Professional Documents
Culture Documents
Text Nº1: 7 Sneaky Ways Hackers Can Get Your Facebook Password 3
Text Nº2: With the increase in remote work, businesses need to protect themselves 6
against cyberattacks
Textos Inglés II
Text Nº1: How hiring more women IT experts improves cybersecurity risk 16
Management
2
Textos Inglés I
Text Nº1: 7 Sneaky Ways Hackers Can Get Your Facebook Password
Author: Jennifer Seaton
Source: https://www.techopedia.com/2/28629/internet/social-media/7-
sneaky-ways-hackers-can-get-your-facebook-password
Facebook can be a great way to stay in contact with friends and family. But it can
also make you more vulnerable. Your account likely has a ton of personal data and
connections that could benefit a hacker. The more you understand about how a
hacker can access your password, the savvier you will be at keeping it safe.
Here are seven sneaky ways hackers can access your password and what you can
do to stop them.
1) Suspicious Emails
You have probably heard many times by now not to open suspicious emails. This
is still true today. But fake emails have become much more sophisticated than in
the past. Fake emails might appear to be from Facebook and have all the
formatting and logos you expect in a legitimate email. It can be very difficult to
determine if an email is fake.
There are a multitude of ways a hacker can use a suspicious email to gain access
to your Facebook account. The best way to avoid this is to delete the email and do
not click on anything in the email. It is best to not even open suspicious emails.
If Facebook has to reach you, they can do so from your Facebook account. If you
get an email from “Facebook”, instead of opening the email, log into your account
to see if you have a notification there. Do not trust any emails that ask for account
information, request money, or threaten to suspend your account.
©Techopedia
3
2) Phishing
The purpose of many fake emails is phishing. Phishing is when someone asks for
personal information that they can use to gain access to your account. A common
way to phish is to trick someone to sign in on a fake site.
Some hackers will go through the trouble of creating a fake website that looks the
same as Facebook. But, you can avoid this trap. It is always best to go to Facebook
rather than click on a link. If you do use a link, carefully read the email address.
Does it look correct, or is Facebook misspelled? Finally, check for the secure icon
in the web address before signing in.
4) Password Spraying
Coming up with a password is hard. It can be tempting to use something like
“123456789”. Of course, that is a bad idea; it is too easy to guess. But many people
do use similar easy passwords. Because of this, many hackers employ password
spraying. This is when they guess a password by using the most common
passwords.
It is hard to remember a random alphanumeric sequence. So, more people use
words, which limits the number of potential passwords available. When creating
a password, it is best to use a unique phrase, replace some of the letters with
numbers, and vary the capitalization. And definitely avoid any variation of the
word “password”, including pa$$word123.
4
6) Keylogging
Keylogging is a more advanced hacking technique. It requires installing a program
on your device to track everything that you type. This can give hackers far more
information than just your Facebook login information. They could even get credit
card information using this method.
But, because a hacker needs to install a keylogging program on your device, it is a
little easier to protect yourself against this sort of attack. Generally, hackers hide
these programs in other software. To stay safe, do not download anything from
an untrusted source. Your computer’s security software can detect these
programs, but you might want to get anti-malware software for your smartphone.
Make sure to keep your security software up to date too.
7) Unsecured Networks
Even if you have the best passwords, and are using the most secure computer, it
won’t help if the network you are using is not secure. Public Wi-Fi is often
unsecured. Unsecure networks allow hackers to snoop through all the data that
you send and received from webpages while on that network.
Instead of using free Wi-Fi to access Facebook on the go, sign in using mobile data.
It will ensure that your data is more secure. Or consider getting a virtual private
network (VPN). Many VPN providers will encrypt your data, which will protect it
even if you are connecting to the internet on an unsecured network.
5
Text Nº2: With the increase in remote work, businesses need to protect
themselves against cyberattacks
Author: Michael Parent
Source: https://theconversation.com/with-the-increase-in-remote-work-
businesses-need-to-protect-themselves-against-cyberattacks-138255
The COVID-19 pandemic and subsequent lockdown have forever changed how we
socialize and conduct business. More and more, our personal and professional
lives will be online.
Paradoxically, our office towers sit empty. However, the amount of traffic in the
virtual world continues to increase exponentially. Our physical borders are
closed, but the virtual ones remain wide open, and relatively undefended.
