open standards and a hybrid multi-cloud implementation (see “Multicloud and Hybrid Multicloud” below) gives you the choice and flexibility to combine cloud and on-premises resources from unlimited vendors into a single, optimized, seamlessly integrated infrastructure you can manage from a single point of control — and infrastructure in which each workload runs in the best possible location based on its specific performance, security, regulatory compliance, and cost requirements.

Cloud computing storage

Storage growth continues at a significant rate, driven by new workloads like analytics, video, and mobile applications. While storage demand is increasing, most IT organizations are under continued pressure to lower the cost of their IT infrastructure through the use of shared cloud computing resources. It’s vital for software designers and solution architects to match the specific requirements of their workloads to the appropriate storage solution or, in many enterprise cases, a mix.

One of the biggest advantages of cloud storage is flexibility. A company that has your data or data you want will be able to manage, analyze, add to and transfer it all from a single dashboard — something impossible to do today on storage hardware that sits alone in a data center.

The other major benefit of storage software is that it can access and analyze any kind of data wherever it lives, no matter the hardware, platform, or format. So, from mobile devices linked to your bank to servers full of unstructured social media information, data can be understood via the cloud.

Learn more about cloud storage

The future of cloud

Within the next three years, 75 percent of existing non-cloud apps will move to the cloud. Today’s computing landscape shows companies not only adopting cloud but using more than one cloud environment. Even then, the cloud journey for many has only just begun, moving beyond low-end infrastructure as a service to establish higher business value.

Source: https://www.ibm.com/cloud/learn/cloud-computing

Learn More – Optimize Costs and Maximize Control with Private Cloud Computing

Identifying and Avoiding COVID-19 Scams
22 Apr

Identifying and Avoiding COVID-19 Scams

Are you working from home or attending school online during the Coronavirus (COVID-19) pandemic? Be cautious of cybercriminals.

During this time of social distancing, people spend more time on their phones and computers for home, work, shopping, and entertainment. Cybercriminals take advantage of widespread fear, panic, and worry. They may use your extra screen time and time at home as an opportunity.

Protect yourself by being aware of different types of scams.

According to the U.S. Department of Justice, the Federal Trade Commission (FTC) and the Federal Communications Commission (FCC), there are several ways scammers will use COVID-19 to target people.

  • Vaccine and treatment scams. Scammers may advertise fake cures, vaccines, and advice on unproven treatments for COVID-19.
  • Shopping Scams. Scammers may create fake stores, e-commerce websites, social media accounts, and email addresses claiming to sell medical supplies currently in high demand. Supplies might include things like hand sanitizer, toilet paper, and surgical masks. Scammers will keep your money but never provide you with the merchandise.
  • Medical scams. Scammers may call and email people pretending to be doctors and hospitals that have treated a friend or relative for COVID-19 and demand payment for treatment.
  • Charity scams. Scammers sometimes ask for donations for people and groups affected by COVID-19.
  • Phishing and Malware scams. During the COVID-19 crisis, phishing and malware scams may be used to gain access to your computer or to steal your credentials.
    • Malware is malicious software such as spyware, ransomware, or viruses that can gain access to your computer system without you knowing. Malware can be activated when you click on email attachments or install risky software.
    • When Phishing is used, bad actors send false communications from what appears to be a trustworthy source to try to convince you to share sensitive data such as passwords or credit card information.
    • For example, scammers may pose as national and global health authorities, including the World Health Organization (WHO) and the Centers for Disease Control and Prevention (CDC) and send phishing emails designed to trick you into downloading malware or providing your personal and financial information.
  •  App scamsScammers may create mobile apps designed to track the spread of COVID-19 and insert malware into that app, which will compromise users’ devices and personal information.
  • Investment scamsScammers may offer online promotions on things like social media, claiming that products or services of publicly traded companies can prevent, detect, or cure COVID-19, causing the stock of these companies to dramatically increase in value as a result.

