Nexttech

Nexttech
Creating Generational Legacies

Wednesday, October 9, 2024

how do you get your team to adopt a proposed strategy that will improve your organisation



Getting people to change their behaviour is one off the most difficult things to do 

Get people in a room and workshop it
1. Define the strategy 
2. List various feedbacks 
3. Get parties to share their feedback and explain reasons 
4. Get them to listen with a view to understand 
5. Change /improve strategy 
6. Educate team on strategy 
7. Get buy In 

An example is to use #referron as a tool to send your business card ,  easily refer your trusted network to each other and track your activity . 

The user has the opportunity to synch this into their crm and follow up their activity .

It’s easy and free and yet people would not use the app . 

After workshopping the strategy and identifying reasons why there was limited take up - rebuilt the UX and ui to take into concerns  
- cybersecurity - make sure the app is safe encrypted so users can feel safe to use the app 
- rebuilt #referron to make it easy to use, quick and useful 
- working out ways for people to use it every day :) 
- gamification /leaderboards 
- get team involved in implementation and ideas to improve the strategy and app 
- continual education 
- continual reminders and notification to connect , send their vCards and identify opportunities to refer people who they know like and trust to each other :) 





Friday, September 6, 2024

collaboration will bring the best of both worlds - education and innovation in technology, research and development in emerging markets



A proud and monumental moment for BSI Learning Australia and HCLTech at the Australian High Commission - signing an MoU to support the Future Skills Initiative by Australian Trade and Investment Commission (Austrade) to cement the skilling journey for Australia 🇦🇺 and India 🇮🇳 

HCL Tech - A Global technology company and home to 219,000 diverse and passionate people across 60 countries, supercharging progress for the world's top enterprises by bringing together smarter and better ways for companies to benefit from technology.

BSI Learning an Australian Skills Education Institution with 26 different industry programs focussed on delivering quality learning and current competencies to our students to become technology leaders. 

Our collaboration will bring the best of both worlds - education and innovation in technology, research and development in emerging markets and the ability to embed world class Australian qualifications into our learner communities.

Parul Choudhary Michael Lynch GAICD JP Scott Wesley Vipul Rastogi Swakshar Karmakar Sujit Mukherjee Smriti Sharma

Thursday, July 11, 2024

The Future of Work - and navigating AI is about specialising in being a generalist




My friend David Michaelis’s  view (who is part of our global climate action #bbgforum www.gc-af.com ) – is that the winners in the future of work is not your expertise but how you tackle new frontiers!.


 He refers to an  excellent article – (Click here  ) by CNBC 


Here is my take on the article 

Will the future of work be about being a Specialist or Generalist?

Is it  deep expertise that will lead to enhanced credibility, rapid job advancement, and escalating incomes. Core competence, unique skills, deep expertise. 


Or 


Being broad-minded or dabbling – having  the ability to connect the dots – and refer to the specialists – ( the skillset of a generalist ).


Someone who can recognise the opportunity / problem – and have the ability to refer – either to a tablet. (Product) or a specialist (Service) 


 ‘No specific skill will get you ahead in the future’—but this ‘way of thinking’


My plug 

#BBG (powered by referron) is a group of specialists – (think of bbg  as  a baseball oval – whichever base the  customer comes – the objective is to enable that customer to hit a home run and be served by each base – the entire team. 


#Referron4.omni (www.referron.com.au)  is the tech that can make this happen .

(Technology still being built – look out for the l mvp – a labour of love!!!)


Feel free to register for the Referron mvp  and get your virtual business card , so that you can be part of the bbg community 


End of plug 


The Future of work

The message in the past was clear: Focus on developing an expertise and you’ll rise through the ranks and earn more money. The approach worked. Many of today’s leaders ascended by specializing.


This may no longer be the case!!!


The one certainty about the future is that it will be uncertain. 


The future belongs to generalists


The rapid advancement of artificial intelligence and technological innovation have commoditized information. 


AI and machines can do much of the work of the specialist 


In today’s world, it’s important to be agile and flexible. The future belongs to the generalists!!


> You need to see the entire elephant and the Savannah 

> You need to be a systems thinker 

> You need to think bigger and wider than you’ve traditionally done.