Cybercriminals — callous opportunists of the worst kind — take advantage of
crises to engage in even more attempts to penetrate computer networks and
extract data.
Phishing, smishing (SMS phishing) and vishing (voice phishing) attacks are all on
the rise. Our tendency to click on infected emails has increased with the
correspondent increase in email traffic — a two-fold impact on the severity of the
threat environment.
© The Conversation
6
Concurrently, managers in organizations are dealing with unseen reductions in
business volumes and making the difficult decisions of laying-off employees,
shutting down plants and stores, and yet somehow still maintaining some kind of
presence and level of customer service in the hope of recovering losses once the
pandemic response restrictions are eased.
The challenges for enterprises of all kinds, then, are many: How can they maintain
service levels while managing cuts and workarounds?
How do they provide employees with the equipment, tools, resources and
information to work from home? How do they balance restrictions from the
lockdown against recovery when it lifts? How do they support employees and
protect them from burnout, exhaustion and other mental health issues? This is
especially true for administrative front-line workers like those in information
technology (IT) who are now responsible for maintaining secure, fully operational
and accessible virtual work environments.
START: The most important thing to start is to monitor internal and external
security threats and incidents. A few months ago, most of us had not even heard
of Zoom, much less used it on a daily basis for both work and social gatherings.
Most of us were not used to working from home, accessing work files remotely,
uploading and downloading gigabytes of data. Most of us did not have more than
rudimentary security on our home routers and networks. Most of us only had a
passing knowledge of the IT support staff at work (usually called in a panic).
For managers and executives, this means daily reports on security incidents, their
sources (internal or external), their nature and whether new types of attacks and
attackers have been observed.
Enterprises also need to start asking themselves about the impact this new work
environment has had on customers, employees, suppliers and other stakeholders.
Executives should monitor what is being adjusted, and how. For example, to what
extent are access permissions (to databases, files, systems and information) being
increased? Concurrently, to what extent are insider monitoring programs being
deployed to ensure employees do not inadvertently, or deliberately leak
confidential or proprietary information?
7
Finally, the time has come to start enhanced online security protocols and tools,
like multi-factor authentication, which only 57 per cent of enterprises are using.
STOP: In dealing with the new, distributed and virtual operating environment,
organizations should first immediately stop or suspend any non-critical IT
projects: this is not the time to continue with replacement of administrative
systems, access systems, enterprise networking enhancements, application
development or any other project aimed at changing or enhancing business
processes.
There are two reasons for this. First, IT staff burnout increases exponentially in
the current situation. They are dealing with a deluge of requests to configure
home systems, manage access, provide ad hoc and formal training and deal with
emergency shutdowns, not to mention an increased risk of breaches. They are not
only at risk of burning out, but of making critical errors if they are also asked to
continue non-essential development work.
The second reason is that hackers and other criminals will deliberately target
organizations that are attempting to juggle remote staff support and IT
development, perceiving these organizations to be weak, unfocused and
inattentive.
8
Executives need to continue monitoring resources in their organizations, and
where necessary, rapidly adjust budgets, staffing levels and other resources,
allocating them to those areas that most need them. This might mean re-allocating
IT development budgets and staff to cybersecurity or plant and office
maintenance to supporting remote work environments.
Finally, executives need to ensure that succession plans for key staff are current.
This is especially true for IT and cybersecurity personnel.
After-Reading Task: Find 5 example sentences which use the Verb To Be in the
text.
9
Text Nº3: Bard: Google launches ChatGPT rival
Author: Zoe Kleinman
Source: https://www.bbc.com/news/technology-64546299
Bard will be used by a group of testers before being rolled out to the public in the
coming weeks, the firm said.
Bard is built on Google's existing large language model Lamda, which one
engineer described as being so human-like in its responses that he believed it
was sentient.
The tech giant also announced new AI tools for its current search engine.
"Bard seeks to combine the breadth of the world's knowledge with the power,
intelligence, and creativity of our large language models," wrote Google boss
Sundar Pichai in a blog.
ChatGPT can answer questions and carry out requests in text form, based on
information from the internet as it was in 2021. It can generate speeches, songs,
marketing copy, news articles and student essays.
10
It is currently free for people to use, although it costs the firm a few pennies each
time somebody does. OpenAI recently announced a subscription tier to
complement free access.
But the ultimate aim of chatbots lies in internet search, experts believe - replacing
pages of web links with one definitive answer.
