Read Now: What Is DNS Security? Why It Matters for Your Business – 101 Latest News
#DNS #Security #Matters #Business
After the year 2000, when technology use and development skyrocketed, the progression of cyber risk has been cumulative.
The cybersecurity sector concentrated on new security standards and compliance during this time, and then went beyond compliance to look at the core business risks posed by cyber threats.
In 2022 and beyond, the industry and society have matured, and we’re now focusing on security suites and infrastructure unification, as well as managing cyber risks. The opportunities and driving factors of one decade do not take the place of those in the one before it.
Instead, they broaden the perspective and emphasize well-known ideas in new ways. One such example is DNS – although its roots can be traced back to 1966, DNS security must be a part of every robust cybersecurity strategy today.
What is DNS security?
Wondering what exactly DNS security is and why it matters for your business? Let us first have a look at DNS and how it all started.
The Domain Name System (DNS) is an internet protocol that provides human-readable names for a variety of web-based services, including e-mail. Acting as the phonebook of the internet, DNS converts human-readable names to IP addresses, then changes IP addresses back to names.
The project started by American Internet pioneer Bob Taylor in 1966 and known as Advanced Research Projects Agency Network (ARPANET) represents the beginning of DNS history. Names to address translations were formerly kept on the ARPANET in a single table contained within a file called HOSTS.TXT. This document was used to manually assign addresses.
However, maintaining the addresses manually had grown extensive and challenging. As a result, American computer scientist Paul Mockapetris proposed a new framework in 1983 that provided a dynamic and distributed system known as the Domain Name System.
With the help of Mockapetris, the DNS became able to look up IP address names rather than just hostnames, making it easier for regular users to access the web. Simply put, without it, there would be no internet as we know it today.
Source: Heimdal Security
Additionally, the Domain Name System Security Extensions (DNSSEC) protects DNS from threats like cache poisoning and guarantees the security and confidentiality of data. All server responses are digitally signed by DNSSEC servers. DNSSEC resolvers check a server’s signature to see if the information it received matches the information on the authoritative DNS server. The request will not be granted if this is not the case.
So what exactly is DNS security?
DNS security refers to all the procedures created to keep the DNS infrastructure safe from cyber threats in order to maintain speed and dependability, and prevent the (sometimes) disastrous effects of cyberattacks.
Why is DNS security important?
DNS provided us with the internet as we know it today. How much do you think it would have developed if people had to remember long strings of numbers instead of domain names?
It’s obvious that the majority of internet users use domain names to describe the websites they wish to access. However, computers employ IP addresses to distinguish between various internet-connected systems and to route traffic over the internet. By enabling the use of domain names, the Domain Name System serves as the internet’s backbone and makes it functional.
DNS as a security vulnerability
Although its importance is unquestionable, DNS was not necessarily designed with security in mind. Therefore, there are many cyberattacks that can affect it – cyberattacks that can impact companies’ money, workflow, and reputation.
The most common DNS risks include denial-of-service (DoS), distributed denial-of-service (DDoS), DNS hijacking, DNS spoofing, DNS tunneling, DNS amplification, DNS typosquating.
DNS security risks
DNS attacks are among the most prevalent and effective web security threats. Let’s discuss more about them.
DNS attack types
Below are common DNS attack types.
- DoS: A denial-of-service (DoS) attack aims to bring down a computer system or network so that its intended users are unable to access it. DoS attacks achieve this by sending the target an excessive amount of traffic or information, causing it to crash.
Malicious actors that employ DoS attacks frequently target the web servers of well-known companies in industries like media, banking, and commerce, as well as governmental and commercial organizations.
- DDoS: A distributed denial-of-service (DDoS) attack takes place when multiple systems coordinate a synchronized DoS attack against a target. Therefore, the main distinction from DoS is that the target is attacked simultaneously from multiple spots rather than just one.DDoS attacks can affect the customer experience and workflow, but also the revenue and brand reputation.
- DNS hijacking: Attackers use DNS hijacking, also known as DNS redirection, to direct users to malicious websites by misresolving DNS requests. If malicious players control a DNS server and direct traffic to a fake DNS server, the fake DNS server will then translate a valid IP address into the IP address of a malicious site.