(Source: U.S. Department of Justice)  

Malicious Domains and Files Related to Zoom Increase, ‘Zoom Bombing’ on the Rise
05 Apr

Malicious Domains and Files Related to Zoom Increase, ‘Zoom Bombing’ on the Rise

Threat actors take advantage of the increased usage of video conferencing apps is reflected in the rise of malicious domains and files related to Zoom application. Cases of “Zoom bombing” has been witnessed as well. The use of Zoom and other video conferencing platforms has increased since many companies have transitioned to a work-from-home setup due to the coronavirus (COVID-19) outbreak.

Registrations of domains that reference the name of Zoom has significantly increased, according to Check Point Research. More than 1,700 new domains related to Zoom were registered since the beginning of 2020, but 25% of this number was only registered in the past week. From these domains, 4% have been found with suspicious characteristics.

Other communication apps such as Google Classroom have been targeted as well; the official domain classroom.google.com has already been spoofed as googloclassroom\[.]com and googieclassroom\[.]com.

The researchers were also able to detect malicious files containing the word “Zoom,” such as “zoom-us-zoom_##########.exe” (# representing various digits). A file related to Microsoft Teams platform (“Microsoft-teams_V#mu#D_##########.exe”) was found as well. Running these files installs InstallCore PUA on the user’s computer, which could allow other parties to install malware.

In addition to malicious domains and files, the public is also warned of Zoom bombing, or strangers crashing private video conference calls to perform disruptive acts such as sharing obscene images and videos or using profane language. Attackers guess random meeting ID numbers in an attempt to join these calls. Companies and schools, holding online classes, have fallen victim to this. Zoom has released recommendations on how to prevent uninvited participants from joining in on private calls.

Zooming in on work-from-home set up security

The transition of many companies to a work-from-home (WFH) arrangement has brought about its own set of security concerns. For one, the increased reliance of companies on video conferencing apps for communication can inadvertently expose businesses to threats and even possibly leak classified company information.

Employees are advised to properly configure the settings of these apps to ensure that only those invited can participate in the call. Users are also advised to double-check domains that may look related to video conferencing apps and verify the source before downloading files. Official domains and related downloads are usually listed in the apps’ official websites.

Besides securing the use of video conferencing apps, users can also protect their WFH setups through the proper use and configuration of a virtual private network (VPN) and remote desktop protocol (RDP), which are commonly used for remote connection. Choosing strong passwords and setting up two-factor authentication (2FA) will also help secure accounts. Users are also reminded to be wary of online scams, including those that use content related to COVID-19 to lure possible victims.

Source: https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/malicious-domains-and-files-related-to-zoom-increase-zoom-bombing-on-the-rise?_ga=2.129671180.1627239902.1586142226-889185152.1585619978

Working From Home? 5 Tips to Stay Secure
19 Mar

Working From Home? 5 Tips to Stay Secure

Working from home – a new reality

It’s evident that working from home has become a new reality for many, as more and more companies are encouraging and even requesting that their staff work remotely. In fact, recent events have accelerated this WFH trend, or workforce transformation process, with companies restricting employee travel and many allocating more resources to enable virtual work. Major tech players, like Twitter and LinkedIn, have made even bigger moves by implementing policies that require all employees to work from home. Clearly, work from home is no longer just an initiative to harness global talent but also a way to protect workers from risk.

Increased security risks

At McAfee, we’re keeping a close eye on this trend, observing huge increases in the number of personal devices connecting online. And while working from home offers benefits to employees, this upswing in personal devices connecting to enterprises can actually expose organizations and employees to security risks, such as malware attacks, identity theft, and ransomware. With the world now facing this new reality, the question remains–how can employers and employees equip themselves with the resources to work from home securely on a full-time or part-time basis?

Work from home securely

Employers must not only educate their employees on digital security best practices but also give them the tools to combat online threats that may stem from remote work. With many of us relying on emails and the web to work remotely, we need to be aware of the key giveaway signs that indicate a threat. From there, we can spot, flag, and report anything that looks suspicious. By sharing the responsibility and encouraging others to flag anything sketchy, we can all naturally raise awareness and help others avoid falling into similar traps. By staying open with one another, we can stay ahead of hackers.

