cybersecurity

DApps
Why You Need to Know What a dApp Is 1024 709 LaDonna Kearney

Why You Need to Know What a dApp Is

Most apps today run on centralized networks. While centralization is efficient, it generates huge amounts of user data for unwanted exposure to hacking, clickbait and third parties profiting from stealing your data. DApps are stored across many distributed computers or nodes that make up a blockchain network.

Data security issues have generated interest in peer-to-peer solutions, which eliminate intermediaries and prevent data collection by blocking ads and trackers, letting you control your data and how it’s used. DApps can help businesses reduce the barriers preventing customers from accessing services, affording a competitive advantage.

Without a central authority, blockchains use consensus mechanisms to ensure the validity of transactions. The entire network is responsible for verification. There’s no single point of failure, making dApps reliable — blockchain networks span multiple nodes — each would have to fail simultaneously to produce an outage. And dApps are accessible through conventional web browsers.

Many institutions are attempting to improve the efficiency of financial markets by moving to blockchain solutions to develop a more democratized financial paradigm as an alternative to traditional financial services: parallel services without the need for centralized custody or fees from intermediaries. Insurance companies can promote easier settlements and faster payouts. There’s potential to unlock efficiencies in asset trading and settlement, investing, lending and borrowing, as well as real estate — and even health care.

But it’s true, too, that presently dApps need regulatory clarity to be fully effective for real-world payments. Custody activities, asset and derivatives trading, and automatic contract settlements need to be more clearly defined with greater transparency required across the board.

What are the positives of dApps?

  • They operate using computing power from different computers, not a central server. DApps don’t require personal information from users to grant access.
    • The anonymous nature of dApps makes them guarantee data privacy and increase consumer trust. For example, while cloud storage has improved information storage for business, the trade-off is lower data safety.
    • Malicious individuals can target data silos and take over company databases.
    • Blockchain-powered apps ditch this arrangement, relying on distributed computing systems. Accessing stored files would require hacking the entire network, which is difficult if not impossible. The data stored can only be decrypted by those with access to the cryptographic keys.
  • They improve customer privacy, better data safety, reduced downtime — there’s no single point of failure, preventing service interruptions and reducing application downtime.

Know the full story

Instead of using a username and password, you access decentralized applications with a private and public key, which can be awkward. Other possible drawbacks:

  • It’s not easy to modify the source code after deploying it — it’s difficult to launch a dApp and add new features to encourage scalability and maintenance. Developers can’t fix bugs and improve the system unless each peer on the network updates its node software.
  • There are major risks that need to be mitigated before decentralized finance can substantially displace traditional finance. There’s potential for growth, but a whole host of risks remain. Financial institutions and central banks are exploring how to combine the innovative aspects of decentralized finance with appropriate safeguards.

Basic governance requirements — especially in risk management — need to be mandated. Crypto asset investors and other stakeholders have seen risks from weak regulation and governance. It seems apt to compare dApps to the early days of the internet. DApps may seem mainly unproven, and skepticism is high, but there’s the promise of useful innovations.

Networks will have to gain scale and there needs to be interoperability across networks. DApps are open source, meaning that anyone can examine the inner works to ensure there are no hidden dangers; if the dApp isn’t up to par, the community can duplicate and launch an alternative version, giving developers a solid incentive to play fair, which isn’t often the case with standard apps.

This is just an introduction to a complex and rapidly growing field. To see whether dApps are right for you, work with IT and financial professionals.

©2023

Sign up for PeepTek Solutions’ Newsletter

Cryptocurrency
HR Insight: Cryptocurrency 940 788 LaDonna Kearney

HR Insight: Cryptocurrency

Can Employers Pay Wages in Cryptocurrency?

Despite the controversy surrounding it, cryptocurrency remains a hot topic. In the employment world, a top question is whether employers can pay employees in cryptocurrency. Before we determine this, let’s explore “cryptocurrency” a bit.

What is cryptocurrency?

Per the Cambridge Dictionary, cryptocurrency is “a digital currency produced by a public network, rather than any government, that uses cryptography to make sure payments are sent and received safely.”

In other words, cryptocurrency is digital money that utilizes encryption to secure transactions. These transactions are done without the involvement of banks and intermediaries via a distributed public ledger called blockchain.

There are many types of cryptocurrencies, with Bitcoin being the first and the most popular to this day. Some experts predict that Bitcoin’s value will eventually reach $100,000, though the possibility of collapse is ever present.

According to Kapersky.com, “Much of the interest in cryptocurrencies is to trade for profit, with speculators at times driving prices skyward.”

Among the interested parties are employees. In a 2022 study by Zety, 80% of respondents said they wanted to receive their salary or bonuses in cryptocurrency.

Can cryptocurrency replace a paycheck?

Generally speaking, it is not a recommended practice. Here’s why.

The Fair Labor Standards Act (FLSA) requires “payments of the prescribed wages, including overtime compensation, in cash or negotiable instrument payable at par.”

