This Key Threat to Fortune 500 Companies Often Goes Unaddressed

Written by Kim Del Fierro, VP of Marketing for Area 1 Security, Contributing Writer for InFluential Magazine 

Kim Del Fierro, VP of Marketing for Area 1 Security.

Kim Del Fierro, VP of Marketing for Area 1 Security.

Fortune 500 companies have an impressive aura around them and well-earned reputations. Their leaders have achieved what many smaller companies’ executives aspire to accomplish. However, they also encounter more difficult challenges than one might expect. Despite the major resources that Fortune 500 companies possess, or rather, precisely because of them, Fortune 500 companies still face plenty of security risks. The target on a Fortune 500 company is much bigger than that of a small business because there’s inherently more value in compromising them.

Unfortunately, these companies also experience breaches coming from a widespread threat that no one seems to know how to address. It’s the cause of 95 percent of big attacks on Fortune 500 companies; namely, theft of employee credentials, usually via phish. How do cybercriminals exploit the threat to these companies?

It Starts with Stealing Credentials

Even though Fortune 500 companies go to great lengths to prevent breaches and data theft by hackers, it’s still happening. That’s because despite these companies’ heavy investments in cybersecurity, humans will always be the weakest link in almost any security system.

For example, if a phishing email finds its way into an employee’s inbox, there aren’t many ways to prevent that employee from opening it, and then clicking on a suspicious link or otherwise letting hackers compromise their credentials. Once that happens, hackers can move on to inflict further damage with malware, gaining access to essential servers.

Executing the Attack

Once they breach a company’s defenses, hackers can carry out their attacks in various ways. There are plenty of targets they can infest with malware and make inoperable. Criminals can steal or wipe valuable data, destroy the backup systems, and wreak havoc on disaster recovery systems. It’s a costly battle for Fortune 500 companies, and extremely difficult to recover from.

Preventing the Phishing Threat

Once the cybercriminals invade your infrastructure, it’s hard to rout them out before damage is done. That’s why preventing that first successful phishing attack is critical.

Relying on training your employees to recognize and report phishing attacks does not always yield the desired results. Even alert and motivated employees don’t have the knowledge and skills of a security manager.

Fortunately, once you stop the 95 percent of threats that arrive by phishing, the remaining five percent of attacks are easily preventable by regular patching and updating your security systems.

Area 1 Security offers phishing protection that you can add to the cyber security solutions you already have. We proactively cover your greatest vulnerabilities and prevent the majority of dangerous attacks, while your existing cybersecurity tackles everything else.

Detecting a phishing attack proactively, before it even becomes a threat, is the only way to stop phish from continuously landing in your employees’ inboxes. With Area 1 Horizon, you can stop phishing once and for all.

It’s Our 7th Anniversary!

William Jackson, Found & Chief Business Officer of InFluential Magazine, Spanish InFluential, and Teen InFluential

William Jackson, Founder & Chief Business Officer of InFluential Magazine, Spanish InFluential, and Teen InFluential

On the one hand, it feels like I’ve been doing this for a lifetime, while on the other, I find myself wondering “Where did the years go?” It’s been a year of excitement, highs and lows, long work days and restless nights, but I wouldn’t trade it for anything else.

This past year has taught me so many useful lessons, and one that really stands out is just how important it is for individuals to be patient, long-suffering, and kind toward others; without judgement.  In a culture where freedom of speech is widely encouraged, many seem to have lost sight on the importance of having something of positive and encouraging to say, tempered with applying the “Golden Rule”.  As a reminder, the “Golden Rule” admonishes us to “do unto others as you would have them do unto you”.  Of course, the lack of applying the “Golden Rule” is almost always to our detriment.

In previous Publisher’s Notes, I shared my own struggle with trying to ensure I live a well-balanced life and making such a priority. Although, I still have room for improvement, I’ve been making slow but steady progress. I recently began adding the practice of yoga to my regular health & wellness routine, something I never would have imagined in a thousand years. But thankfully, it’s doing wonders for me. I feel calmer, am resting better, and my days are less hectic.