Tips to protect both personal and corporate data

Want to ensure you work from home in a safe and secure way? Here are five quick tips and tools you can use to protect both personal and corporate data:

Utilize a VPN

Many people use public Wi-Fi at coffee shops, airports, etc. in order to stay connected both professionally and personally. However, by using an unsecured Wi-Fi connection, you may be creating an easy gateway for hackers to access your personal information and data. Be sure to use a virtual private network (VPN), which is extremely important for establishing a secured connection to work files and personal photos saved in the cloud.

Be aware of phishing emails

We’ve seen hackers attempt to take advantage of people’s fears by pretending to sell face masks online to trick unsuspecting people into giving away their credit card details. Do not open any email attachments or click on any links that seem suspicious.

Regularly change cloud passwords with two-factor authentication

Two-factor authentication is a more secure way to access work applications. In addition to a password/username combo, you will be asked to verify who you are with a device that you–and only you—own, such as a mobile phone. Put simply: it uses two factors to confirm an identity. Ultimately, getting access to something supposedly confidential isn’t that hard for hackers nowadays. However, the second form of identification makes it so hackers are limited in what they can pull off.

Use strong, unique passwords

In the chance a hacker does gain access to one of your accounts, make sure to use complex passwords for each of your accounts, and never reuse your credentials across different platforms. It’s also a good idea to update your passwords consistently to further protect your data. You can also use a password manager, or a security solution that includes a password manager, to keep track of all your unique passwords.

Browse with security protection

Ensure that you continue to update your security solutions across all devices. This will help protect devices against malware, phishing attacks, and other threats, as well as help, identify malicious websites while browsing.

source: https://www.mcafee.com/blogs/consumer/top-five-things-to-do-to-stay-secure-when-working-from-home/

WOULD YOU LIKE HELP SETTING UP VPN OR IT SECURITY?

Coronavirus phishing emails: How to protect against COVID-19 scams
18 Mar

Coronavirus phishing emails: How to protect against COVID-19 scams

The overwhelming amount of news coverage surrounding the novel coronavirus has created a new danger — phishing attacks looking to exploit public fears about the sometimes-deadly virus.

How does it work? Cybercriminals send emails claiming to be from legitimate organizations with information about the coronavirus.

The email messages might ask you to open an attachment to see the latest statistics. If you click on the attachment or embedded link, you’re likely to download malicious software onto your device.

The malicious software — malware, for short — could allow cybercriminals to take control of your computer, log your keystrokes, or access your personal information and financial data, which could lead to identity theft.

The coronavirus — or COVID-19, the name of the respiratory disease it causes — has affected the lives of millions of people around the world. It’s impossible to predict its long-term impact. But it is possible to take steps to help protect yourself against coronavirus-related scams.

Here’s some information that can help.

How do I spot a coronavirus phishing email? Examples

Coronavirus-themed phishing emails can take different forms, including these.

CDC alerts. Cybercriminals have sent phishing emails designed to look like they’re from the U.S. Centers for Disease Control. The email might falsely claim to link to a list of coronavirus cases in your area. “You are immediately advised to go through the cases above for safety hazards,” the text of one phishing email reads.

Health advice emails. Phishers have sent emails that offer purported medical advice to help protect you against the coronavirus. The emails might claim to be from medical experts near Wuhan, China, where the coronavirus outbreak began. “This little measure can save you,” one phishing email says. “Use the link below to download Safety Measures.”

Workplace policy emails. Cybercriminals have targeted employees’ workplace email accounts. One phishing email begins, “All, Due to the coronavirus outbreak, [company name] is actively taking safety precautions by instituting a Communicable Disease Management Policy.” If you click on the fake company policy, you’ll download malicious software.

How do I avoid scammers and fake ads?

Scammers have posted ads that claim to offer treatment or cures for the coronavirus. The ads often try to create a sense of urgency — for instance, “Buy now, limited supply.”

At least two bad things could happen if you respond to the ads.

One, you might click on an ad and download malware onto your device.

