Thursday, April 5, 2018

Tech Term: What is a Dongle?

There are countless examples of words that have evolved to meet the needs of their times. Meat once referred to solid food of any kind before it came to mean the edible flesh of animals. The word nice once had many meanings that completely contradicted each other. Today’s Tech Term, dongle, is another word that has evolved, albeit at a faster pace.
There is no questioning that the term dongle is largely used in reference to technological devices, just as there is no questioning that “dongle” is an inherently silly word.
However, this silly word has become a constant in the world of tech, especially on the consumer side of things. Dongles can be found everywhere, from the adapters that allow headphones to be used with devices that are now made without headphone jacks, many of the streaming devices that can be found in the home could be considered dongles, and arguably any device that plugs into a computer via a USB port qualifies as a dongle.
Officially, the term dongle (if defined by its most common denominator in computer networking) is any small device that is plugged into a computer to allow a particular network connection to be made. We see them most often today in USB devices. However, this blanket term doesn’t include USB devices that serve as data storage devices. Instead, the term dongle applies to other USB devices, such as Wi-Fi dongles that connect a device to a wireless network, or a modem dongle that connects to 3G or 4G wireless Internet networks.
As for the name itself, there are a variety of theories, including that the term is simply a play on the work ‘dangle’ (which most dongles do), or that the term held some significance to the developers of the Commodore PET Computer, which was released in 1977 and used a device similar to a dongle to boost its memory.
Regardless, the dongle is a term that is ingrained in modern technology. For more tech terms, tips, and tricks, make sure you subscribe to this blog!

Have You Considered What You’re Really Losing When You Lose Your Phone?

Losing a smartphone can be a problem for anyone. For the modern business, it can really cause issues. Mobile devices are notorious for housing a lot of personal information, which makes them extraordinarily dangerous to lose track of. How much is at stake with mobile devices going missing; and, what kind of information is stored on these devices that makes them so dangerous to misplace?
To get started, let’s think about the information that’s being put at risk. Here is a list of information that could possibly be stolen from mobile devices--a surprising amount of data for most users, to say the least.
  • Payment information: The applications on your device could potentially be storing credit card numbers or bank routing numbers, which could become problematic if stolen. Hackers could make off with all of your precious, hard-earned cash.
  • Passwords and usernames: If you use your device’s web browser, it’s likely that you have passwords and usernames saved on it--even if it’s been done accidentally. These usernames and passwords can be stolen from the device, or used on the device by whoever is accessing it.
  • Application data: There are a lot of applications installed on your business’ devices, and these applications store lots of information that a hacker could have a field day with. Even if applications are locked behind a login screen, these accounts can be infiltrated if the login credentials are stored on the device
  • Cloud storage: Access to cloud storage is one of the best things about mobile devices, but if you lose one, you’ll be compromising any sensitive data that your account has access to. Any information that’s shared with your device will be accessible by whoever finds your misplaced device.
  • Social media accounts: If you have social media applications on your device, it’s likely that you have the password and username saved to the device. This means that anyone who finds your device will have access to your social media accounts, ready to use for whatever vile purposes they want.
  • Email: You’d be surprised by how much information you keep hidden in your email inbox. Think what would happen if any of your countless messages was accessed by a hacker who has found your smartphone. Now THAT’s frightening!
  • Contacts: You might not think the people you associate yourself with are valuable targets for hackers, but they certainly are. Contact lists for both business and personal use hold a lot of value, as it essentially becomes a list of potential targets to hit with phishing scams.
Keeping all of this in mind is of the utmost importance, especially if you want to make sure your mobile devices don’t become a liability in the event of a loss scenario.