OnePlus recently released the developer preview of OxygenOS 11 giving us a glimpse of some of the impending design changes. Now, in its community post, OnePlus explains what went into the making of the new OxygenOS 11 design.
Posts tagged "design"
Remote working has gone mainstream with large parts of the world, including the UK, now telecommuting. The data bears this out – for example, Microsoft saw users on their collaboration platform Teams generate 2.7 billion minutes of online meetings worldwide in a single day in early April, a new record and just under five times the amount generated just four weeks earlier.
While it is incredibly important to stay connected and keep physically distant, there are serious privacy risks that need to be addressed. Working from home can increase the risk of unauthorized data transfers and sharing. The privacy of users can also suffer if suddenly many new unfamiliar tools have to be used to get the job done. This is compounded by the fact that home networks are rarely as well secured as corporate headquarters.
As an organisation, Mozilla has been focusing on the aspects of security and privacy in the home office for quite some time. Even before the crisis, half of all Mozilla employees (and 69% in the UK) were working permanently from home. Employers need to help their employees establish a secure home office environment to mitigate risks for both the individuals as well as the company.
When it comes to security, there are three core areas that should all be given equal attention in designing a home office – IT security, data security and connection security.
Large and small companies alike often prohibit the use of private hardware for work, be it a computer or just a USB stick. In the home office, however, people can quickly stop adhering to these strict rules. Private computers and devices are also more at risk as they are unlikely to have the same level of security measures in place as work devices. The latter tend to be supervised by an IT professional who has the right expertise to identify good antivirus software and firewall systems and ensure regular updates.
Therefore, it’s best to only use the devices provided by employers that have been secured in advance by the company’s IT department with common protection software. Business devices need to be protected in the home office – this means not using private USB sticks coupled with other private devices (via Bluetooth, for example) or private surfing on dubious websites during lunch breaks.
It’s wise to be especially careful when checking private emails at this time as well. Criminals are increasingly phishing and trying to spread malware in inboxes, both work and personal. This also highlights the importance of making sure your working device is up to date to protect against vulnerabilities – the browser and any other pre-installed software should always be kept up to date to do so.
Making sure you are password savvy is also important. Weak passwords can be more easily guessed or cracked through brute force attacks on networks, and if work passwords are the same or similar to the ones used privately, that could prove catastrophic for your place of work.
As such, when setting up work accounts, it is highly recommended to use strong, work-context only passwords that are different from those used for private browsing and personal online life. Some of our specific tips on this can be found here.
Given many of us will be accessing company resources from home at this time, one of the primary considerations for data security is the location of where data is stored. Especially as it’s expected that companies have access to their employees’ data at all times.
A strict separation of work and private computing devices, from laptops to smartphones and beyond, is therefore highly recommended. If it’s not possible, then data should be stored separately at the very least. Many companies already rely on secure cloud storage solutions such as Dropbox, Box, Onedrive or iCloud. For those, users must consistently observe the company's internal regulations, especially if they use a private device. Businesses should be encouraging users to take care when storing documents, and in particular not to store them on their private devices.
This also applies when transferring data to third parties, for example clients or service providers. Failure to use secure platforms such as professional email accounts, WeTransfer or Firefox Send can risk your data leaking into the wild and jeopardizing business continuity.
Since working remotely means that people often have to exchange even more data with their colleagues than before, the way that data gets transferred is extremely important. Many companies use a business VPN, a virtual network, for access to the internal company network, which stores all documents and programs. This is particularly well-protected against the interception of data – which is critical when working from home.
At home, people usually access the internet via their private home Wi-Fi. In most cases, this is not very well protected against attacks. While free networks (in cafés, train stations, etc.) are known for being very vulnerable to attacks if not secured by a VPN, the home Wi-Fi is also a weak point. Most people use their routers after purchase by plug & play, with the standard provided password and a weak Wi-Fi key. This isn’t ideal for private usage, but definitely insufficient for professional work.
A secure connection strategy for a home office is multi-pronged. In terms of your home network, it’s recommended to use at least WPA2 encryption for your WI-FI router, or WPA3 if you have access to it on your device. Making sure all related software and firmwares are up to date is also useful here. As is making sure you only access company data via a VPN and avoiding the use of public Wi-Fi networks unless a VPN is used.
Designing a secure home office, above all, is about consciously de-risking as many potential privacy and security factors as possible. Whilst not an exhaustive list, focusing on the above three areas will help employees and employers alike to have greater peace of mind and focus on the things that are business critical during this challenging time.
- We've featured the business internet security software for home working.
The Apple iMac revolutionized what we expected out of a computer when it was released. The bulkiness of the desktop transformed into a sleek for its time, all-in-one design that has been refined continuously since its inception. Its current look, that of a super-powered monitor, could take a big jump in its next redesign.
Apple may have just applied for this next revolution in its design with the US patent and trademark office. AppleInsider reports that the “electronic device with a glass housing member” patent application was just published and shows a device that abandons the brushed aluminum that’s been Apple’s visual style for a mostly glass device.
According to the patent, the upper portion housing the display and lower portion housing the inputs (keyboard and trackpad) will connected by a transition portion for a “continuous, curved surface”.
The patent also mentions a support structure to help hold up the glass display which might also contain the processing unit and other computing components. It looks like most of the computing power will be housed in the support structure with the glass surface being just fitted with sensors for the inputs, display and camera.
- Mac Pro 2019: release date, price and specs
- iPhone 12 release date, leaks and what we're expecting
- Best Mac 2020: the best Macs to buy this year
When does the future become reality?
It is entirely too early to say that this will be the future of the iMac but it’s definitely a compelling direction for the product if Apple moves this concept beyond its research phase. Even though the patent was just published on January 23, 2020, it was filed last May, meaning that the ideas here have been kicking around for a while.
The patent allows for a lot of variations in materials and functionality such as a potential folding keyboard but not much is certain beyond the broad strokes of the concept.
We hope to find out more sooner rather than later on what seems like a next-generation device, whether this becomes the next iMac or something complementing it in Apple’s line of products
- macOS Catalina is here: everything you need to know about macOS 10.15