Video content, particularly that produced in concert with Snapchat Discover and Facebook Live, would become a dominant theme throughout the program. If there was one thing Hearst wanted media buyers to take away from its hip, “house party” styled Newfronts presentation atop Hearst Tower Wednesday evening, it was that the legacy magazine publisher is committed to reaching millennials. Really, really committed. The shirtless male dance crew that kicked off the evening’s proceedings to the tune of Ginuwine’s “Pony” may have been met with initial confusion from the attendees hastily seeking drink refills from the stage’s adjacent full bars, but all was explained when actor Channing Tatum and Hearst Digital Media SVP Lee Sosin took to the stage to reveal a year-long content partnership between Cosmopolitan and “Magic Mike Live,” a Vegas installation based on the hit films. The exclusive content deal will include multiple video series, Facebook Live broadcasts, Snapchat takeovers, and virtual reality. Snapchat’s VP of content, Nick Bell, lauded Hearst’s embrace of the app’s Discover publishing platform. Expanded content partnerships were revealed, exclusive to Discover, including “SnapHacks,” a series of advice videos covering food, fashion, beauty, and fitness produced by Cosmopolitan; and “The Sweet Guide to a Better Life,” designed to help viewers expand their cultural horizons. Credit: Hearst Magazines Troy Young, president of Hearst Magazines Digital Media, touted the company’s massive success in digital video production—over 350 million video views monthly with 100 new videos produced each week—before stating, “If you want to connect with millennial audiences, you need to get Snapchat right.” Other notable video launches in the works include “WhoHaHa,” an original comedy series developed by Cosmopolitan and actor/comedian Elizabeth Banks; Elle.com’s “How Do I Wear That?,” meant to bring the latest runway looks from Paris and Milan into the everyday woman’s closet; Esquire’s “How to Be a Man,” depicting hapless former Cosmo staffer Frank Kobola attempting to carry out “manly” tasks (you see, millennials love rigid gender norms but hate manual labor); Manhood, a documentary series taking a more serious look at what it means to be a man in the 21st century; and “The Younger Games,” following Kelly Deadmon’s irreverant and comedic attempts to look younger. Esquire’s new editor-in-chief, Jay Fielden, previewed his new celebrity and style game show, “Who’s That Guy,” which will be broadcast on Facebook Live (Hearst plans to produce over 200 Facebook Live broadcasts each month, according to Todd Haskell, SVP and CRO of Hearst Magazines Digital Media). A sizzle reel followed Tatum’s departure from the stage, depicting the digital initiatives Hearst’s various brands have been taking and culminating in one all-encompassing mantra: “Hearst. We make good sh*t.” For those over-35’s reading this, millennials apparently don’t have time for verbosity or austere decorum. Millennials just want good shit. “The star of every video we make is the person watching it,” said Sosin. “Whether it’s smart service, hilarious comedy, or inspiring journeys, everything is audience-first and built to be shared.” If anything was clear to those taking the 40+ floor elevator descent back to ground level at Hearst Tower Wednesday evening, it’s that Hearst knows who its partners want to reach, and it’s doing everything it can to get them there.