It’s with this newfound sense of balance and calm I wish to collaborate with you as we begin our seventh year. On that note, I’m thrilled to welcome you to our Seventh Anniversary Edition!  One of our Exclusive Interviews is with Hanna Jaffe Bosdet.  The well-known Philanthropist, human rights activist, speaker, and author opens up about her new acting role in NETFLIX’s first Mexican reality series Made in Mexico, and what’s she’s doing to raise awareness of important topics such as human rights, immigrants, refugees, peace, and the importance of education.  Being that this also our Style Edition, of course we had to bring you many topics related to style and its impact as we strive to live well.

I invite you to feast your eyes on this stunning Seventh Anniversary Edition and enjoy reading the rest of the amazing features we have for you in this Edition.  May this Edition inform and inspire you to continue living your best life.

From my very being, I thank you for being a dedicated reader. Seven thrilling years would not be possible without you.  I’m so grateful to and inspired by the entire InFluential Magazine, Spanish InFluential, andTeen InFluential teams, who work tirelessly to bring you our award-winning publications. I’m truly excited about the future of InFluential Magazine, Spanish InFluential, and Teen InFluential, and I believe the best is yet to come.

Fondly and with Great Enthusiasm,

William Jackson

Founder & Chief Business Officer of InFluential Magazine, Spanish InFluential, and Teen InFluential

Top Three Cybersecurity Vulnerabilities Your Business Faces Right Now

Written By Kim Del Fierro, VP of Marketing for Area 1 Security 

The business world has become more competitive than ever. Not only is there increased pressure on companies to be profitable, but also to keep information safe. For many companies, cybersecurity is an area that’s easy to cut back on, but that can prove to be an expensive mistake.

According to the PwC Global Economic Crime Report, cybercrime is now the second most reported economic crime, affecting 31 percent of organizations. The percentage is high, and if cybersecurity doesn’t become a priority in business, it will certainly get higher. As the leader and owner of a company, do you know which cybersecurity vulnerabilities your organization may have right now? Let’s take a look:

1. Lack of Policies that Prevent Most Common Threats

The first and most apparent vulnerability in any system relates to security fundamentals. Today, every company needs a cybersecurity policy to set security standards. Specific, well-established practices such as Bring Your Own Device (BYOD) have proven risky and need to be strictly governed. According to the 2018 Verizon Mobile Security Index, 74 percent of businesses say that their mobile security risks have gone up in the past year. Therefore, if you haven’t set strict security standards for your employees to follow, it’s time to start.

2. Reactive Mindset

Due to resource constraints, many organizations will do only the bare minimum when it comes to cybersecurity. However, in this day and age, covering the basics is not enough. Waiting for an attack to happen and then reacting is a sure-fire way for you to be much worse off when everything is over than if you had taken proper steps to protect your assets.

While having a reaction plan in place is generally considered good practice, that can’t be the extent of your cybersecurity solutions. Considering how fast cybersecurity threats are evolving, investing in proactive security solutions is quickly becoming a must for businesses.

3. The Human Factor

According to Experian’s 2018 Managing Insider Risk Through Training and Culture Report, 66 percent of surveyed professionals felt that employees posed the greatest vulnerability when it came to cyberthreats.

This isn’t unexpected, considering that the human factor is usually the weakest link in any security system. While training can help to eliminate the most common causes of human error in cybersecurity, described as “general carelessness,” it isn’t enough.

When you take into consideration the fact that a majority of organizations face phishing email attacks frequently, the scope of the problem falls into perspective. Even when employees are rigorously trained, mistakes happen. All it takes is one careless reaction to a suspicious email.

This is why we must work on solutions that prevent phishing cyberattacks before they even reach your employees’ inboxes. Area 1 Security’s Anti-Phishing solution offers precisely that, by spotting phishing attacks days in advance.

Businesses today might be even more vulnerable than they seem to their owners. It’s crucial for every C-level executive to know precisely what type of damage a data breach can inflict, and which proactive solutions can prevent it from happening. When it comes to phishing attacks, you’ll be far safer with Area 1 Horizon, the anti-phishing technology that neutralizes today’s most dangerous cybersecurity threats.

Kim Del Fierro, VP of Marketing for Area 1 Security.

Kim Del Fierro, VP of Marketing for Area 1 Security

Helpful Tips to Avoid Tech Support Scams

Written by Justin Lavelle, Chief Communications Officer for BeenVerified

Don’t be fooled by a scammer who calls you claiming to be from Microsoft or Apple.

Despite warnings that come year after year about tech support scams, fraudsters continually find new and more effective ways to trick consumers into giving up their personal and financial information.