Source: Heimdal Security
- Other indirect attacks: The critical importance of DNS security is underscored by the fact that other forms of cyberattacks may use DNS as a tool or be tools used by hackers to compromise the DNS. Man-in-the-middle attacks, along with bot and zero-day attacks, are the most crucial to mention in this context.
DNS attack methods
These are the most common DNS attack methods.
- DNS spoofing: DNS spoofing is an attack method where users are sent to a fake website that has been made to look like a real one, in order to redirect traffic or steal user credentials.
Spoofing attacks can last for a very long time without being discovered and, as you can imagine, lead to significant security issues.
- DNS tunneling: Network traffic is routed through the Domain Name System (DNS) using a process known as DNS tunneling to create an additional path for the transmission of data. Bypassing network filters and firewalls is just one of the many uses for this technique.
DNS tunneling can be employed maliciously to send data through DNS requests. This technique is typically used to spoof content without being noticed by filtering or firewalls or to generate occluded channels for transferring information over a network that would normally not authorize the traffic.
- DNS amplification: In DNS amplification attacks, the threat actor takes advantage of flaws in DNS servers to transform initially small requests into bigger payloads that are then used to overtake the victim’s servers.
Typically, DNS amplification involves tampering with publicly accessible domain name systems by flooding a target with a multitude of User Datagram Protocol (UDP) packets. The size of these UDP packets can be magnified by the attackers using a variety of amplification techniques, making the attack effective enough to topple even the strongest Internet infrastructure.
- DNS typosquating: Typosquatting is the fraudulent process of registering domain names that have a strong resemblance to well-known brands and companies in order to deceive users. The users could enter the website address incorrectly and end up on a malicious site that perfectly resembles a legitimate website. The risky part is that users might then carry out transactions and reveal private information.
Typosquatting might be combined with phishing and other online attacks.
How to ensure DNS security
As can be seen in the IDC 2022 Global DNS Threat Report, although the DNS attack impact on in-house application downtime and cloud service downtime slightly decreased in 2022 compared to 2021, the percentage of loss of business and brand damage increased.
Users need DNS in order to access their apps and services, whether they are hosted locally or in the cloud. If DNS services are compromised, users cannot access their applications.
No DNS simply equals no business, so regardless of the size of the organization, DNS security is mandatory.
DNS security as part of a strong defense-in-depth strategy
A cybersecurity strategy that uses a multi-faceted approach to safeguard an information technology (IT) infrastructure is known as a defense-in-depth strategy – and DNS security is and must be regarded as one of its key components.
A defense-in-depth strategy incorporates redundancy in case one system fails or becomes susceptible to attacks in order to protect against a variety of threats.
When it comes to DNS security, you must take into account both the endpoints and the network.
Endpoint DNS security
Learn more about endpoint DNS security, specifically DNS content filtering and threat hunting, below.
- DNS filtering: DNS content filtering is the process by which an internet filter restricts access to a particular website’s content based on its IP address rather than its domain name.
DNS content filtering methods include category filters (for example, racial hatred, pornography websites, etc.), keyword filters (restricting access to specific websites or web applications based on keywords found in the content of those websites), and administrator-controlled blacklists and whitelists.
- Threat hunting: Threat hunting, one of the key components of modern cybersecurity, is the process of identifying and understanding threat actors who may compromise a company’s infrastructure by concentrating on recurring behaviors.
Using the presumption of compromise, threat hunting is a proactive cyber defense tactic that enables you to focus on potential risks in your network that may have gone undetected.
What should you do to ensure endpoint DNS security?
Look for a security solution that includes a threat-hunting component.
You can search for a security solution or suite with a threat-hunting component. In order to help you block malicious domains, communications to and from command-and-control (C&C), and malicious servers, it should proactively evaluate traffic and filter all network packages.
Network DNS security
In terms of network DNS security, you must take into account the rise of BYOD and IoT and clearly establish how you determine who and what connects to your online network perimeter – especially in light of the shift toward remote or hybrid work that we’ve witnessed in the last couple of years.
Rise of BYoD
Bring your own device (BYOD) policy refers to the practice whereby employees connect their personal devices to the networks of their employers and perform everyday tasks.
