Technology is to blame for the ‘Great Resignation’

Have you heard about the September exodus? More than four million Americans quit their jobs that month, shattering the record for resignations previously set the month before. And some 40% of remaining employees are thinking of quitting, too, according to a Microsoft report.

The crisis is even worse in technology. TalentLMS and Workable reported recently that 72% of US-based tech employees are thinking of quitting their job in the next 12 months.

Pundits point to many causes for the trend, from government stimulus checks to the rise of remote work to entitled millennials and even pandemic-driven stress.

In general, it’s clear that there’s a growing incompatibility between the reality and the expectation of the employee experience.

Making matters worse: The more people quit, the harder life gets for those who remain on the job. This is especially true of tech workers. IT departments have been notoriously understaffed, and as the Great Resignation increasingly hits tech workers, all employees suffer more downtime, cyberattacks, and tech implementation slowdowns.

This is an emergency. You need to know why people are resigning in such high numbers

How to bring digital retail experiences to your brick-and-mortar store

Despite the growing popularity of online retail, good old-fashioned brick-and-mortar retail stores are here to stay. What's changing is customer expectations about the retail experience.

In short, online retail and physical retail each have upsides and downsides. Consumers have come to expect all the upsides (like digital retail technology in stores and easily navigable store flow) and as few of the downsides (long lines and poor customer experiences, for instance) as possible. Many stores are accomplishing this balance by establishing digital experiences and technology in retail stores.

Feeling vulnerable? Here’s how to build a cybersecurity vulnerability management program!

As businesses grow, so does their attack surface. More network-connected devices drive innovation and efficiency. But with more devices comes more cyber risk.  Protecting the ever-expanding attack surface is more important than ever, with high-profile vulnerabilities being exploited more frequently—and with more impact. 

One of the most effective ways to mitigate cyber risk is by creating and maintaining a robust vulnerability management program.

How to do hyper personalization right

Personalization is good. It makes people feel good about brands that offer it. Good old-fashioned personalization typically uses data points such as name, title, purchase history, zip code and behavioral data to present relevant information.

The most common example of personalization is mass marketing emails that address each customer by name. Another is when a consumer is browsing for a brown jacket and are then shown online ads for brown jackets on other sites.

Hyper personalization takes it up a notch with artificial intelligence and near-real-time data to provide extremely relevant and timely content to customers. 

Using AI, customer behavior and preferences can be finely captured, and that data can be turned into specific messaging delivered at the right time and place for maximum effect.

Here's how to do hyper personalization right.

How the rise in cyberattacks Is changing consumer behavior

If a store you visit often suffers a cyberattack, you might feel like someone went through your wallet. This kind of attack or data breach, and this kind of feeling, isn’t new. The growing frequency, cost and impact of cyberattacks are new — and consumers notice. Consumers are more aware of attacks than ever before. After all, they affect the public directly more often now, such as when attackers steal their personal information from a large company.

Here's how consumer awareness is changing as the result of the rise in cyberattacks. 

Thanksgiving turkey!

I have no idea what this complicated mixture is that Amira made for Squishyface to rub on the turkey, but it’s delicious. 

Thanksgiving wine!

Every year we drink for Thanksgiving this stunning amber wine called Veto — both made by our wonderful friend, Sara Meneguz, whose winery is in the Prosecco Hills district of Veneto (just north of Venice). The color of Veto is mind-blowing. The taste is indescribable, unlike any other wine I have ever tasted. And it’s the only wine I know of that pairs with all our Thanksgiving foods. I always try, but fail, to capture the color in photographs. But I love the way this Italian wine sparkles in the California sunshine. I’ll keep trying. 

Thanksgiving dishes!

Mac-n-cheese (by popular demand), cranberry sauce (cranberries cooked in orange juice with spices), mushroom green beans, saffron wild rice pilaf, Amira’s mind-blowing salad dressing.

Thanksgiving pumpkin pie!

Pumpkin pie made with fermented emmer and whole spelt crust and butternut squash (which tastes better than pumpkin). 

Thanksgiving apple pie!

Fermented whole spelt, white spelt and emmer flour crust. “Nutty bottom” is pecans with kefir drizzle. Apple coated with cinnamon, brown sugar, home-made chai spice mix and corn starch and topped with butter. Egg wash for the top of the crust. 

I miss the goats in Morocco

If you drive around the parts of Morocco where they grow argan trees for argon oil, you'll always find herds of goats that love to climb the trees. They're cute and I miss them. But the good news is that we'll be going back to Morocco in February! 

Why every region of the world has its own cybersecurity problems

Cybersecurity threats, risks and challenges vary a lot from one region to the next and one nation to the next. Targets vary based on local resources to exploit. Cyber criminals and nation-state attackers zero in on specific nations, companies and organizations for varying incentives. 

Of course, the COVID-19 pandemic exacerbated cybersecurity threats. Attackers might launch remote work-enabled attacks or social engineering attacks using COVID-19 fears as the content. The pandemic caused supply chain and economic woes, too. 

Here are the top cybersecurity issues in each corner of the globe today. 

Why you should go hack yourself

Getting breached is the surest way to learn your organization’s cybersecurity vulnerabilities. And that’s why you need to hack yourself before threat actors do. A cyber breach and attack simulation, also called red teaming, is best to understand vulnerabilities in practice, rather than just theory. What can you do before, during and after a simulated attack to boost your defenses?