>You need to have a set of tools to draw from or a group of specialists – products or services you can refer to.

> You need to learn how to learn 


What skills are needed to get a Job in the Future of Work ?

Lisa Stern Hayes, one of Google’s top recruiters, said in a podcast that the company values problem-solvers who have a “general cognitive ability” over role-related knowledge.


“Think about how quickly Google evolves,” she said. “If you just hire someone to do one specific job, but then our company needs change, we need to be rest assured that the person is going to find something else to do at Google. That comes back to hiring smart generalists.”


The analytical capabilities you develop (e.g. basic statistical skills and critical reasoning) in the process will fare well when competing against those who are more focused on domain-specific skill.


The skill of connecting the dots is where it’s all at “

Tuesday, July 9, 2024

Khanmigo - Bill Gates visits a school incorporating this AI tech into its DNA 🧬



Bill Gates visited a school that has embraced Khanmigo - created by Sal Khan of Khan Academy . It is an AI-powered tutor and teacher support tool that  can give a teacher the blueprint, enabling then to give an awesome delivery relevant to their class plus a lot more ! 


What it does 

  • connects with students, 
  • sparking curiosity, 
  •  making sure every child feels seen and supported—especially those who need a little extra help.
  • Teachers easily and quickly track a student’s progress, saving time. 
  • Students use Khanmigo as a personalized tutor.


AI for education still has a long way to go, says Bill. This is a technology where we are starting from with AI in the classroom, not where the technology will end up eventually.

Used Cases 

Bill gives a few used cases that he was blown away by


Leticia Colon, an eighth-grade algebra teacher, explained how she used AI to create problem sets about hometown heroes the students might be interested in. 

Khanmigo helped her develop equations that incorporated Newark boxer Shakur Stevenson’s workout routines, so her students could practice math skills while learning about a real-world role model.


Cheryl Drakeford, a third-grade math and science teacher, used Khanmigo to help create rubrics and lesson hooks for assignments. The technology gives her a first draft, which she then tailors for her students. For example, the AI once gave her a hook that used a generic story about a fruit stand, and she edited it to be about Pokémon cards and Roblox—two topics her students are passionate about. “Khanmigo gives me the blueprint, but I have to give the delivery,” she said.


Several of the teachers Bill met with showed him how they can access each student’s dashboard and get a summary of how they’re doing in a particular subject. They loved being able to easily and quickly track a student’s progress, because it’s saving them a lot of time. 


A game changer 


If you hand teachers the right tools, says Bill, they will always find a way to support their students. 


AI will be a total game-changer for both teachers and students once the technology matures. 


AI will help teachers do what they do best and free them up to focus on what matters most.


Here’s a cool video explaining generative AI




Some comments 


Tiju K 


Bill Gates your insights into AI's transformative potential in education are truly inspiring. Building on the pioneering efforts at First Avenue Elementary, imagine if AI tools like Khanmigo could not only adapt content but also proactively suggest learning paths based on individual student strengths and interests. By integrating adaptive AI algorithms that evolve with each student's progress, we could further personalize education, ensuring every child receives tailored support while empowering teachers to innovate even more effectively. Your vision of AI bridging educational gaps resonates deeply, and I believe collaborative efforts can indeed make this vision a reality across diverse classroom settings. Let's continue pushing the boundaries of educational technology to unlock new possibilities for learning and growth. 💡 


Ivan K


AI education has the potential to revolutionize teaching and learning by -  personalising learning experiences, enhancing teacher effectiveness, and preparing students for future challenges - a game changer in the making! 


Source :- 


https://www.linkedin.com/posts/williamhgates_seeing-how-first-avenue-elementary-in-newark-activity-7216484623365595136-Bm6V?utm_source=share&utm_medium=member_ios


Tuesday, June 25, 2024

Treat failure as part of lifelong learning



Great post by BM Rabia 

“If milk is wasted, it becomes yogurt. 
Yogurt is more valuable than milk.

If it gets any worse, it becomes cheese. 
Cheese is more valuable than yogurt and milk.

And if grape juice turns sour, it turns into wine, which is even more expensive than grape juice.

You're not bad because you made mistakes. Mistakes are experiences that make you more valuable as a person. 