Some of the benefits of BYOD include reduced costs, increased employee productivity, and higher staff satisfaction, but the disadvantages are equally worth mentioning: high (or even higher) security risks, potential loss of privacy, a lack of devices, and the need for a more complex IT support system.
The most significant threats that a BYOD policy implies are cross-contamination of data, a lack of management and outsourced security, unsecured use and device infection, security breaches and GDPR concerns, obscure applications, hacking and targeted attacks, phishing, adware, spyware, activity recording software, inadequate policies, and last but not least, human error and mixing business with pleasure.
Rise of IoT
The physical items that are embedded with software, sensors, and other technologies that enable them to connect and exchange data with other devices and systems over the internet are referred to as internet of things (IoT) objects.
An impressive number of factors, such as simple connectivity and data transfer, access to inexpensive and low-power sensor technology, increased cloud platform availability, advancements in machine learning and analytics combined with the enormous amounts of data stored in the cloud, and the rise of conversational AI, have all contributed to the emergence of IoT.
The risks to IoT security are substantial. Threats to identity and access management, potential data breaches, the growing number of devices and the substantial attack surface, insecure user interfaces or the convenience of devices, poor software updates, and the ease with which someone with physical access to a product can extract the owner’s password from the plaintext, private keys, and root passwords are just a few examples.
What should you do to ensure network DNS security?
Look for a solution that can protect your company at the perimeter/network level.
By utilizing network prevention, detection, and response technology, strong network security solutions effectively eliminate threats. They can work in conjunction with firewalls to prevent malicious requests from reaching perimeter servers in the first place.
Ways to enhance DNS security
Although a high percentage of businesses acknowledge the importance of DNS security, the average time to mitigate attacks increased by 29 minutes, now taking 6 hours and 7 minutes, with 24% taking longer than 7 hours, according to the 2022 Global DNS Threat Report.
The amount of lost time translates into lost revenue, so it’s important to be aware of alternative techniques for enhancing DNS security to ensure you don’t end up being the next victim of malicious players. Here are some examples:
Onsite DNS backup
You might consider hosting your own specialized backup DNS server to improve DNS security. Although managed DNS service providers and Internet service providers can both be attacked, having a backup is crucial not just in the event of a planned attack on your vendor. Hardware or network failures are more frequently to blame for DNS performance problems or outages.
Response policy zones
The use of response policy zones (RPZ) is an additional method for enhancing DNS security. A nameserver administrator can use RPZ to provide alternative responses to queries by superimposing custom data on top of the global DNS.
How can a response policy zone help? Well, with an RPZ, you can:
- Direct users to a walled garden in order to prevent them from accessing a known malicious hostname or domain name
- Prevent users from accessing hostnames that point to subnets or known malicious IP addresses
- Restrict user access to DNS data managed by nameservers that only host malicious domains
Internet protocol address management (IPAM) is a system that enables IP address management in a corporate setting. It does this by facilitating the organization, tracking, and modification of data pertaining to the IP addressing space.
The network services that assign IP addresses to machines in a TCP/IP model and resolve them are DNS and Dynamic Host Configuration Protocol (DHCP). These services will be connected by IPAM, enabling each to be informed of modifications in the other. For example, DNS will update itself in accordance with the IP address selected by a client via DHCP.
Security tasks automation
Automation is one of the key strategies for increasing DNS security and should be used whenever and wherever possible.
Automated solutions can help you respond to potential security threats with advanced threat intelligence, deal with security-related issues automatically in real time, and gather crucial security metrics, as well as streamline breach incident response. Moreover, it can minimize human input in time-consuming remediation tasks and increase employee productivity, but also speed up breach incident response and aid in making well-informed decisions.
Despite being the foundation of the internet as we know it, cybercriminals have often chosen DNS as a target in order to take advantage of vulnerabilities, access networks, and steal data.
What does this mean for businesses? Loss of money, time, brand damage, as well as potential fines and legal repercussions.
Every business must therefore be aware of the most significant security risks that DNS implies, including DoS, DDoS, DNS hijacking, DNS spoofing, DNS tunneling, DNS amplification, DNS typosquating.
Equally crucial is knowing what you can do to guarantee DNS security. Businesses can choose to use response policy zones, onsite DNS backups, IPAM, DNS content filtering, and IPAM. Most importantly, they should try to automate security tasks and find security solutions that rely on advanced threat hunting components.