Two, you might buy the product and receive something useless, or nothing at all. Meanwhile, you may have shared personal information such as your name, address, and credit card number.

Bottom line? It’s smart to avoid any ads seeking to capitalize on the coronavirus.

Tips for recognizing and avoiding phishing emails

Here are some ways to recognize and avoid coronavirus-themed phishing emails.

Like other types of phishing emails, the email messages usually try to lure you into clicking on a link or providing personal information that can be used to commit fraud or identity theft. Here’s some tips to avoid getting tricked.

  • Beware of online requests for personal information. A coronavirus-themed email that seeks personal information like your Social Security number or login information is a phishing scam. Legitimate government agencies won’t ask for that information. Never respond to the email with your personal data.
  • Check the email address or link. You can inspect a link by hovering your mouse button over the URL to see where it leads. Sometimes, it’s obvious the web address is not legitimate. But keep in mind phishers can create links that closely resemble legitimate addresses. Delete the email.
  • Watch for spelling and grammatical mistakes. If an email includes spelling, punctuation, and grammar errors, it’s likely a sign you’ve received a phishing email. Delete it.
  • Look for generic greetings. Phishing emails are unlikely to use your name. Greetings like “Dear sir or madam” signal an email is not legitimate.
  • Avoid emails that insist you act now. Phishing emails often try to create a sense of urgency or demand immediate action. The goal is to get you to click on a link and provide personal information — right now. Instead, delete the message.

Where can I find legitimate information about the coronavirus?

It’s smart to go directly to reliable sources for information about the coronavirus. That includes government offices and health care agencies.

Here are a few of the best places to find answers to your questions about the coronavirus.

Centers for Disease Control and Prevention. The CDC website includes the most current information about the coronavirus. Here’s a partial list of topics covered.

  • How the coronavirus spreads
  • Symptoms
  • Prevention and treatment
  • Cases in the U.S.
  • Global locations with COVID-19
  • Information for communities, schools, and businesses
  • Travel

World Health Organization. WHO provides a range of information, including how to protect yourself, travel advice, and answers to common questions.

National Institutes of Health. NIH provides updated information and guidance about the coronavirus. It includes information from other government organizations.

Source: https://us.norton.com/internetsecurity-online-scams-coronavirus-phishing-scams.html

Zebra Programming Language (ZPL II) and Raw Printing
25 Feb

Zebra Programming Language (ZPL II) and Raw Printing

Zebra Programming Language (ZPL) is the command language used by all ZPL compatible printers. It is a command based language used by the printer as instructions for creating the images printed on the labels. This document contains links to manuals, examples, and specific information related to specific ZPL commands.

Websiteflix has programmers who are familiar working with programming Zebra ZPL II and RAW languages.

We have extended experience with Raw commands, RFID printing and Zebra ZPL II, QR Code printing, Label Printing, Thermal Label Printing, Shipping Label printing and more.

Do you need help with your application? Call us today at 954-323-2004 we can assist you!

^XA
^LH30,6161
^FO20,10
^ADN,90,50
^FDWebsiteflix.com^FS
^XZ

Resources: https://www.zebra.com/us/en/support-downloads/knowledge-articles/zpl-command-information-and-details.html

ADA, Section 508, WCAG 2.1 AA – Website Accessibility & the Law: Why Your Website Must Be Compliant
03 Feb

ADA, Section 508, WCAG 2.1 AA – Website Accessibility & the Law: Why Your Website Must Be Compliant

The Americans with Disabilities Act (ADA) was developed in 1990 and is meant to ensure that people with disabilities have the same opportunities as anyone else. … Basically, this means that your website needs to be accessible to people who have disabilities that affect their hearing, vision or physical capacities

Website Accessibility & the Law: Why Your Website Must Be Compliant. In the U.S., apart from federal, state, and local government websites which must meet Section 508 regulations, there are no enforceable ADA legal standards to follow for website accessibility.

What is the ADA?

The Americans with Disabilities Act (ADA), which was passed in 1990, is an important piece of legislation that protects people with disabilities throughout public life. Essentially, the law helps to ensure that anyone with a disability will receive the same opportunities that an individual without a disability has in the public sector and some parts of the private sector.