Microsoft recently reported that tech support scams are up 24 percent since last year. The tech giant received 153,000 reports of customers encountering or falling for a fraud attempt, with 1 in 10 actually losing money from those scams. Microsoft customers paid an estimated $3 to $6 million to criminals – all because they didn’t know how to spot a hoax.

The typical tech support scam involves the fraudster calling or emailing a customer claiming to be from a legitimate technology company. The scammer says there’s something wrong with the customer’s computer, and uses a lot of tech jargon to confuse them. They then ask for passwords, remote desktop access, and even payment so they can “fix” the non-existent problem.

Savvy internet users know that no corporate tech support representative would ever contact them about a device issue unless the customer reported it first and asked for a call back. However, if you’re not particularly knowledgeable about technology, it can be very easy to be fooled by a convincing-sounding scam artist.

Here are a few steps to take if you suspect someone is trying to pull a tech support scam on you.

1. Verify The Source
Because of the sophisticated technology fraudsters have access to, it’s very easy for someone to create a convincing-looking scam email, or fake a caller ID to make it look like a phone number is coming from a specific area code or geographical region. If you were actually expecting a call from a tech support agent, you can run a reverse phone search or look up the listed tech support number to see if it’s an exact match for the company that’s supposed to be contacting you.

If it’s an email or browser pop-up, verify the logo, email sender address, signature, etc. The differences between a real and fake email or ad can be very subtle and easy to miss, so look at it with a very scrutinizing eye. More importantly, do not click on any links or call any phone number listed in these suspicious emails and pop-ups.

2. Never Give A Random Caller Your Password Or Desktop Access
No matter how convincing the call, email, or pop-up seems, you should never give out your account passwords or allow someone else to take control of your computer remotely. If you’re having trouble with your computer, it’s best to bring the machine in to a tech repair shop or official device retail store, or have a tech support professional come to your home to look at it in person.

3. Keep Your Browser, Programs, And Security Software Up To Date
Don’t ignore those messages on your computer that remind you to update your software. Software companies and device manufacturers are constantly working to patch security flaws and bugs, so failing to update at the advised time could leave your machine vulnerable to hackers.

4. Stay Vigilant
To avoid becoming the next victim of a tech support scam, it’s important to be vigilant about computer and internet safety. Never respond to a message or phone call from someone claiming to need access to your PC if you didn’t previously report an issue. If you are really having a tech support problem, contact your device manufacturer or a trusted tech support professional directly using the info listed on their website.

Most importantly, keep yourself educated and informed about the latest fraud tactics and the warning signs of any new scams. Arming yourself with this knowledge could save you from a sneaky data thief.

Bio for Justin Lavelle

Justin Lavelle is the Chief Communications Officer for BeenVerified.com. BeenVerified is a leading source of online background checks and contact information. It helps people discover, understand and use public data in their everyday lives and can provide peace of mind by offering a fast, easy and affordable way to do background checks on potential dates. BeenVerified allows individuals to find more information about people, phone numbers, email addresses and property records. www.beenverified.com.

Why Focusing on People and Data Might Be the Distraction Hackers Need to Infiltrate Big Business

Written by Kim Del Fierro, VP of Marketing for Area 1 Security, Contributing Writer for InFluential Magazine

Kim Del Fierro

Kim Del Fierro

We live in times when it’s become easier than ever for hackers to breach an organization through social engineering. Breaches are primarily caused by phishing attacks, representing a huge security problem for businesses.

But why is this type of cybercriminal so widely represented in the statistics? What is it that makes it so easy and so profitable for hackers? We might not like the answers. The ever-increasing connectivity and focus on people and data is leaving us vulnerable to malicious attacks. To protect your business, you need to start thinking like a hacker. Let’s take a look at how they infiltrate big business and what can be done about it.

How Social Engineering Works

Since social engineering relies on personal information hackers can find online, it’s pretty difficult to counter. Before; that required some digging on the hacker’s part – now all it takes is a data-matching service like Spokeo and PeekYou, and they get all the information they might need and more. Cross-matching public records is one thing, but employees also freely share a lot of information on social media. This personal info is then used to target employees within a company with malicious emails, by posing as a trusted individual. From there, all a hacker needs to do is convince an employee to click on a malicious link or perform a wire transfer.

Are Individual Threats the Same as Company Threats?