Game of Thrones season 8, episode 4: How to watch, leaks, recaps, avoiding spoilers and how to stream HBO without cable Thanos vs. Game of Thrones Night King: Here’s who’d win Game of Thrones season 8: How to adjust your TV for a cinematic picture Here’s me thinking this episode would be a celebration #GameOfThrones pic.twitter.com/1BQiCa6aQw— Joeyyy (@_Joseph590) May 6, 2019 The 38 most gut-wrenching Game of Thrones deaths, ranked Comments OH NOOOOOO. NOT THE DRAGONNNNNNN. #GoT #ThronesYall pic.twitter.com/52CoNbI6oc— Brittany Packnett (@MsPackyetti) May 6, 2019 Game of Thrones images too dark? We can help *MILD SPOILERS*… Culture TV and Movies Now playing: Watch this: WHAT THE WHOLE FUCK IS HAPPENING?!?!?! THIS FUCKIN ASSHOLE!!!!!!!!!! BURN THEM ALL!!! @HBO @GameOfThrones #GoT #Season8 #DemThrones #Episode4— T-Pain (@TPAIN) May 6, 2019 Did we just lose another dragon?!? Wtf?!? #GameofThrones pic.twitter.com/HTngwEfAJ6— the.blogging.jedi (@TonyStarksWard) May 6, 2019 Rhaegal after being shot by Euron three times #GOT #GameofThrones pic.twitter.com/PcghYP18oV— colby (@originalgenome) May 6, 2019 Related stories Not the dragon!! Not him!! He should stay back! #GameofThrones pic.twitter.com/fguDMwcx6K— Yerlin (@Marlet_Yerlin) May 6, 2019 NOOOOOO THAT DID NOT JUST HAPPEN #GameOfThrones pic.twitter.com/Li74D2gUiL— t h o m a s (@RIPeterParker_) May 6, 2019 Tags Me: “Oh, he only got hit by one spear he might be okay…”*Gets shot in the throat***Sinks to the bottom of the ocean**#GameofThrones #Rhaegal pic.twitter.com/uN1tbkEqyk— Dr.Pibb🌶️ (@MichaelDiAcri) May 6, 2019 Why? HBO Look, we’re used to heart-wrenching deaths on Game of Thrones, but this is different. This totally sucks.What are you doing to us here? Why would you do this?OK, here’s your obligatory spoiler warning for episode 4 of this final season. Can we talk now? OK, let’s talk.They killed a dragon. They killed another goddamn dragon. Rhaegal to be specific. People are upset. Hell, I’m upset. The Night King doing the whole “you’re an ice dragon now” to Viserion was pretty bad, but this might actually be worse.Mainly because of who did the killing. 38 Photos I can’t handle Dany losing anymore dragons #GOT #GameofThrones pic.twitter.com/zce6jJxIFK— colby (@originalgenome) May 6, 2019 5:13 Rhaegal didn’t deserve surviving his ice dragon brother to be killed by bitch ass Euron!!!! #GoT pic.twitter.com/F2XjqDPLeB— MissFit Harley (@MissfitHarley) May 6, 2019 And then there was 1! 😢😩 #GameOfThrones #GOT— MeLAnIn JunKIE (@xLuv_N_Myself) May 6, 2019 Share your voice 8 RIP Rhaegal, you were almost all healed up for battle, you sweet baby you. RIP Missandei, you were the realest and you had the most poppinest wash-n-go in all the 7 Kingdoms until the very end. pic.twitter.com/MYA6KisIWh— 🐝HTHMSCTHMING🐝 (@_BeNiceOrLeave) May 6, 2019 RIP Rhaegal, you were almost all healed up for battle, you sweet baby you. RIP Missandei, you were the realest and you had the most poppinest wash-n-go in all the 7 Kingdoms until the very end. pic.twitter.com/MYA6KisIWh— 🐝HTHMSCTHMING🐝 (@_BeNiceOrLeave) May 6, 2019 Rhaegal died thanks to Euron Greyjoy and Cersei’s gigantic dragon crossbow thing — this is a problem. Euron sucks. Not in a good, “Hi, I’m Joffrey the best villain in TV history kind of way.” In a bad, “my character is a bit weird and people don’t really like me” kind of way. In wrestling, they call this “X-Pac heat.”Anyway, Twitter got real upset about Rhaegon essentially getting murked by Euron’s fleet. Rightfully so in my humble opinion. With Rhaegal kicking the bucket and Jon Snow putting Ghost up for adoption, it was truly a difficult episode for the pets. Game of Thrones
The newly elected Narendra Modi government is set to present its first Budget on 10 July, three days after the Budget session begins in Parliament.Here are some facts about the Union Budget you should know:The Union Budget is a financial statement of the government’s revenue and expenditure for one fiscal year (April to next March). According to Article 112 of the Indian Constitution, the Union Budget is a statement of the estimated receipts and expenditure of the government for that particular year. In other words, the Union Budget keeps an account of the finances of the government for a fiscal year.The presentation of the Union Budget is preceded by the Economic Survey, which lays down the ground for the Budget by indicating its direction and showcasing the economic performance of the country. This year, the Economic Survey will be presented on 9 July, a day before the Union Budget is presented by Finance Minister Arun Jaitley on 10 July.The Union Budget comprises two aspects – the Revenue Budget and the Capital Budget.The Revenue Budget entails the revenue that the government gets, mainly from taxes and other sources. The Revenue Budget also looks at the day-to-day expenditure of the government.The Capital