Within the ADA, five specific sections clarify where the law applies:

  1. Title I – Employment
  2. Title II – Public Services: State and Local Government
  3. Title III – Public Accommodations and Services Operated by Private Entities
  4. Title IV – Telecommunications
  5. Title V – Miscellaneous Provisions

The ADA has adopted WCAG 2.1 AA as its core guidelines for website accessibility and online content. Many point to Title III and classify most websites as “places of public accommodation.” For the most part, the internet is a public resource and impacts public life. This means that the ADA is enforceable by law. As the ADA prevents discrimination based on ability, websites that discriminate against members of the public who require accommodations may be considered in violation of federal ADA laws.

To learn more about how the Accessibility Widget complies with ADA regulations please contact us.

What is WCAG?

The Web Content Accessibility Guidelines (WCAG) are a set of standards created by the World Wide Web Consortium (W3C). The W3C is an international community that develops regulations and recommendations for the internet to help ensure its longevity and usability. The W3C established the WCAG guidance to provide detailed guidelines for website owners, designers, and developers to create websites and digital content and markup through accessible approaches that work seamlessly with assistive technologies used by people with disabilities.

WCAG compliance is divided into three levels of success criteria:

  • Level A
  • Level AA
  • Level AAA (the strictest standards)

The WCAG 1.0 guidelines were initially published in 1999, were updated in 2008 (WCAG 2.0) and, most recently, in 2018 (WCAG 2.1). As the internet evolves so quickly, the guidelines must be reviewed and revised continually. Each update strives to include the most recent technological advancements and more comprehensive guidelines.

WCAG 3.0 is scheduled for release in 2021 and is intended to be a much more inclusive set of guidelines that are easier to understand and implement.

To learn more about how the Accessibility Widget complies with WCAG 2.1, please contact us.

What is Section 508?

Section 508 refers to a part of the Rehabilitation Act of 1973. When the Rehabilitation Act was created, its goal was to prevent disability discrimination in federal organizations, federal programs, federal contractors, and similar groups. This Act was amended in 1998 to include Section 508 because of the technological advancements being made at the time.

As a result of Section 508, federal agencies must create, maintain, and distribute all electronic information and technology in ways that are accessible for people with disabilities. This helps to ensure that all federal agencies and programs are giving members of their organizations and members of the public the ability to access information and participate in related activities without barriers.

Section 508 has adopted the WCAG 2.1 AA as guidelines for ensuring that websites are authored and structured in an accessible and inclusive manner to work as seamlessly as possible with those relying on assistive technologies.

To learn more about how the Accessibility Widget complies with Section 508 regulations, please contact us.

National Cybersecurity Awareness Month 2019
07 Oct

National Cybersecurity Awareness Month 2019

The line between our online and offline lives is indistinguishable. In these tech-fueled times, our homes, societal well-being, economic prosperity and nation’s security are impacted by the internet.

Under the overarching theme of  ‘Own IT. Secure IT. Protect IT.’, the 16th annual National Cybersecurity Awareness Month (NCSAM) is focused on encouraging personal accountability and proactive behavior in security best practices, digital privacy and draw attention to careers in cybersecurity. NCSAM 2019 will address the following online safety messages and identify opportunities for behavioral change:

 

  • Own IT.

    • Never Click and Tell: staying safe on social media
    • Update Privacy Settings
    • Keep Tabs on Your Apps: best practices for device applications

 

  • Secure IT.

    • Shake Up Your Passphrase Protocol: create strong, unique passphrases
    • Double Your Login Protection: turn on multi-factor authentication
    • Shop Safe Online
    • Play Hard To Get With Strangers: how to spot and avoid phish

 

  • Protect IT.

    • If You Connect, You Must Protect: updating to the latest security software, web browser and operating systems
    • Stay Protected While Connected: Wi-Fi safety
    • If You Collect It, Protect It: keeping customer/consumer data and information safe

Source: https://staysafeonline.org/ncsam/themes/