When it comes to staying ahead of cyberthreats, prevention will always be the best course of action.
Ready to bump up your security? Find the best DNS security software to secure DNS servers and the websites they support.
Read Now: Financial Advisor Scammers – How to Spot Them From a Mile Away – 101 Latest News
#Financial #Advisor #Scammers #Spot #Mile
Thousands of people fall victim to financial fraud every year, losing millions of dollars. According to the Federal Trade Commission, American consumers lost more than $5.8 billion to fraud in 2021 — that’s 70% more than in 2020.
A record number of nearly 2.8 million people reported fraud to the FTC in 2021 – the highest number since 2001. An average person lost $500 in these scams, 25% of which resulted in a financial loss.
These figures do not include identity theft reports or any other categories. Another 1.5 million Americans filed complaints related to “other” categories, such as credit reporting companies failing to investigate disputed information or debt collectors making false representations of the amount or status of debt in 2021. In addition, more than 1.4 million Americans reported being victims of identity theft. According to the FTC, both sums are records.
I think it’s safe to say that the number and sophistication of finanical scams are constantly increasing. The good news? By remaining skeptical and learning how to spot financial advisor scammers from a mile away you can protect yourself and your loved ones.
The appeal of “phantom riches.”
It would be great if we could build wealth, wouldn’t it? Of course. But, at the same time, it is this desire that makes people want to invest in high-return investments.
Unfortunately, scam artists also exploit this desire to build wealth to make money from their victims. Known as “phantom riches,” scammers entice investors into investing with the promise of wealth. A typical investment scam will include a substantial payoff or guaranteed returns, according to the Financial Industry Regulatory Authority (FINRA).
In a nutshell, this tactic consists of:
- You make an emotional decision rather than a logical one because the scam artist promises riches.
- Your money is invested, but you don’t get anything back. Due to the fact that the “riches” never existed in the first place, the scam artist cannot pay you.
You’re promised guaranteed returns.
Your potential rate of return will be influenced by the degree of risk associated with each investment. In most cases, if you keep your money perfectly safe, it will yield a low return. On the flip side, investments with high returns are associated with high risks, including a complete loss.
It’s typical or fraudsters to try to persuade investors that extremely high returns are “guaranteed” or “can’t miss.”
In short, in this scam, the clients’ greed and dreams of easy money are exploited. It is likely that an advisor is scamming you if he or she offers or guarantees returns higher than 12-15%. FYI, a typical U.S. stock market return over the last 85 years has been 9.5%. The return is not a “safe” one, since there have been many years when returns were negative.
During free events, you’re pressured to act quickly.
It may sound like a great night out if you’re invited to a free lobster dinner at a popular local restaurant. However, as soon as you hear the words “Act fast!” you should be ready to flee. As a general rule of thumb, never trust a financial advisor who uses high-pressure sales tactics.
It should be noted though, that free events aren’t always scams. To play it safe, before you RSVP, check out FINRA’s BrokerCheck, the CFP Board’s planners or the National Association of Personal Financial Advisors’ database to see the host’s credentials.
You’re contacted by a government agency you’re never heard of.
People who claim to be from government agencies often call, send emails, or send text messages posing as government officials — often out the blue. For the sake of sounding official, they may give you their employee ID number. Additionally, they might have information about you, such as your home address or name.
Sometimes they give you fake agency names, like the non-existent National Sweepstakes Bureau, that say they work for the Social Security Administration, the IRS, or Medicare. Also, they will give you an explanation as to why you need to send them money or provide them with your personal information right away. This is a call you should hang up on if you receive it. This is a scam.
The government will never call you, send you an email, or send a text message asking for money. That’s only something a scammer would do.
You “owe” taxes or your Social is in jeopardy.
Let’s say you’re at home watching a movie with your family. From out of nowhere, you receive a call from the IRS saying you owe taxes. There’s a claim that you need to pay now. If you don’t pay right away, the caller might threaten you with arrest or deportation. You might get your driver’s license revoked, too.
It’s possible the caller has some info about you, like your Social Security number. After all, it’s supposed to sound like the IRS is calling. However, this isn’t the IRS.
Even though most of these scams happen over the phone, you should also know that the IRS won’t email you, text you, or message you on social media. The IRS will mail you a notice if you owe taxes.