budget entails capital receipts, which cover the loans that the government raises and capital payments which include government expenditure on the acquisition of assets.The Union Budget is presented by the Finance Minister before the fiscal year begins, usually at the end of the month fo February. However, during the elections, an Interim Budget is passed to be in effect till the next government comes to power and brings out its Budget. An interim Budget is passed through a Vote on Account procedure and is applicable for a limited time period.The first Union Budget of India was presented in 1947 by RK Shanmukhan Chetty. Here is the documented speech made by the first Finance Minister of India.The Union Budget 1950-51 was the first to give the foundation for the Planning Commission, an institution that formulates five-year economic plans for the country.The Union Budget 1991-92 by the then-finance Minister Manmohan Singh opened the gates for economic liberalization as import-export policy was revised and import duties were cut.The Union Budget 2014-15 will be the first budget to be presented after Narendra Modi became the Prime Minister of India in May 2014.
Sheikh HasinaPrime minister Sheikh Hasina on Saturday said Bangladesh’s democracy is now well-protected and it has earned the capability to face any disaster.“Our economy has stood on a solid ground and democracy is well-protected … we’ve been able to ensure fundamental rights of the people like food, clothes, housing and education,” she said.The prime minister made the comments before media after exchanging Eid greetings with the cross section of people, including party leaders and workers, professionals, judges and foreign diplomats at her official Ganabhaban residence here this afternoon.Sheikh Hasina said Bangladesh is now economically developed and the people’s purchasing capacity has increased and their living standard has improved significantly.She said the literacy rate and the people’s average life expectancy have gone up and Bangladesh got recognition as a developing country thanks to various steps of her government.Putting emphasis on maintaining the continuation of the development, the premier said the country had to cross many hurdles to earn this success.“We’ve to also cross many barriers in future to advance the country and it’s natural … we keep capability to face any disaster,” she added.The prime minister reiterated her determination to build a hunger and poverty-free country by 2021 and developed and prosperous country in South Asia by 2041.“The people of the country will also celebrate the birth centenary of Bangabandhu in 2020 by establishing Bangladesh as a hunger and poverty-free country,” she said.“We want that we could move on the world stage by keeping our head high and we’re building the country in this way and Insha Allah the country will advance in that way,” she added.At the outset of her speech, Sheikh Hasina greeted the countrymen and expatriate Bangladeshis on the occasion of holy Eid-ul-Fitr. “I want that the people will live in joyous environment throughout their life and it’s my wish that they will live beautifully,” she said.She also paid rich tributes to Bangabandhu, four national leaders, three million martyrs and two lakh mothers and sisters who sacrificed their life for the cause of the country.The gate of the Ganabhaban was opened for visitors at 9.30am when people from all walks of life started coming after their Eid prayers and waited in a long queue to meet the prime minister. On the occasion the big lawn of Gonabhaban was tastefully decorated.Leaders of different political parties, parliament members, freedom fighters, educationists, senior journalists, leaders of associate bodies of Awami League and different professional and trade bodies as well as the cross section of people including beggars and destitute exchanged Eid greetings with the prime minister.Agriculture minister Begum Matia Chowdhury, LGRD minister Engineer Khandakar Mosharraf Hossain, AL presidium members Sheikh Fazlul Karim Selim, Muhammad Faruk KhanDr Abdur Razzak and Sahara Khatun, central leaders Mozaffar Hossain Paltu, Jahangir Kabir Nanak, Ashim Kumar Ukil, Khalid Mahmud Chowdhury and Dhaka South City Corporation mayor Sayeed Khokan were present, among others.Like previous years, some of the visitors took the programme as an opportunity to draw attention of the top executive of the country to their woes and sufferings and sought her intervention and support to resolve those problems.Later, Sheikh Hasina exchanged Eid greetings with judges of the Supreme Court, senior civil and military officials and ambassadors and high commissioners of different friendly countries at a separate programme on Ganabhaban lawn.Jatiya Sangsad speaker Shirin Sharmin Choudhury, chief justice Syed Mahmud Hossain and the chiefs of the three services attended the function.