Christopher Columbus made a navigation error that led him to discover America. 
Alexander Fleming's mistake led him to invent penicillin. 

Don't let your mistakes depress you. It's not practice that makes perfect. It's the mistakes we learn from that make perfect!”

Reminds me of a post I wrote in 2013 


And this in 2010 
Venture Capital in Australia: Success and Failure and Noah's Rules:http://bsivc.blogspot.com/2010/09/success-and-failure.html

Venture Capital in Australia:  Tim Draperb Gems: 
http://bsivc.blogspot.com/2021/09/one-of-most-successful-vcs-tim-draper.html

Here are 8 great quotes on success, action and failure 

1. "All our dreams can come true if we have the courage to pursue them." - Walt Disney

2. "Success is walking from failure to failure with no loss of enthusiasm." - Winston Churchill

3. "Try not to become a person of success, but rather try to become a person of value." - Albert Einstein

4. "It is not the strongest of the species that survive, nor the most intelligent, but the ones most responsive to change." - Charles Darwin

5. "I have not failed. I've just found 10,000 ways that won't work." - Thomas Edison

6. "The whole secret of a successful life is to find out what is one's destiny to do, and then do it." - Oscar Wilde

7. "Don't be afraid to give up the good to go for the great." - John D. Rockefeller

8. "I find that the harder I work, the more luck I seem to have." - Thomas Jefferson

Tuesday, February 20, 2024

6 things to safeguard you from phishing



Thanks Walter Faets from BSI People 

Have you ever wondered what "phishing" is and how to safeguard yourself in the digital realm? 🤔

🎣Don't take the Bait! 
Phishing is a deceptive cyberattack where cybercriminals pose as legitimate entities to trick you into revealing sensitive information like passwords or financial details. It often arrives via emails, messages, or websites that appear genuine. 

Here's how to stay cyber-safe:
𝟭. 𝗦𝘁𝗮𝘆 𝗔𝗹𝗲𝗿𝘁: Scrutinize emails and messages for suspicious requests or unfamiliar senders. Be cautious before clicking on links or downloading attachments.
𝟮. 𝗩𝗲𝗿𝗶𝗳𝘆:  When in doubt, contact the purported sender via official channels to confirm the request's legitimacy.
𝟯. 𝗞𝗲𝗲𝗽 𝗦𝗼𝗳𝘁𝘄𝗮𝗿𝗲 𝗨𝗽𝗱𝗮𝘁𝗲𝗱: Regularly update your operating system and security software to patch vulnerabilities.
𝟰. 𝗨𝘀𝗲 𝗦𝘁𝗿𝗼𝗻𝗴 𝗣𝗮𝘀𝘀𝘄𝗼𝗿𝗱𝘀: Create unique, robust passwords for each account, and consider using a password manager.
𝟱. 𝗧𝘄𝗼-𝗙𝗮𝗰𝘁𝗼𝗿 𝗔𝘂𝘁𝗵𝗲𝗻𝘁𝗶𝗰𝗮𝘁𝗶𝗼𝗻 (𝟮𝗙𝗔): Enable 2FA whenever possible to add an extra layer of security.
𝟲. 𝗘𝗱𝘂𝗰𝗮𝘁𝗲 𝗬𝗼𝘂𝗿𝘀𝗲𝗹𝗳: Stay informed about the latest phishing techniques and cybersecurity best practices.

Don't let the bait catch you! Staying vigilant and practising good cyber hygiene. 🚤🔒

 #CybersecurityAwareness #StaySafeOnline #PhishingProtection

Tuesday, January 23, 2024

8 ESSENTIAL CYBER SECURITY PRACTICES – IN DEPTH


Exxatech has written an excellent article on the 8 essential cybersecurity practices needed to secure your organisation - and CYBER AWARENESS TRAINING is up there. BSI Learning provides your learning needs when it comes to CYBER AWARENESS TRAINING. 
The government is providing funding to help upskill your team in cybersecurity - if you are interested feel free to connect with me or comment below and I’ll refer you to Kala Philip at BSI Learning 



1. Endpoint Security

Endpoint Security is a pretty broad term so let’s clarify.