Similarly, if you receive a call, email, text, or social media message stating that your Social Security benefits will be terminated or your Social Security number suspended unless you pay immediately. You will be told that you must pay with gift cards, wire transfers, cryptocurrency, or cash mailed in.
There’s no need to worry about being threatened by the real Social Security Administration or having your number suspended.
A real Social Security Administration will not contact you, send you an email, send you a text message, or send you a direct message on social media requesting payment. No government agency will ever ask you to send money. Wiring money, using gift cards, using cryptocurrency, or sending cash is a scam. That call, email, text message, or direct message is a scam.
You’re encouraged to keep all your money in one spot.
We all know diversifying your portfolio makes sense, right? When your money is all in one stock, for example, and it tanks, it could be a disaster.
It’s possible your financial advisor has an ulterior motive if they’re recommending a certain investment. To protect your finances, a trustworthy financial advisor will always recommend a balanced portfolio.
You’ve been told that you won the lottery or a prize.
A lottery or prize scam usually involves scammers calling or emailing you, claiming that you’ve won a prize through a lottery or sweepstakes, and then requesting an upfront fee and tax payment. It is possible for them to claim to be from a federal agency in some cases.
You should never provide any personal or financial information to anyone you don’t know, including your credit card number or Social Security number. If they demand payment immediately, never pay an upfront fee for a prize
They’re selling you products you don’t want.
You should be cautious of anyone who tries to sell you or offers you financial services that you do not understand or need. You may need to question the education of an advisor if they recommend products that don’t fit your needs and your budget.
People you trust are promoting the investment.
Some con artists even get down on their knees and pray with their targets to win their trust, Michelle Singletary writes in the Washington Post.
As one example, a preacher was convicted of defrauding 1,600 non-profit and small churches of nearly $9 million.
Investors who don’t have much confidence in their investing knowledge or who don’t trust their own instincts have been taken advantage of by con artists for a long time, adds Singletary. In order to promote their scheme, crooks hire people who are trustworthy.
The scam is known as affinity fraud.
The word “con” in con man means “confidence.” Con artists gain people’s trust through affiliations with religious organizations or infiltrating a circle of family or friends you might not question.
Listening isn’t their priority.
A client-advisor relationship can often be viewed as one in which one person has all the answers and the other does not. Even though some truth lies in that characterization, an advisor-client relationship is worthless without listening to the client as well.
It is especially important for a person paid to provide advice on decision-making to take into account the individual’s particular needs and circumstances. It is important to ask yourself why a financial advisor is so determined to put your money into a certain investment.
Your money needs to be directly accessible to them.
You may find it incredibly convenient to hand your checkbook over to your financial advisor so they can handle your investments. However, it’s also transferring your checkbook to someone else. Whatever trust you have in your financial advisor, you’ve just paved the way for embezzlement.
As much as possible, keep control of your finances. Your financial advisor should guide you, not drive your finances.
Their abilities and credentials are misrepresented.
A good relationship with your financial advisor depends on your trust that they are better at investing money than you are. Consider asking friends and family for recommendations before hiring any professional.
Whatever method you use to locate a financial advisor, make sure you check their credentials to ensure they are legitimate. A good place to start is to search the list of professionals on the Certified Financial Planner Board. If you want to avoid a scammer, make sure they do not misrepresent their abilities and qualifications.
Investment scams: what are they?
Investors can be fooled by investment scams through websites, testimonials, and marketing materials.
One of the most popular investment scams is a Ponzi Scheme. The goal of this is to collect money from new investors in order to repay previous investors. Eventually, the money owed is more than the money being collected and the scheme collapses, leaving all investors out of pocket.
Investment scams can be much more complex today because of the internet and digital communication. Scams like these are so convincing that even professional investors have been duped by them.
Scammers often clone legitimate websites of legitimate firms or get you to invest in scam investments that offer much better returns than savings account rates.
How to spot a financial scam?
Keep an eye out for these warning signs that an investment deal might be a scam:
- You get unsolicited calls, texts, emails, and knocks on your door.
- When you can’t contact a financial advisor.
- The only contact information they give you is a mobile number or a PO box.
- Despite being told it’s low risk, you’re being offered a high return.
