Image for post
Image for post

This was a Twitter thread, so it may be some time before I get it looking like a proper story. This interview of Dr. Jim Loehr with @tferriss reminded me of one reason I am so much better when I write every morning.

We all have a constant companion: our private voice, also called the “inner critic.”

Image for post
Image for post

(Originally published on December 31, 2011. I think most of it holds up, save some of the references).

It is the time of year when we aspire to change just about everything in our lives.

If you are charting a course for the next year, consider listening to the “Willpower Science” episode of The People’s Pharmacy, The Graedons’ guest is Kelly McGonigal of Stanford University and author of The Willpower Instinct: How Self-Control Works, Why it Matters, and What You Can Do to Get More of It.

Image for post
Image for post

I know, what a basic and obvious proposition. Of course the body doesn’t “work” unless you’re breathing. And isn’t breathing- something we do automatically without being aware it’s happening- one of those habits we should all develop? And if it’s working (I am still here, right?), why give breathing a moment’s thought, especially given all the things that require attention?

Here’s why: the way we breathe can help regulate the body’s automatic responses, and provide more space for thinking and problem-solving.

Let me briefly explain, with the help of Breath: The New Science of a Lost Art by James Nestor.

Image for post
Image for post

We all want to get better in our various roles. Or at least that’s where I start in these pieces. If you believe you’re fully formed and have nothing new to learn, then by all means keep doing what you are doing, telling everyone within earshot how busy you are, and dropping the names of people I don’t know.

And getting better means improving my behavior, both those conscious decisions I make (judgments), and those automatic decisions I may make without being aware (habits).

Improving my judgment and habits is the process through which I learn new things and develop new skills, sharpen the tools that serve me well, and (hopefully) reduce the incidence of bad decisions and habits. …

Image for post
Image for post

Organizations are now familiar with the threats to information technology (IT) systems posed by cyber threats, malicious insiders, and human error. Hardware and software connected to IT networks and the internet are increasingly utilized to help monitor and manage industrial and manufacturing assets and facilities. As a result, this operational technology (OT) puts physical infrastructure and facilities at risk for attack and compromise.

The National Security Agency (NSA) and the Cybersecurity & Infrastructure Security Agency (CISA) recently issued a Cybersecurity Advisory highlighting the threats that malicious cyberactivity poses to critical infrastructure (CI), including commercial facilities, communications, energy, financial services, information technology, and transportation systems, by exploiting internet-accessible OT. …

Image for post
Image for post
Yes, That’s a VGA-HDMI Adapter.

This is more a journal of the last couple of weeks than a piece with any sort of theme, but perhaps you find some tips or ideas for how get more accustomed to living and working remotely.

The Bigger Picture: What’s Going to Change?

Call it the “new normal,” or adopt whatever buzzword you like, but the fact that Zoom is now a household word and boasts a stock value of more than all U.S. Airlines combined is significant.

Consider putting some attention and time to the proposition of what work will look like going forward. …

Image for post
Image for post

Consider what additional risks you may face in the event you are working without a net(work), or at least in a different environment.

  1. Use strong, unique passwords (preferably passphrases) for all your computer devices and online accounts. Consider a password manager.
  2. Set your devices, (including your smartphone), to lock after a short time, and require a passcode to unlock them.
  3. Patch and update all your software, applications, and operating systems regularly.
  4. Enable and employ multi-factor authentication wherever possible.
  5. Use a virtual private network (VPN) to access your employer’s network, and if you have to use public Wi-Fi.
  6. Don’t save documents on your computers and devices. …
Image for post
Image for post

(I wrote this with my colleagues Amy Hanna Keeney, and William P. “Billy” Gaudet ).

On March 10, a putative class action complaint was filed by Hector Fuentes in the U.S. District Court of California against Sunshine Behavioral Group, LLC, (Sunshine) in connection with a September 2019 data breach that resulted in the exposure and exfiltration of the sensitive personal and medical data of approximately 3,500 patients. Among other claims, Mr. Fuentes alleges a violation of the California Consumer Protection Act (CCPA).

Notably, the CCPA’s private right of action only allows individuals to bring suit if their personal information is compromised “as a result of the business’s violation of the duty to implement and maintain reasonable security procedures and practices.” …

Image for post

On December 20, 2018 the Agricultural Improvement Act of 2018 (the “2018 Farm Bill”) became effective and legalized hemp production nationwide, subject to stringent federal and state licensing and regulation.

The following is a brief overview of the status of hemp (also called “commercial hemp” or “industrial hemp”) farming and regulation in the Southeastern United States following the 2018 Farm Bill and previous legislation.

Background

The terms “hemp” (which has non-drug connotations and uses) and “marijuana” (no further explanation necessary) describe the same plant genus: cannabis. The difference between the two is generally based on the relative amount of tetrahydrocannabinol (THC) contained in the plant. Hemp plants are cultivated to produce fiber and seeds and very little if any THC. Marijuana plants, on the other hand, are cultivated to produce more THC. …

Image for post
Image for post

As described in an alert issued by the Cybersecurity and Infrastructure Security Agency (CISA), a ransomware attack on a natural gas compression facility led its operator to shut down its operations for two days.

This incident is a reminder to oil and gas pipeline operators, who must continuously and rigorously implement and update their security programs to ensure continuous system operations and maintain reliability.

What does this attack mean for pipeline operators?

CISA recommends that pipeline operators consider several potential mitigation actions based on their particular risk assessment programs. These include:

  • Ensure that the emergency response plan considers cyberattacks and the potential impacts of a cyberattack on operations. According to CISA, this organization’s emergency response plan focused on threats to physical safety and not cyber incidents. …

About

Jack Pringle

Litigator, appellate advocate, regulatory and information technology attorney @adamsandreese, Information Privacy Professional (CIPP-US)

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store