 

Firewalls
Firewalls are essential both at the individual device level and the company office level. Windows, MacOS and Linux all come with Firewalls built in but you need to make sure they are configured properly and more importantly turned on! By default they are preconfigured with rules to help you stay safe. Many Anti-virus software that you install come with firewalls by default and do a better job of enforcing compliance than Operating Systems.

 

Office Perimeter Firewalls
The classic office firewall still definitely has its place despite the move to the cloud and should always be the first line of defence for any sized business. Decent hardware Firewalls from the big security vendors are not expensive for smaller use cases and should definitely be deployed before anything else in your office network. By default no rules / access should be allowed into or out of the office network unless specifically configured by your Network / Systems Administrator. If your firewall has Intrusion Detection Systems, even better – make sure your definitions and rules are updated regularly to protect against new threats.

 

Cloud Based Firewalls / Cloud Security Groups 
Cloud based firewalls, sometimes called Security Groups by the big Cloud vendors (AWS, Azure) need to be configured with Least Privilege access. Only open the very minimum of network ports to access your infrastructure.

 

Email Spam Protection Controls
Your Office 365 and G-Suite Mail service come with basic Anti-Malware and Antivirus controls but should definitely be further hardened to limit malicious emails from getting through. A better solution is to use an Email Gateway Solution as G-Suite and Office 365 use basic Whitelisting / Blacklisting rules whereas some of the more advanced Email Gateway use machine learning, URL rewriting, etc to keep you safe.

Antivirus and Anti-Malware Software
You can get some fantastic Antivirus and Anti-Malware Software for free – Bitdefender Free Antivirus and Malwarebytes Free come to mind, so there is no excuse for not having these in place.
Both Windows AND MacOS require these products. Unfortunately gone are the days where Mac’s don’t get viruses – although rarer than Windows they are still essential to have.

 
 

2. STRONG AUTHENTICATION

Passwords
Unbelievably, The most popular password worldwide for last year was 123456!
Passwords should be as long as possible – minimum 10 characters, surprisingly numbers, non-alpha numeric characters are that important.
Articles:

 
https://www.esquire.com/lifestyle/a25570880/top-passwords-2018/

https://blog.fleetsmith.com/password-security-guide/

 

Multi Factor Authentication
All your accounts, both work and personal should be secured by Multi Factor Authentication where possible. In 2019 this is essential to protect your data. SMS is inherently far less secure than Authenticators like Google and Microsoft Authenticator as SMS numbers can be ported by a determined enough hacker.
For work, MFA on Administrator Accounts is absolutely a must if you decide not to apply it to normal user accounts (which you should). A compromised Administrator account can create havoc and destroy businesses.

 

3. DATA PROTECTION

Mobile Device Management
Company Data no longer resides in the office network on your file share, it is accessible through the cloud on any device, anywhere. BYOD (Bring your own Device) adoption means company data is likely on your tablet, phone, toaster. No seriously, but you get what I mean.
As a consequence of this companies need to secure their data wherever it sits, on personal devices or company owned laptops. This is where MDM (Mobile Device Management) comes in. You can setup software and policies to enforce data protection and allow remote wiping secure company data. Office 365 and G-Suite already have built in MDM you can configure and of course there are hundreds of third party solutions.

 

Encryption
Data should be encrypted in transit and at rest. For in transit encryption think VPN connections and HTTPS / SSL with strong encryption ciphers to access your data in the cloud and in the office network. Data at rest should be encrypted disks. Both Windows and MacOs now have this built in – Bitlocker and Filevault so it shouldn’t cost anything to implement it.

 

4. PATCH MANAGEMENT

It is essential to ensure that your servers, computers and devices are patched regularly to prevent against hacking of zero day exploits, and a good Patch Management system is essential to automate this process.
Good Patch Management systems don’t have to cost much any more and once installed and implemented are set and forget. A small price to pay for peace of mind.

 

5. LEAST PRIVILEGE

Least Privilege / RBAC (Role Based Access Controls) are a set of principals which dictate that a user who needs to complete a task much have the absolute minimum amount of permission required to complete that task. For Cloud services such as AWS / Azure or Office 365 / G-Suite this means only the least number of administrators possible.
The higher the number of administrators the higher the chance of getting hacked.
RBAC means that instead of creating single users or groups with certain permissions, create a role with the requisite permissions and apply it to that user. Therefore, if the user leaves or changes job, you can remove the role without affecting anyone else.