- The advisor pressures you to act quickly.
How can you protect yourself from financial scams?
- Keep an eye on your accounts. Make sure there are no unauthorized charges on your credit card and bank accounts. Monitoring your online or mobile banking accounts daily can help you catch fraud fast.
- Take a look at your credit report. Make sure your Equifax, Experian, and TransUnion credit reports are up to date every year. You can get your free credit report every year from AnnualCreditReport.com, but beware of lookalikes.
- Keep track of your credit. If you want to be alerted to any activity related to your credit history and accounts, you might want to sign up for a credit monitoring service. You can use this to find out if someone is trying to steal your identity.
- Don’t forget to change your passwords. Use different passwords on sensitive accounts, and don’t reuse them.
- Be careful with online transactions. Use a secure connection when shopping online, and avoid public Wi-Fi.
- Dispose of documents properly. Shred old bank statements or other papers with sensitive info like account numbers, social security numbers, personal identifiers, etc., before throwing them away.
- All financial communication should be confirmed. Beware of scams like phishing, where scammers pretend to be banks and ask you to update or confirm your account info. Keep your account information safe by contacting your bank directly. Don’t forget the IRS won’t contact you via email, text, or social media to ask for personal info.
What’s the difference between consultants and advisors?
Consultants misleadingly call themselves experts to make it seem like they’re providing objective advice when they’re actually deceptive salespeople.
You should always be aware that anyone can call themselves a financial consultant since there aren’t many regulations. The result is that less ethical companies and individuals try to gain your trust and assets by falsely claiming that title.
Don’t forget that a consultant can help you make money decisions. However, they don’t have the certifications or licenses to provide financial advice or manage your money.
In other words, a consultant might not be authorized to manage your assets because they don’t have the right qualifications.
There’s no law that says consultants can advise you on the best option. As a rule of thumb, if a consultant appears to offer financial advice, they shouldn’t offer investment or financial advice.
What to do if you think you’ve been targeted?
Despite the fact that you may not be able to recover all of your losses, it’s imperative to report the crime as soon as possible. To get started, take the following steps:
Put together a fraud file.
Make a file with all the relevant documentation about the fraud and keep it somewhere safe. It should include the name, contact info, and website of the perpetrator. In addition, include the fraudster’s purported regulatory registration numbers, if available, and the timeline of events.
Be aware of your rights.
Victims of crimes have rights under federal and, in some cases, state laws. To better protect yourself, learn about your rights. To learn more about your rights as a crime victim and the resources available to you, contact the U.S. attorney’s office in your area, as well as the attorney general’s office in your state.
Inform regulators about fraud.
The federal, state, and national regulatory agencies for investment products and professionals may be able to assist. If possible, notify as many agencies as possible about the investment fraud.
- U.S. Securities and Exchange Commission: (800) SEC-0330 or submit a complaint.
- FINRA: (844) 574-3577 or report a tip.
- NASAA: (202) 737-0900 or send a complaint.
- National Association of Insurance Commissioners: Contact your state insurance commissioner if you suspect fraud.
- National Futures Association: (312) 781-1410 or file a complaint.
- U.S. Commodity Futures Trading Commission: (866) 366-2382 or send an online tip or complaint.
Also, you might want to file a complaint with the Federal Trade Commission (FTC) or call them at (877) 382-4357. Fraud that is reported to the Consumer Sentinel database is tracked by law enforcement, which can stop ongoing fraud and stop such crimes from happening in the future. If you go through this process, your case will not be investigated criminally.
Report the fraud to law enforcement.
For the recovery process to begin, the responsible parties need to be investigated, and further damage to other individuals can be prevented by reporting the investment fraud to the police.
- Local Law Enforcement: File a police report with your local law enforcement agency.
- District Attorney: Get in touch with your local district attorney.
- Attorney General: Report the fraud to the consumer protection and prosecution unit of your state’s attorney general.
- Federal Law Enforcement: Submit your tip online or contact your local FBI office. You can also file a complaint through the FBI’s Internet Crime Complaint Center.
Take into account your options.
When assets are lost due to investment fraud, it can be difficult to recover them. The situation is not hopeless, however, as there are legitimate avenues to explore. An arbitration, mediation, or civil lawsuit may help you recoup some of your lost assets.