The Baltimore Humane Society’s Black Tie & Tails Gala is 6 p.m., March 28 at the Grand Lodge, 304 International Circle, Hunt Valley, Md. The formal affair includes well behaved animals who can attend free. Tickets are $125 per person until March 13. The price goes up to $149. Tickets can be purchase by calling 410-833-8848 ext. 212.
Kolkata: A sea of humanity defied torrential rain and inclement weather on Saturday to attend the July 21 Martyrs’ Day rally, where Chief Minister and Trinamool Congress supremo Mamata Banerjee spelt out the party’s strategy in the 2019 Lok Sabha elections.Lakhs of people were witness to a historic announcement which would mark a definite “movement” of a sort from this day onwards for the Trinamool Congress workers and its leaders with their task cut out for the forthcoming 2019 Lok Sabha polls. Also Read – Rain batters Kolkata, cripples normal lifeA confident Mamata Banerjee, more passionate than ever, with an unflinching pledge to free India from the clutches of the BJP, announced: “We will win all the 42 Lok Sabha seats in the state. It is our pledge. We will oust the BJP to save the country. We will organise a big rally here in January and invite all the (Opposition) leaders.”The Trinamool Congress will organise a rally at the Brigade Parade Ground on January 19, 2019, which will be attended by all the Federal Front leaders to usher in the BJP’s collapse. Speaking on the 25th anniversary of the Martyrs’ Day programme, the Chief Minister said: “The gathering at the Brigade will be more than today’s rally and I will request all the Federal Front leaders to address the meeting. We do not care for the chair but we are more concerned for the people of this land. We will show the way to Parliament.” She also instructed the party leaders to start preparations for the grand rally from November itself, immediately after the Durga Puja. Also Read – Speeding Jaguar crashes into Mercedes car in Kolkata, 2 pedestrians killedShe also charted out the party’s programmes for the next few months. On July 27, Nanoor Divas will be celebrated and Firhad Hakim along with Anubrata Mondol will address the gathering. On July 28, party’s youth Congress president Abhishek Banerjee along with Partha Chatterjee, Firhad Hakim, Kalyan Banerjee and Suvendu Adhikari will address a rally at the Midnapore College ground, the venue from where Prime Minister Narendra Modi had addressed the rally on July 16. From August 1 to 15, meetings will be held all over the state to spread the message of communal harmony. On August 9, Mamata Banerjee will be present at a meeting in Jhargram where the theme will be “BJP, quit the country”. The meeting will be held to remember the Quit India movement which was organised against the British Rule in 1942. In September, the party will celebrate Teachers’ Day in which teachers from various schools, colleges and universities will be felicitated in every area. A convention will be held on September 17 under the leadership of Abhishek Banerjee. Coming down heavily on the BJP, Banerjee predicted that the saffron party will not be able to get more than 100-150 seats in the 2019 Lok Sabha polls as the situation will be completely different. She said the BJP had secured 325 votes while the Opposition got 126 votes at the no-confidence motion held on Friday because “AIADMK had voted for the BJP but the MPs would not have voted for the party had Jayalalithaji been alive. In 2019, Stalin will get the seats.In Uttar Pradesh, if Mayawatiji and Mulayamji join hands, then the BJP’s seats will come down to 30.In Madhya Pradesh, now the BJP has 28 seats which will come down to one fourth. In Rajasthan, the party has 25 seats which will come down to 5. In Bihar, Laluji will get more seats. In Gujarat, the BJP will not get any seat. In Bengal, the TMC will get all the 42 Lok Sabha seats.” She further added: “The number of votes the BJP got on Friday was on the floor of the House but outside, the scenario is totally different and take it from me that the BJP will not win in 2019 as people will not vote for the party.”Calling the BJP a “sword brandishing or gun-toting Hindu,” she said the BJP has actually insulted Hinduism. “We do not accept the BJP’s Hindutva. The party has insulted Hinduism. We follow the Hinduism that has been professed by Sri Ramakrishna and Swami Vivekananda. We believe in tolerance and universal acceptance,” she maintained.Accusing the BJP of spreading hate politics, she said throughout the country, the party is trying to divide society. Referring to the statement made by the Prime Minister and Home Minister Rajnath Singh in Parliament on Friday that the state governments