 

6. BACKUP

A good backup is essential to protect against attacks and loss of company data. It should be point in time and offsite so you can have some level of BCP (Business Continuity Planning) in case you have main site loss. There are a lot of excellent, reasonably priced cloud based backup solutions.
You should also have a backup of your configuration and a backup of all your documentation and processes of site as well to protect your intellectual property.

 

7. SUPPLY CHAIN SECURITY

Having the most secure environment in the world is useless if your suppliers have no controls and you have your or your customer data stored with them. Hold your suppliers accountable for your data as if it was on your own onsite servers. The big Cloud vendors have whole sections of their portals dedicated to all of regulations they are compliant to – PCI DSS, ISO 27001, HPIAA – the list goes on an on.

For smaller vendors, make them fill out an annual audit.
It should be pointed out that despite the regulations the big providers comply with, it is a Shared responsibility model – I.E. once you use the infrastructure you are responsible to ensure it is secure. Spinning up an AWS EC2 instance, putting a website on it without SSL / HTTPS, it is NOT PCI DSS compliant! 

 

8. CYBER INSURANCE / CYBER AWARENESS TRAINING

Increasingly important in the current landscape and two sides of the same coin, Cyber Awareness Training for your employees and good Cyber Insurance is essential.
Training your employees to properly assess potential hacking situations is vital. There are great solutions out there to help train your users.
Cyber Insurance is also becoming increasingly important but Awareness comes first because thoughtless employee actions can mean your insurance is voided and you don’t get paid out if a breach occurs.
 
https://www.wombatsecurity.com/security-education/security-awareness-training-videos-materials
 




 

References / Guides

https://www.itnews.com.au/news/one-in-ten-aussie-businesses-suffered-it-breaches-last-year-527306?eid=1&edate=20190627&
 
https://exxa.azurewebsites.net/security/security-the-new-data-breach-laws
 
https://www.techrepublic.com/article/how-to-turn-on-the-microsoft-windows-10-firewall-and-modify-its-configuration-settings/
 
https://www.maketecheasier.com/configure-mac-firewall-correctly
 
https://support.office.com/en-gb/article/set-up-mobile-device-management-mdm-in-office-365-dd892318-bc44-4eb1-af00-9db5430be3cd
 
https://support.google.com/a/answer/7400753?hl=en
 
https://www.beyondtrust.com/blog/entry/what-is-least-privilege
 
https://azure.microsoft.com/en-au/overview/trusted-cloud/compliance/
 
https://aws.amazon.com/compliance/programs/
 

With multiple certifications in Cyber Resillience, AWS and Azure, we can help you implement all of these best practices to ensure the safety and security of your business. 


Related Articles


BSI Future Learning series - In this first episode, we’re diving into the realm of cybersecurity— Join Simon Dewar from BSI Digital Learning and Kala Philip (MAICD, GAICD) from BSI Learning and the incredibly knowledgeable Damien Cantelo from Apollo Secure, who has worked closely with enterprises of all sizes to understand the cyber-threat landscape and guide them to ensure their systems, processes and, most importantly, people are cyber-ready.


https://www.linkedin.com/posts/business-strategies_bsi-learning-bsi-learnings-podcast-era-activity-7155424384407552000-DFHU?utm_source=share&utm_medium=member_ios


Australian sanctions Russian man over Cybersecurity attack 

https://www.linkedin.com/posts/aucyberseccoord_the-impact-of-the-2022-medibank-private-cyber-activity-7155436955315421184-O_iQ?utm_source=share&utm_medium=member_ios



Cybersecurity - get qualified - build cyber governance skills 

https://www.linkedin.com/posts/kphilip_cybersecurity-knowledge-and-skills-are-much-activity-7153168524805394432-gbja?utm_source=share&utm_medium=member_ios



Spotlight on cyber By AsIC 


https://www.linkedin.com/posts/kphilip_findings-and-insights-from-the-cyber-pulse-activity-7129736287481171969-L-dJ?utm_source=share&utm_medium=member_ios