An experienced civil attorney can advise you on which remedies may be available to you depending on your case if you’re considering filing a lawsuit for financial fraud. Although civil lawsuits can take time and cost money, you should know that they can take a long time and cost a lot. In addition, you may have difficulty collecting even if you win.
The post Financial Advisor Scammers – How to Spot Them From a Mile Away appeared first on Due.
Read Now: The 7 Myths To Follow Your Creative Pursuits – 101 Latest News
#Myths #Follow #Creative #Pursuits
Marketing Podcast with Kate Volman
In this episode of the Duct Tape Marketing Podcast, I interview Kate Volman. She is the CEO of Floyd Coaching. With over twenty years of experience in developing and leading life-changing programs for entrepreneurs and leaders, she has a passion for helping people grow.
Her new book Do What You Love: A Guide to Living Your Creative Life Without Leaving Your Job shares the seven myths stopping people from exploring their passions and dreams.
Pursuing your creative passions and incorporating them into your life can greatly enhance your overall engagement and fulfillment. It doesn’t require quitting your job or making it your career; you can still be creative while working full-time. Many people hesitate to pursue their passions because they feel they need permission or are waiting for the perfect moment. However, true growth and success come when we give ourselves permission to start creating, even if it’s not perfect.
It’s important to challenge the myths that suggest it’s not possible, that you’re not good enough, or that you need a specific reason to pursue your creativity. Your creative pursuits are inside of you for a reason and they’re not going anywhere, It’s up to each one to feed them to improve.
Questions I ask Kate Volman:
- [01:42] Why you built that caveat into this book?
- [05:50] Do you think that as a team leader, you should be trying to find out what are the passions of other team members? Is that crossing the line or is that something that you think would be a healthy business relationship?
- [08:10] The book is set up around seven myths that you must hear from time to time when you encourage people to follow their dream. So when people have a job, and think it’s impossible to follow their dreams, how do you bat that myth down?
- [09:22] Can you explain the second myth: You’re not good enough?
- [15:25] On the fourth myth, do you think we probably assign the need for permission to all of the responsibilities that we have?
- [17:00] What do you tell people when they say they don’t have time to follow their creative passions?
- [19:24] Some people may not want to develop their creative pursuits because they may think that what they’re doing is not perfect, what do you think of that?
- [22:48] Talking about the passion loop, there’s a part missing out and not doing the things you want. So, it’s like a vicious cycle, isn’t it?
More About Kate Volman:
More About The Agency Certification Intensive Training:
Take The Marketing Assessment:
Like this show? Click on over and give us a review on iTunes, please!
This episode of the Duct Tape Marketing Podcast is brought to you by the HubSpot Podcast Network.
HubSpot Podcast Network is the audio destination for business professionals who seek the best education and inspiration on how to grow a business.
Read Now: California lawmakers and AV industry battle for future of self-driving trucks – 101 Latest News
#California #lawmakers #industry #battle #future #selfdriving #trucks
A California bill that would require a trained human safety operator to be present any time a heavy-duty autonomous vehicle operates on public roads in the state is getting traction. The bill, first introduced in January, passed the state’s Assembly Wednesday and will now face a committee review and vote in the Senate.
Advocates of the bill want to ensure both the safety of California road users and the job security of truck drivers. AV companies and industry representatives say the move is unreasonable, threatens California’s competitiveness in the AV and trucking space, and hinders the advancement of a technology that can save lives.
“AB 316 is a preemptive technology ban that will put California even further behind other states and lock in the devastating safety status quo on California’s roads, which saw more than 4,400 people die last year,” said Jeff Farrah, executive director of the Autonomous Vehicle Industry Association, in a statement. “AB 316 undermines California’s law enforcement and safety officials as they seek to regulate and conduct oversight over life-saving autonomous trucks.”
If the legislation passes in the Senate, it’ll go to Gov. Gavin Newsom’s desk to be signed into law, unless Newsom decides to veto. While Newsom has received huge donations from big tech companies and recently buddied up to tech billionaire Elon Musk, the politician has also been known to crack down on technology that puts his constituents at risk.
Risk and safety is what the conversation around AB 316 comes down to. Bill authors and supporters have pointed to instances when robotaxis malfunctioned on city streets in San Francisco and Teslas operating under the automaker’s advanced driver assistance systems like Autopilot have caused fatal accidents.