Sundar Pichai said that people are using Google search to ask more nuanced
questions than previously.
Whereas, for example, a common question about the piano in the past may have
been how many keys it has, now it is more likely to be whether it is more difficult
to learn than the guitar - which does not have an immediate factual answer.
"AI can be helpful in these moments, synthesizing insights for questions where
there's no one right answer," he wrote.
"Soon, you'll see AI-powered features in Search that distil complex information
and multiple perspectives into easy-to-digest formats, so you can quickly
understand the big picture and learn more from the web."
© BBC News
After-Reading Task: Find 5 example sentences which use the Verb Can in the
text.
11
Text Nº4: Mastering the Foundations of AI: Top 8 Beginner-Level AI Courses
to Try
Author: Claudio Buttice
Source: https://www.techopedia.com/mastering-the-foundations-of-ai-top-6-
beginner-level-courses-to-try/2/33995
Artificial intelligence (AI) and machine learning are amazing technologies that are
revolutionizing practically every field of human activity. Intelligent machines can
assist or downright substitute humans in literally all tasks, from business and
commerce to health care, environment, communications, and any endeavors we
can imagine.
Understanding AI, while this tech is still in its prime days, is a great way to boost
a career in technology. Professionals who can build thinking machines able to get
the most value from the immense vaults of unstructured data currently floating
around are highly sought after by employers across the globe.
Whether you already have experience in the technology field or you are a student
with little or no background in AI and programming, there are many online
courses available to outpace your competition and find the job of your life.
IBM, for example, offers many of these online courses that are streamlined to give
you a firm understanding of AI and many of its use cases, plus an applied
understanding of machine learning and deep learning, with no prior knowledge
expectations.
©Techopedia
12
Introduction to Artificial Intelligence (AI)
Everyone has to start somewhere, right? Well, let’s start from the very beginning,
then! This introductory course will teach you the basics of AI even if you’ve got no
technical background nor any computer science expertise. You will learn about
the most recent use cases and applications of AI, understand how your job may
benefit from a general knowledge of AI, the basic terminology, and the
controversies and ethical questions surrounding this technology.
After the course, you will test the skills you learned with a hands-on project, and
then earn a certificate you can share with your present or future employers.
In particular, by knowing more about this AI, you will get a practical overview of
how this technology can be applied to improve the workflow of any organization.
13
machines. This simple and accessible course will take you from zero to
programming in Python in just a few hours — 17 in total, to be exact.
In this hands-on course, you will build, train and test your own custom image
classifiers through several labs on the cloud environment. You will even deploy
your own CV web app to the cloud.
A great place to start even for people who lack a technical or programming
background, this specialization is suited for literally everyone, from students to
IT professionals.
Comprised of all six of the courses listed above, this specialization will provide
you with plenty of practical examples and use cases.
15
Textos Inglés II
Text Nº1: How hiring more women IT experts improves cybersecurity risk
management
Authors: Camélia Radu & Nadia Samaili
Source: https://theconversation.com/how-hiring-more-women-it-experts-
improves-cybersecurity-risk-management-193701
Despite the contributions women have made to the information and technology
field, they continue to be underrepresented. Ada Lovelace, for example, was the
world’s first computer programmer. Grace Murray Hopper developed the first
compiler. And Hedy Lamarr co-invented the modern spread-spectrum
communication technology, which is found in Bluetooth, Wi-Fi and GPS
technology.
Today, the leading figures in the IT field are all men. Although 39 per cent of the
board members of Silicon Valley’s biggest tech companies are women, all the
chairpersons and CEOs are men: Arthur D. Levinson and Tim Cook for
Apple, Satya Nadella for Microsoft, Jeff Bezos and Andrew Jassy for
Amazon, Mark Zuckerberg for Meta, and John L. Hennessy and Sundar Pichai for
Google.
But progress is being made. A study from Osler, a business law firm, found that 23
per cent of S&P/TSX 60 company boards seats were held by women. This is an
increase from data we — as accounting researchers — collected on Toronto Stock
Exchange companies between 2014 and 2018 that found the following: 11.7 per
cent of companies had one woman on the board of directors, 27.7 per cent had
two women, and 56.3 per cent had at least three women.
But when it came to the number of women IT experts on boards, the number was
even lower. Only 22 out of 683 board members in 2018 were women IT experts.