As we can see, cybercriminals can efficiently use your social media information to reach their desired target within your company. Does that mean company executives should stop using social media altogether, or ban their employees from sharing any work-related information?

The short answer is yes. The long answer, if not “yes,” is that there should be strict policies in place about the use of social networks and what can and can’t be shared. For example, if a company executive posts about being on a business trip, hackers take that as a signal to try and perform BEC. Anything an employee posts about work projects or people they spend time with in the office can help cybercriminals construct an elaborate and believable social engineering scam. It is why every employee must assume the whole world is watching them when they want to post anything work-related on social media.

The frequency of Social Engineering and Phishing

It’s no accident that social engineering and phishing attacks are responsible for 95 percent of data breaches. They exploit what will always be the weak link in any company’s security chain – the people who work there. Relying on traditional protective measures such as firewall, antivirus, anti-spoofing techniques, etc. cannot stop all of these attacks. Education is vital for prevention, but with these scams getting more elaborate and difficult to spot, it doesn’t ensure safety.

What Can Protect Your Business?

Wouldn’t it be wonderful if you didn’t have to worry about phishing? Good news, the worrying stops today. It seems challenging to prevent phish, but Area 1 Security offers an Anti-Phishing Service that finds and eliminates phish through a combination of web crawling and small pattern analytics. With Area 1 Horizon, your business will be safe, and you won’t be adding to the pool of $5.3 billion in losses due to phishing attacks last year.

With the ever-increasing focus on people and data, businesses are leaving themselves wide open to hackers. In those circumstances, there are two options – limiting the information hackers can get about you through social media, or investing in preemptive and comprehensive phishing protection. At Area 1 Security, we stop phishing for good.

Overcoming the Cybersecurity Dangers of BYOD

Written By Kim Del Fierro, VP of Marketing for Area 1 Security

Kim Del Fierro

Kim Del Fierro, VP of Marketing for Area 1 Security 

In today’s high tech world, nearly everyone you meet owns a smartphone, tablet or laptop computer. And in the era of BYOD, any and all of these devices are being used for work.

While that is certainly a convenience for employees and employers alike, for the men and women who sit in the CIO’s chair, BYOD is a source of constant headaches and frustration. Data breaches can happen at any time in the most controlled environments, and personal devices ensure a loss of control that keeps CIOs and data security teams up at night.

Personal Device Use by the Numbers

Indeed, recent survey data from Finn Partners paints a grim picture surrounding the use of personal security devices by employees. While a full 55 percent of employees BYOD, only 26 percent change log-in credentials on a monthly basis. Only 25 percent of these employees update the security protocols and operating systems on their devices each month.

When you look at phishing, the root cause of 95 percent of all breaches, the numbers grow darker still. In the June 2018 Finn Partners survey, nearly 40 percent of employees admitted to clicking on a link or opening an attachment from a sender they didn’t recognize. Two out of every five employees admit to putting their companies at risk both in the office and on their own devices. It should come as no surprise that one in three of these employees reports having been a victim of a cyber-attack or data breach.

Solutions in Sight

There are a number of steps an organization can take to minimize the risks that stem from BYOD policies. IT departments can work to limit access to company documents and records for smartphones and tablets. It can ensure that all data downloaded is fully encrypted. Cybersecurity professionals can and should enforce remote wipe policies and passcode locks on all devices being used for company use.

But in an era where nearly 40 percent of employees are going to click a link or open an attachment from someone they don’t know, in spite of years of training and workshops teaching them not to do so, smart cybersecurity teams will need to take solutions to the next level. The best recourse is to stop phishing attacks at the source before an employee even has the opportunity to make a company-changing mistake.

Take the Next Step in Cybersecurity

You’ll accomplish this by using preemptive anti-phishing solutions that stop phishing attacks from even entering your employee’s devices. That way you won’t have to worry about whether your employees will encounter phishing attacks at all. The risk of them compromising your organization’s sensitive data will be reduced to an all-time minimum. Taking this one step, while at the same time maintaining a continuous program of cyber hygiene, will eliminate nearly all cybersecurity threats to your company.

At Area 1 Security, we are dedicated to stopping phishing attacks with our comprehensive anti-phishing solution, Area 1 Horizon. It protects your organization across all traffic vectors, and, best of all — you’ll only be paying for phish we catch. We will help you help your employees, and in so doing, allow security professionals with BYOD policies to enjoy a better night’s sleep.