Note that the FLSA has some exceptions to the negotiable instrument rule. For instance, employers may be able to count food, housing or other facilities as wages. Generally though, employers must use cash or a negotiable instrument payable at par — such as direct deposit or paper check. Moreover, some states require wages to be paid in cash or a negotiable form of U.S. currency.

As explained by Littler, a law firm specializing in labor and employment law, “Cryptocurrency is neither cash nor a negotiable instrument in the United States and is not backed by the government or other legal entity.” As a result, paying base wages or salaries in cryptocurrency is not advised.

The reasoning is that employees should be paid in a manner that allows them to immediately access the payment. This likely won’t happen with cryptocurrency payments. Secondly, many states require wages to be paid free of cost to the employee. Therefore, employees must be able to convert their cryptocurrency payments into U.S. dollars without any fees. However, fees are normally associated with exchanging cryptocurrency to U.S. dollars, selling cryptocurrency or even using a cryptocurrency exchange card.

Some experts argue that employers can simply satisfy the FLSA‘s minimum wage and overtime criteria in U.S. currency and then pay any additional amounts in cryptocurrency. However, employers taking this route must also consider the rules for reporting cryptocurrency payments to the taxation agencies.

Despite any leeway made possible by the FLSA, employers should still proceed with caution, given the various governmental and administrative constraints.

©2023

Sign up for PeepTek Solutions’ Newsletter

cybersecurity remote employee training
Cybersecurity Training for Your Remote Employees 940 788 LaDonna Kearney

Cybersecurity Training for Your Remote Employees

Having Remote Workers Brings on New Challenges with Cybersecurity. Know the Risks and Offer Cybersecurity Training.

According to a Digital Defense Report published by Microsoft in 2021, the private industry’s support of remote work, in addition to factors introduced by the COVID-19 pandemic, has made remote workers a lot more susceptible to the actions of cybercriminals. Per the 2021 Microsoft report, “While most industries made the shift to remote work due to the pandemic, it created new attack surfaces for cybercriminals to take advantage of, such as home devices being used for business purposes.”

As you can infer, for companies that employ remote workers, it is important to implement training measures that teach them all about various cybersecurity dangers. But what should the training process look like?

Let’s explore some areas of consideration for your training process. These suggestions have been put forth by SANS Security Awareness in its Security Awareness Deployment Guide that covers how to securely work from home. The SANS guide outlines the core cybersecurity risks that remote employees are most likely to face as they work from the comfort of their homes.

Risk No. 1: Social engineering attacks

Social engineering attacks are one of the most dangerous and frequent risks that remote workers face while on the job from home. In essence, social engineering risks refer to situations where remote workers face psychological attacks. In these instances, the social engineering perpetrator tricks remote workers into making mistakes.

The perpetrators do this by taking advantage of vulnerabilities that remote workers deal with during difficult times involving a lot of change. You can think of the COVID-19 pandemic as a prime example of a time when social engineering risks were very prominent.

However, rather than focusing strictly on phishing attacks via email, it is important that employers pay attention to other modes of social engineering attacks, such as via text, over the phone, on social media and through the spread of fake news.

Risk No. 2: Not having strong passwords

A main cause of global data breaches is none other than weak passwords. Though not the only contributing factor, weak passwords put remote workers at risk of having their information stolen or compromised. To counter the likelihood of your remote employees being subjected to data breaches, make sure you train them on the importance of strong passwords and how they can reduce password-related risks.

During the training period, consider addressing the following points:

  • Setting up extra security measures, such as passphrases.
  • Establishing unique passwords for every online account.
  • Utilizing password managers.
  • Enrolling in multifactor or two-factor authentication.

Risk No. 3: Using outdated systems instead of updating them

Something else to keep in mind is that out-of-date technologies are gold mines for cybercriminals who want to target remote workers. To combat this, take measures to ensure that the operating systems, online applications, mobile applications and other forms of technologies that are used by your remote employees are always updated.

Also, remote employees who use their own personal devices for work-related tasks should be advised about the importance of keeping their systems updated too. For example, remote workers can enable automatic updates, which is especially helpful if updating devices is something your remote workers put off or forget to manually do.

3 more cybersecurity topics to cover in training

For starters, you’ll want to let your employees know about the importance of identifying and addressing suspicious online activity. Let your employees know what suspicious activity looks like and how they can report any suspicious activity they see.

From there, let your employees know that if they work remotely outside their own homes, they are still in harm’s way given the public nature of their workplace. As such, make sure they consider the cybersecurity threats associated with their daily work routines.

Finally, inform your remote workers about the importance of keeping their work-related technology private. Relay the fact that they should not let unauthorized persons access their work-related technology, including family and friends.

Make it a point to offer cybersecurity training to all remote employees

Training new remote employees on all things cybersecurity during orientation is always a wise idea. For remote employees who have been with your company for a longer period of time, make sure you provide training periodically so that your long-term remote employees are educated on critical cybersecurity developments as they arise.

To ensure that the training you provide to your employees is accurate, up to date and thorough, consider hosting training sessions that are led by remote-work cybersecurity experts.

©2023

Sign up for PeepTek Solutions’ Newsletter