should take stern action to stop lynching, she said: “The party should first try to control the language of the state president. He talks about burning down police stations and assault the TMC supporters, thus polluting the social environment.” She added: “The BJP is involved in lynching throughout the country and the leaders have blood on their hands.”Banerjee said Congress leaders in Bengal should decide whether they will go with the TMC or not. “In Delhi, we are supporting them but here the Congress, CPI(M) and the BJP have joined hands against us. This cannot be tolerated.”Referring to the collapse of the pandal at Modi’s rally in Midnapore, she said: “The party that cannot prevent the collapse of a pandal, how do you expect them to run the country properly? But it is not about the pandal. They are trying to divide the country and this trend is dangerous.”The Chief Minister said canards are being spread against the TMC over the Panchayat elections. “In Uttar Pradesh, 71 percent seats are won uncontested while in Sikkim 85 percent seats are won unopposed but no one says anything about that. In Panchayat elections, local issues and candidates are important and in Jhargram, even the TMC could not file candidates in several seats but I did not complain about it. I pity those who fail to understand this small equation.”
PC’s aren’t that different from a lot of us: They just sit around all day getting flabby. So if you want to squeeze another year out of your machine–or even retrofit it with Windows Vista in ’07–there’s no better time to put it on a regular program of tuning up and toning up.I don’t know your machine personally, of course. But even if it isn’t bogged down with Trojans and spyware (as so many are), just the way Windows goes about its business will pack flab on the fastest hunk of hardware. A PC’s Registry can get cluttered with outdated keys that waste processor cycles and have marginally useful or even harmful proc-esses in system memory. Just one day of computing will thoroughly fragment a C: drive. And out-of-shape PCs are more likely to be pushed around by hackers.We’ve covered the security aspect before, so let’s fast-forward through that discussion: Run Windows Update regu-larly and use ZoneAlarm Internet Security Suite as well as Mozilla’s Firefox browser and its Thunderbird e-mail editor. Install Lavasoft Ad-Aware and Spybot-S&D to nuke new bugs that sneak through your firewall. You may even need a specific tool like Trend Micro’s CWShredder for some strains. ZoneAlarm is $50 (all prices street); the rest are free.As for keeping your PC in shape, we’re not talking about triathlon shape, which would mean spending half your workdays on computer maintenance. But if your computer is going to load Windows and browse the web without wheezing, its disks, memory and Windows Registry need regular tuneups.Whose PC Is It?Theoretically, you control what gets put onto your hard drives and into system memory by clicking icons. But in reality, the only PC property rights you have are those you’re prepared to enforce–which has become pretty complicated since you signed up for broadband.A lot of programs and web pages today treat your PC as though they own it. Remember that “I accept the license agreement” button? They consider that carte blanche to load whatever self-serving processes they want, hold onto as much RAM as they can and, when unloaded, leave behind a Fourth of July weekend’s worth of litter.You shouldn’t have to spend your time policing your machine, but if you don’t, you’re going to be exploited. As with security, start with a good general-purpose suite like Symantec’s $70 Norton SystemWorks 2006 or Iolo’s $50 System Mechanic 6. Both are jumbo toolboxes of scanners and utilities that will root out and fix 95 percent of your PC snafus, and you can choose whether they do it en masse or one problem at a time.It’s My ProcessJust for fun, I ran a couple of PCs for several weeks without maintenance to see how much plaque would build up. Norton’s scanners uncovered 118 invalid ActiveX entries, three invalid application paths, five missing file extensions, seven invalid help files, 38 broken shortcuts and 10 missing shared files on one. System Mechanic found a similar complement of system snarls on the other, along with 430MB of unneeded Windows and internet files. Both C: drives were a mess, and one had about 200MB worth of system memory tied up by processes whose applications were no longer running.With a couple of mouse clicks, both suites had most of that junk swept out and Registry and RAM tuned so programs could load and unload cleanly. Some jobs, like disk diagnosis and optimization, are