This here is “Elvis Won’t Fix Your Computer” a song written, composed, and performed by Greg Johnson. It’s a dandy of a song, and I hope y’all enjoy it.
In this video I talk about adjusting exposure for greater impact, and also how going for a bike ride early in the morning can help get you to the right place at the right time for sunrise photos. Recorded 23 Aug 2017.
This is a video of my first woodworking project in recent years. It’s a charity box. I talk about the tools and methods I use when woodworking. This was recorded from 22-25 August 2017.
“On Monday, 25 July 2016, I was interviewed by our local Fox News affiliate on the topic of email security. The report is archived below, the original is online.” ~ Greg Johnson
CEDAR RAPIDS, Iowa (CBS2/FOX28) — Hackers have already disrupted the Democratic Party after releasing many damaging emails from the Democratic National Committee. They were embarrassing for party leaders and will likely result in at least the party chair stepping down this week.
But IT security for political groups and organizations at many different levels often balances on human error.
Running a campaign is a lot like a small business. There’s plenty of things to spend money on. With so much technology all around us, it’s often not an area where campaigns spend a lot of extra resources.
Physical protection is generally something we think politicians and their Secret Service Agents get right, especially at the highest levels.
Online, IowaCityTechnologyServices.com Director Greg Johnson says even they fall short.
“There are just so many points of failure,” said Johnson.
CBS2/FOX28 spoke to local campaigns and elected officials from both major political parties about their IT security. They say, generally, campaign staff email is handled through services like Google’s Gmail and some additional security options within those programs. Rarely will even the most Congressional races have a dedicated IT team to keep it safe.
“Just using Google, or some similar service, steps it up a bit, but it’s not entirely secure,” said Johnson.
Once a candidate is elected to Congress, their staff is brought on to Federal Government systems. That’s usually a step above most security, but Greg says it still doesn’t solve human carelessness.
“All it takes is for one person to lose their computer or have one person get their password and suddenly, that person has access to all those emails that somebody was copied on, or anything they’ve ever sent or received,” said Johnson. “It would be a huge collection of emails just from one account getting breached.”
Greg says there is encryption software that would make sure emails and information is locked and can only be accessed by someone with the right password. He says that can be free, or be as expensive at $175.
DPD Productions of Iowa City recently produced a exceptional video for the Convention and Visitors Bureau. The video was launched yesterday on YouTube and 24 hours later it already has over 10,000 views. The featured song and them is “Great Big Storm” which conveys the abundance and diversity that comes together in Iowa City, Coralville, North Liberty, and surrounding area.
The video is a great resource for employers, businesses, educators, realtors, web designers, and anyone wanting to share a glimpse of the opportunities in this area. The YouTube version embeds nicely and looks great on just about any platform. The Vimeo version is also excellent.
Enjoy and share!
Greg Johnson of IowaCityArchitecture.com discusses strategies for managing ambient natural light in urban and public spaces.
This is a companion video to the article on urban planning strategies to enhance available light. The image below and other examples can be found in the video.
On Monday, 23 February 2015, CBS News produced a story about shopping mall security and safety concerns. I had an opportunity to be briefly interviewed for that news segment. The video is below and the story is also available on our local CBS website.
In visiting with the news team, I pointed out that our local shopping malls are mostly single-level and spread out over a large area, so they are not densely populated which makes them less likely targets for terrorist attacks. With a trend toward supporting small locally owned businesses, people are doing less shopping at malls, and seeking out small local businesses to support.
In other countries I’ve traveled to, the shopping malls may have three or four levels and are more densely populated making them a higher risk security concern. Heightened security measures are in place, with security guards checking under cars with mirrors and mall visitors are required to go through metal detectors.
In the United States, with some exceptions, many malls simply aren’t the hub of activity and community that they are in other countries.
Updated: Thursday, February 12 2015, 09:46 PM CST
IOWA CITY, IA (CBS2/FOX28)– Internet hackers are still after your computers…and your identity. With some big name businesses being hacked, employers are trying to find new ways to protect themselves.
Today a technology expert tells CBS 2/FOX 28 businesses are practicing security from the inside…out.
“My husband is more into computers and I remember calling him and saying, “I clicked on this, what happened?” says Amie Villarini of Iowa City.
Most of us have gotten those emails, a convincing and seemingly legitimate message with a link that could install a harmful virus to your computer or get you one step closer to giving away your personal information. It’s called phishing. Some businesses are hiring companies to send messages like those to their own employees.
“As businesses lately have become more aware of the various threats that are out there, what people realize is that the greatest vulnerability is just the human factor,” says Gregory P. Johnson of iowacitytechnologyservices.com.
The businesses see which employees bite the bait and use the fake phishing email as a learning opportunity to increase security.
“It’s a stress test of the business to see if that business has both the physical security, digital security and that critical third component, the human training,” he says.
“Seems like a smart thing to do. I mean, if it is going to happen, might as well make sure that it happens in a way you can control,” says University of Iowa Senior Christopher Wright.
Johnson says to be careful before clicking anything. What is the address of the email? Does what they are asking make sense? Are they asking for personal information?
“That’s really the best thing you can do is go to the site you know is official and log in and then see ‘Oh, is this really happening,’” he says.
Johnson says if you receive one of these emails at work, report it to your IT department. If it happens at home, you can report it through your antivirus software. If the email claims to be from a particular institution, send it to them so they are aware of it.
If you feel your computer has been negatively impacted by one of these emails, he suggests getting it checked out by an expert. Johnson also advises regular computer check-ups.
Source: Fox News, 12 February 2015
It’s said that 93% of communication is non-verbal. I enjoy writing, but find that a video message can feel more personal than a written one. So, here’s a short video update about what’s been going on in my life lately.