When Lost Becomes Found

Introducing Cube Tracker, a small Bluetooth tracker and easy-to-use-app that helps you find everyday items quickly.

Selfies may seem like a real superficial pastime, but studies actually show seeing a good picture of yourself can boost your confidence. For suggestions on improving your selfie game, Cube Tracker comes in handy as well.

In addition to being able to help you find your lost keys, purse, and phone, Cube can take photos! Just open up the Cube app and then choose which unit you want to serve as the shutter for your selfie camera. Then select the camera icon, which opens the camera. Then you can press the button on the tracker device to snap a selfie.

Why You Have to Have a Cube Tracker:

  • 1 Year Battery life - Replaceable Battery – When your battery dies, just replace it.
  • Long Distance – The Cube Tracker app’s map shows you the location where your item was last seen. Once you’re there, your item will be within 100 feet.
  • Phone Finder - It can also work in reverse instead of locating your lost keys you can push the button on the CUBE device and find your lost phone.
  • Takes Photos - The Cube tracker can even be set up to use as a shutter button for the camera on your phone. Just open up the Cube app and then choose which unit you want to serve as the shutter for your selfie camera. Then select the camera icon. Then you can press the button on the tracker device to snap a selfie.
  • Waterproof! Cube is Waterproof – Can withstand more than 1.5 inches of water.

For more info on the Cube Tracker visit www.cubetracker.com.

5 Psychological Hacks To Boost App Downloads

Written and Contributed By Codal

Remember Google Wave?

It’s okay if you don’t—in fact, we’re pretty sure Google would like to forget as well. Google Wave was a mobile app designed to make the often-complex communication process between group contacts as easy as pie. At least, that’s what it was supposed to do.

Instead, the UX design agency that crafted the Wave’s interface seemed to make sure nothing was easy about this overhyped mobile app. Why did it fail, even after having Google’s name attached to it?

Because it had Google’s name attached to it.

The mobile app was marketed on such a grand scale that everyone’s expectations were astronomically high. Besides having a poor UX, Google failed at managing expectations. Users were so unforgiving with the app’s shortcomings that it led to a shutdown of the platform.

Had Google been able to live up to even bare expectations, it could have returned to the drawing board and rework the UX. But Google failed to account for the psychological influences of their users, namely their perception of the Google brand.

Designing for small, often subtle psychological phenomena may seem pointless, but with more than 4 million apps available on both the App Store and Google Play, you have to take into consideration the psychology of it while designing the platform.

To make sure your mobile app cuts through the clutter, here are five psychological hacks to get people to download your app.

1) Tell Them What They Want To Hear

If you want people to download your mobile app, you have to indulge their biases. The psychology of selective perception states people consciously or subconsciously engage with messages that align with their beliefs.

If you want your mobile app to receive the downloads it deserves, listen to what users want from you. A staggering 14% of users will not use a mobile app that is difficult to use, hence they are biased towards comfortable navigation.

To align yourself with this belief, provide an intuitive navigation, designed in such a way that traffic flows from one page to another. If people see your app as easy to use, they will be more inclined to download your app.

Instagram, the popular social media platform, hit it off with users by coming up with an intuitive navigation. Throughout browsing, the navigation options remain in the same place. The buttons are positioned in such way that they can be used with just one hand.

Users always know how to proceed when they want to access a particular screen. This is one of the reasons why Instagram has roughly 700 million active users worldwide.

2) Embracing The Counterintuitive

Reverse psychology is a great hack for generating a specific reaction by calling for something contradictory. In simpler terms, you do the opposite of what users might expect from you. The unpredictability of it is what captures the attention.

It’s a great ‘pull’ tactic that curbs content flooding. When you stop screaming at users, you are allowing them to relax and put a lot more thought into your mobile app.

Take a cue from Little Caesars, the popular pizza chain, that used reverse psychology to build up its email list. It might not be for a mobile app, but it is an effective tactic nonetheless. This campaign worked because it was witty and made people curious.

3) Align With The Customer’s Self-Concept

What are the chances that you will earn a download if people say ‘this mobile app isn’t for me’?

You need to make consumers feel worthy of your app before downloading—they need to see themselves using your mobile app. That requires generating with content that is aligned with a customer’s self-perceived value or self-concept.