better addressed individually so you can determine the which, when and how. In fact, even though you could schedule most maintenance tasks to run automatically at off-peak times, that’s not a good idea. Any program that can change a PC the way these suites can needs supervision.It can seem foreign at first, but over time, these scanners and sweepers will help you get to know what’s going on behind your foreground applications. Launch Windows Task Manager (press Ctrl-Alt-Del) and you’ll see that every machine has a couple dozen strange-sounding processes running all the time. Which are Windows services, which belong to your applications, and which are potentially harmful strangers?Task Manager won’t say. But the alternative process viewers in System Mechanic and SystemWorks can help you decipher them. Problems vary, so you may also need Codestuff’s Starter and HijackThis–a shareware pair favored by blogs and forums that helps solve parasite problems.I wish you just needed to buy one program and push one button. But it’s 2007, the bad guys are clever, and you can’t afford not to keep up. There’s no such thing as being fat and happy anymore.Personal TrainersThese sites help you figure out what’s necessary, what’s safe and what’s not.Shieldsup!: This Gibson Research site will probe your perimeter every which way to tell whether yours shields are UP!Tech Support Forum: Got a question? Someboy in this geek nation should have the answer.Winguides:Support forums and other technical resources maintained by PC Tools, publisher of several PC tuneup utilities.Spywareinfo:Volunteer sysops will hold your hand while you remove spyware and other bric-a-brac from system memory.Spyware Warrior: A list of what’s naughty and what’s nice out there. Mike Hogan is Entrepreneur’s technology editor. This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now January 1, 2007 This story appears in the January 2007 issue of Entrepreneur. Subscribe » 5 min read Enroll Now for Free
Opinions expressed by Entrepreneur contributors are their own. This week, a teenage high school student reportedly hacked into the email account of CIA Director John Brennan and posted personal details to WikiLeaks. Granted, Brennan was using an AOL account, and the hack was likely a “social engineering” attack, in which personal information, most likely obtained by using information easily found online, was used to break in.Regardless, if the email for the CIA director is not safe, what chance do we have?If you think that having an email hacked is the worst that could happen, consider someone using your information to order countless pizzas, call in bomb threats or make racist comments on your behalf online. This is the terrifying case of Paul and Amy Strater, a middle class couple from Oswego, Ill., whose lives became the unfortunate collateral damage of a cyber war raged against their teenage hacker son, who unwisely picked a fight with another (and better) hacker in an online chat room he frequented.Mike Schroll, the VP of business development for PC Pitstop, a creator of security and performance software, is a former hacker and made his living professionally hacking into and identifying vulnerable areas in the cyber infrastructure of large organizations.Related: Don’t Wait for a Disaster to Interrupt Business. Prepare Now.Schroll points out that several layers of cyber security exist, like an onion — both of which, if hacked, will cause many tears — and entrepreneurs and business managers need to be aware of all the layers to best protect a company’s cyber infrastructure from threats.1. Social engineeringThe first layer is protecting your company from attacks from afar. Hackers have been known to find general information about an individual online — we do, after all, share everything about ourselves on social media — and use this information to manipulate employees of companies, such as banks, to disclose personal and sensitive information. While these disclosures are a failure on the part of the employee, more often it is a systematic failure of the organization to train and emphasize security protocols.Schroll suggest that you make certain you have stated security processes that are reviewed with your employees and tested often. Have a process to verify callers and never disclose passwords or other sensitive customer information.2. Physical securityWhile you may believe your building and technology — and hence your sensitive information — is safe and secure physically, good hackers know “tricks” that will allow them to penetrate even this layer of security. Additionally, many business owners pay little attention to other physical aspects of their companies’ operations that pose a threat, such as leaving computers exposed or failing to destroy old hard drives.As with other employees, these physical security breaches are not always an issue with the security personnel but rather the organization’s general security protocols. Schroll recommends that you encrypt your drives, leverage cloud backups, enclose any hardware ports exposed to the public, have old hardware disposed by professionals and use theft recovery software, such as Prey Project, on business devices.3. Wireless securityYour wireless Internet also poses a threat to your company. We often forget that Wi-Fi signals can extend much farther than the walls of our offices, and a hacker with a good antenna can connect to your signal from far away. Once in your network, file shares without protection or computer accounts that have simple passwords become an easy channel for getting to other sensitive information.Schroll says companies should be using WPA2 protocols, not the antiquated WEP or WPA. Additionally, your router password needs to be as strong as all other passwords. Never use a default password and make certain it is nothing that can be easily guessed (your company address, for instance).4. PasswordsAccording to Schroll, passwords are like underpants — they need to be changed often, kept private and never shared with anyone. The best passwords are long, use a combination of uppercase and lowercase letters, numbers and symbols, and are different across accounts.Schroll suggests using phrases, which are easier to remember. For example, consider this famous phrase from the movie, Forrest Gump, “Life’s a box of chocolates, Forrest. You never know what you’re gonna get,” which would translate to a very effective password “L’aboc,F.Ynkwy’gg.”While keeping track of all of these passwords may be overwhelming, consider a service, such as 1Password or LastPass to maintain and keep your passwords secure.Related: Apple’s New 6-Digit Passcodes: What Do They Mean for Your BYOD Policy?5. Two-factor authenticationEven with difficult passwords, good hackers still have ways to penetrate account security. For this reason, businesses should strongly consider using two-factor authentication (2FA). Most large companies, such as Google, Apple and Dropbox, offer 2FA with a mobile phone number or email account, and apps such as Authy and Google Authenticator can help you implement it with other apps and services.As more secure methods continue to be developed, such as fingerprint and facial recognition and even ultrasonic sounds, companies should not shy away from updating security measures as often as needed to stay ahead of hackers.6. Email securityIf you protect nothing else, Schroll emphasizes the need to at least protect email accounts. Consider that once hackers get into an email account, it is not difficult to get access to other accounts, considering your email account is typically how you reset forgotten passwords. While it is old news, Schroll says to never click links in emails or attachments, as many take you to phishing sites that look remarkably like real sites. Instead, open a website by creating a new tab on your browser and typing the website URL.Schroll goes further to recommend using Gmail and Google Apps (with 2FA, of course), as Google has superior spam, virus and phishing protections.7. Anti-virusMost anti-virus software has services that assist in keeping email accounts and other sensitive information safe. Even the best software, however, has vulnerabilities. Malicious software viruses are being created at breakneck speed, and virus-protection companies have difficulty keeping track of all of them on their “blacklists.”For this reason, businesses should consider using a service that employs a “whitelist,” such as PC Matic. With whitelist protection, the security only allows software and programs that are pre-approved to be downloaded, adding an additional layer of protection to your system.Understand that your business stands a very, very good chance of getting hacked — it is just a matter of when. Take the appropriate measures to secure your hardware, software and cloud accounts, and have a clear, detailed and stated information and technology security policy.Remember: Stay out of online chat rooms and never, under any circumstance, mess with teenage hackers or anyone with a profile name that sounds like a mob boss or fantasy wizard with too many misplaced uppercase letters.Related: 5 Growing Cyber-Security Epicenters Around the World Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now Enroll Now for Free 6 min read This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. October 26, 2015