“California highways are an unpredictable place, but as a Teamster truck driver of 13 years, I’m trained to expect the unexpected. I know to look out for people texting while driving, potholes in the middle of the road, and folks on the side of the highway with a flat tire. We can’t trust new technology to pick up on those things,” said Fernando Reyes, Commercial Driver and Teamsters Local 350 member, in a statement. “My truck weighs well over 10,000 pounds. The thought of it barreling down the highway with no driver behind the wheel is a terrifying thought, and it isn’t safe. AB 316 is the only way forward for California.”
The bill does not ban companies from testing or deploying self-driving trucks on California’s public roads. It only insists that a trained human driver be present in the vehicle to take over in case of an emergency.
The California Department of Motor Vehicles, the agency tasked with providing testing and deployment permits for AVs in the state, still has a ban on autonomous vehicles weighing over 10,001 pounds in the state. In anticipation of the DMV soon lifting that ban, AB 316 effectively limits the DMV’s future authority to regulate AVs, power the agency has held since 2012. If passed, the DMV would not be able to sign off on autonomous trucking companies removing the driver for testing or deployment purposes unless the legislature is convinced that it’s safe enough to do so.
Additional language was added to AB 316 to outline the role the DMV will play in providing evidence of safety to policymakers.
By January 1, 2029, or five years after the start of testing (whichever occurs later), the DMV will need to submit a report to the state that evaluates the performance of AV technology and its impact on public safety and employment in the trucking sector. The report will include information like disengagements and crashes, as well as a recommendation on whether the legislature should “remove, modify or maintain the requirement for an autonomous vehicle with a gross weight of 10,001 pounds or more to operate with a human safety operator physically present in the vehicle,” according to the bill’s language.
Once that report is handed over, the legislature will conduct an oversight hearing. If the legislature and the governor approve of removing the human safety operator requirement, the DMV will still need to wait another year after the date of the hearing to issue a permit. That means California might not see autonomous trucks operating with no human in the front seat until 2030 at the earliest.
“If enacted, AB 316 will make California an outlier by prohibiting autonomous trucks from operating on their own unless approved by the [California Legislature] through a convoluted process,” said Safer Roads for All, a coalition of AV advocates. “Let’s hope other states are more sensible and let road safety experts do their jobs.”
Read Now: Stay Cool and Stylish This Summer With These Outfit Ideas for College Students – 101 Latest News
Read Now: Rihanna's New "Use a Condom" Shirts Are Wonderfully Ironic – Buy Your Own Here – 101 Latest News
Read Now: I Look at Nordstrom Daily—30 Anti-Trend Finds I Can't Stop Thinking About – 101 Latest News
Read Now: 43 States to 6 States, Says the S. Ct. About Shall-Issue Concealed Carry Rules: What's the Missing State? – 101 Latest News
Read Now: T-Mobile will use Starlink satellites to blanket the US with text coverage – 101 Latest News
Read Now: Indian Gang Used Bill Gates Quotes To Pull Off A $2M Cryptocurrency Scam – 101 Latest News
Politics11 months ago
Read Now: 43 States to 6 States, Says the S. Ct. About Shall-Issue Concealed Carry Rules: What's the Missing State? – 101 Latest News
Tech9 months ago
Read Now: T-Mobile will use Starlink satellites to blanket the US with text coverage – 101 Latest News
Business11 months ago
Read Now: Indian Gang Used Bill Gates Quotes To Pull Off A $2M Cryptocurrency Scam – 101 Latest News
Politics9 months ago
Read Now: "When You Are Not With Where a Majority of Americans Are, Then, You Know, That Is Extreme" – 101 Latest News
Fashion11 months ago
Read Now: Color Splash: Jill Kortleve Models Massimo Dutti’s New Arrivals – 101 Latest News
Business11 months ago
Read Now: Scale Your Design Production Automatically with Robolly – 101 Latest News
Politics4 months ago
Read Now: PredictIt Helps Forecast Election Results. Bureaucrats Are Trying To Kill It. – 101 Latest News
Business11 months ago
Read Now: Delta Air Lines Just Made a Big Apology, and It's a Lesson in Effective Leadership – 101 Latest News