Before asking consumers to download your app, try to understand what their self-concept is. Then, find a way to fit your mobile app within their self-perceived value. This will help in shaping UX experience for your potential customers.

Next time, when your UX design agency is brainstorming concepts for your mobile app’s UI, consider taking these three aspects into account:

Self-image – How users see themselves in society.

Ideal self – The type of user one wants to be.

Self-esteem – How much users love themselves.

This allows your mobile app’s design to align with a customer’s self-perceived value. Thereby, enabling a positive user experience, and potentially reducing customer churn rates.

The Persuasive Power Of Color

The color is the second most important aspect of getting people to download your mobile app, after functionality. When 90% of subscription and purchase decisions are based on color alone, your mobile app cannot afford to go wrong with its color scheme.

Color doesn’t just help boost your download count, it also promotes interactions and helps recall value. Here are a few color schemes that might work for your mobile app:

Monochromatic - he simplest color scheme, a monochromatic palette involves taking each color from the same base . This color scheme is very easy on the eyes, and can produce a soothing effect. Blue and green are the more popular hues used for this scheme.

Complementary - This scheme uses colors which are opposite to each other. Due to their high contrast, they easily grab attention.

Less Is More

A successful acquisition strategy is one which takes less time to get more customers. Many UX designers tend to fall prey to the idea of providing too many choices to customers. This eventually leads to choice paralysis.

Analogous - This scheme is made from related colors that don’t stand out from each other. One of the colors is the dominant one while the others are used to enrich the scheme. The only hiccup in this scheme is deciding which vibrancy of color to use.

Calm, a meditation app, uses an analogue color scheme, with blue as the dominant color and green to enrich it. This color scheme helps making users feel relaxed and peaceful.

When provided with too many alternatives to get to the same destination (downloading your app), you end up confusing the customers.

These confusions make customers unhappy and exhausted, leading to abandonment. To avoid this mishap, limit yourself from providing too many choices. Design your app with limited alternatives so your users can arrive at clear decisions.

Human is an all-day activity tracker app. It has a clutter free interface with minimum menu options. With less number of choices to make, users find the UI extremely easy.

Wrapping Up

It’s not just the data that’s going to get you downloads—it’s about humanizing your mobile app. These psychological hacks give life to your application, resulting in a platform that’s inherently more likable and human-centric. Influencing user psyche can help you develop strong personal relationships with your users and encourage constant engagement, lasting long after the download.

 

Codal is a UX design and development agency with a focus on blending an agile process with the latest technologies. Based in the heart of Chicago, Codal has a knack for bringing out the best in every organization that they work with. With vast industry expertise, Codal has a strong team of skilled and experienced business and technical experts. Learn more at https://www.codal.com.

JetBlue Modernizes the Cruise Planning and Booking Experience with AI Technology

– In Partnership with CruisingStore, Travelers Can Build Customized Itineraries with Dedicated Customer Service and Competitive Prices –

JetBlue (NASDAQ: JBLU) on Tuesday, January 23 announced a new partnership with Cruising Store that deploys the power of artificial intelligence to help travelers customize their vacation experience and add flights and other offerings, all in one place. Through JetBlue’s new cruise booking and planning platform, customers are able to bypass the often-confusing process of finding the right cruise and the traditional model of contacting a travel agent to book.

“AI is changing how we travel and our goal is to be at the front of the curve,” said Marty St George, executive vice president, commercial and planning, JetBlue. “We’ve already incorporated artificial intelligence into vacation planning and now our partnership with CruisingStore means customers will quickly be able to find the cruise that’s right for them and book their flights all in one place.”

One of the hardest parts of the traditional process is finding cruises to the destinations a traveler wants to see, on the dates they want, and for the budget they have in mind. JetBlue has joined with CruisingStore to introduce a new platform that helps travelers make informed decisions when selecting a cruise. The ‘intelligence engine’ technology takes JetBlue’s already robust cruise travel site to a new level, identifying cruise vacations that meet a customer’s budget, destination preferences, and other activities. Over time, the platform will evolve to further evaluate what matters most to travelers, providing even more customized options.

Officially launching in January 2018 in tandem with the JetBlue partnership, CruisingStore aims to innovate the cruise vertical with a more advanced, customer-focused and supplier-friendly cruise shopping experience. The results are unique cruise experiences at competitive prices.

CruisingStore is led by co-founders and cruise industry veterans whose combined leadership experience includes more than 30 years of experience at some of the world’s leading travel companies – including Dwain Wall, chief executive officer; John Henderson, chief technology officer; Tom Grasse, chief marketing officer; and Jill LaBarre, executive vice president of agency operations.

“We are incredibly excited to announce a partnership with JetBlue, who has been an innovator in the travel space for many years,” said Dwain Wall, chief executive officer of CruisingStore.  “We have worked hard to create a solution to the many long-standing and intractable execution challenges facing the cruise and airline industries and with CruisingStore.com, we are pleased to have that solution now readily available.”

JetBlue provides customers booking cruise-centric vacation packages with a simplified booking experience. JetBlue’s partnership with CruisingStore is the latest in the airline’s evolution to offer more personalized trip experiences. Combining technology with JetBlue’s award-winning customer service, JetBlue seeks to create a one-stop vacation shop and seamless travel journey.

About JetBlue

JetBlue is New York’s Hometown Airline®, and a leading carrier in Boston, Fort Lauderdale-Hollywood, Los Angeles (Long Beach), Orlando, and San Juan. JetBlue carries more than 38 million customers a year to 101 cities in the U.S., Caribbean, and Latin America with an average of 1,000 daily flights. For more information, please visit www.jetblue.com.

About CruisingStore.com

Officially making its debut in January 2018, CruisingStore.com is on its way to transforming the cruise industry. The site is the most technologically advanced and content-rich online forum for cruise planning, shopping, collaborating, and booking. Soon to be forging a revolutionary shared customer distribution model with leading cruise line partners, CruisingStore.com aims to provide real-time product support and deep data functionality to create the ultimate personalized cruise customer experience. Headquartered in Miami, Florida, the company is steered by cruise industry experts and technology innovators.

New Baby? New Tech Can Make a Big Difference

Innovative gadgets that can make parenting easier

Welcoming a new baby to the family brings with it excitement, challenges and a lot of love. It is also a lot of work. But, there is help… sometimes at the touch of a button. Amy O’Malley, MSN, RN, mother of five and director of education and clinical services at Medela, has pulled together a few tips for navigating the first few months and how to incorporate some baby (and mom) friendly technology along the way!

How many wet diapers? How long did he nurse? Use an App for That!

It is useful to keep a log of what happened when. But do you need a paper and pen? There are now apps to help moms track their breastfeeding sessions, how many dirty diapers the baby has and how long he or she slept for. Apps also offer the ability to share information with your spouse, partner and health care professional. There are also a number of new on-demand services available through apps that allow real-time access to health care professionals that focus on pediatric care or lactation services. For example, breastfeeding moms can use their smartphones to access real-time video support from lactation consultants through Medela’s 24/7 LC service.

Give Yourself Some Range with a Great Monitor

A video monitor is a perfect addition to any new parent’s arsenal of gadgets. In addition to monitoring the baby, many units feature two-way speakers, night-viewing capabilities and a temperature gauge, and offer the ability to check in on baby while on-the-go through either a website login or smartphone application.

Pump Quieter and Smarter

If you’re breastfeeding or planning on breastfeeding, a high-performance breast pump is a tool that can help make the task simpler for moms and caregivers. Double electric breast pumps are the fastest and most effective way to support a mom’s breast milk supply.

“Breast pumps have changed quite a bit since I had my children,” O’Malley said. “While a double electric breast pump is your best bet, newer models go beyond the basics and connect with smartphones to track activity. Our tech-enabled and quietest pump, Sonata, is comfortable and pairs with the MyMedela app to automatically track pumping sessions and offer personalized tips to help you succeed and monitor your baby. This pump even has many adaptions to meet your needs anywhere and anytime. It has features to help you use it late at night and can adjust based on your changing body shape to give you an effective and consistent experience.”

Find more information at medelabreastfeedingus.com.

Make Temperature Checks a Breeze

Gone are the days of placing a thermometer in your child’s ear or under his or her tongue or armpit. Temporal thermometers allow parents to simply place the gadget against baby’s forehead to get an accurate reading. Other options, such as pacifiers that double as thermometers, can also be utilized to make this task less invasive and more efficient.

You’re not alone. There is tech to help and don’t forget to ask your pediatrician and other friends or family members too. It takes a village to bring a new baby into the world! (Family Features)

1548990 A 1117 © 2017 Medela 4550110

SOURCE:
Medela