Although this number had doubled since 2014, it remained very low. It’s
important to increase the number of women working in IT — not just for equality
reasons, but because women improve key organizational outcomes.
16
directors, cyber risk management improves. Proper cyber risk management is key
to the success of tech companies.
17
© The Conversation
Women are more informative, meaning they tended to value communication and
disclosures more than men did, and collaborated better with stakeholders.
Women also had lower risk tolerance, enhanced ethical practices and engaged
less in fraudulent practices.
These specific skills, combined with their IT expertise, meant women improved
the cybersecurity risk monitoring of their companies. Ultimately, having more
women IT experts on boards could result in a more integrative cybersecurity
approach that brings technological, business and ethical perspectives together.
Another way to close the gender gap is to promote more women to executive
positions. As of 2020, the Canada Business Corporations Act requires public
companies to provide information on policies and practices related to diversity
on boards and within senior management. More young women should be
18
promoted to IT leadership positions to feed the pool of potential candidates for
the board.
Updating the skills of existing board members should also be a priority. Ethics and
cybersecurity should be a training priority for all board members. As
such, updating ethics and cybersecurity skills of all board members is a step
towards improving the skills of women on boards.
19
Text Nº2: How do video games provide effective learning?
Author: Majia Koslova
Source: https://www.cambridgeenglish.org/blog/how-do-video-games-
provide-effective-learning/
© Cambridge English
There are five broadly defined prerequisites for effective learning: meaningful
context, authenticity, motivation, freedom to make mistakes, and learner
autonomy. Cambridge English teaching and learning materials harness the power
of meaningful context and authenticity by presenting new language in a way that
creates a genuine need to interact and communicate. And, as all teachers would
attest, learners are most successful when they are motivated, free to learn from
their mistakes, and take ownership of their own learning process.
22
Text Nº3: An Introduction to Application Software
Author: Tara Struyk
Source: https://www.techopedia.com/2/28350/personal-tech/software-
applications/an-introduction-to-application-software
©Techopedia
Whether creating a presentation for work, searching for a mate or just wanting to
find out where to buy a box of Girl Scout cookies, there’s probably an app out there
to help you do it. Unfortunately, there’s no app that actually explains what an app,
short for application software, actually is or does. Here, we’ll take a high-level
view of this term, including what it means, how it’s used and how it has evolved –
and you don’t even need an app to read it.
23
Application software applies the power of system software. This is why when
downloading software, you have to find a version that is compatible with your
running operating system. In essence, that software draws on the OS to create
a Word document, spreadsheet or PowerPoint presentation.
Applications from A to Z
As you may have surmised, there’s a world of application software out there. The
reason is simple: Computers are used to complete a very diverse set of tasks. Thus,
the application software category includes the following types:
Application Suite
This refers to multiple and related bundled applications, such as Microsoft Office,
which includes Word, Excel, PowerPoint, OneNote and possibly others,
depending on your suite version.
Database Software
A database is a type of electronic filing system for the information used by various
computer programs. Database software acts as the filing clerk for this system by
keeping everything organized and storing, modifying and extracting database
information. Large organizations use industrial-strength database systems
like Oracle and Microsoft SQL Server. At a less intense level, you'll see database
systems like Microsoft Access and MySQL.
Educational Software
Designed for teaching or learning, educational software applications are able to
run tests, track programs and include software, such as MATLAB.
Enterprise Software
Enterprise software refers to applications businesses use to solve business-level
problems. This category includes software for billing, payment processing and
human resource (HR) management. (Learn more about this category
in Enterprise Computing: What's All the Buzz?)
Presentation Software
If you’ve ever created a slideshow presentation, you are already familiar with this
type of application. Presentation software is designed to arrange information for
use in a demonstration or display. Examples include Microsoft PowerPoint,
Keynote and SlideRocket.
Simulation Software
Simulation software models real phenomena by using a set of mathematical
formulas. This application type is used for research and design, as well as
entertainment. Simulation software applications include flight simulators,
weather simulators and feedback control systems.
Spreadsheet Software
Spreadsheet applications allow users to compile data and perform calculations in
a spreadsheet format. Common examples include Microsoft Excel, Lotus 1-2-
3 and Apple Numbers.
This type of application was popularized by Apple through its App Store, where
applications are sold for a few dollars apiece. These apps work only on Apple
devices. So, other companies have followed Apple’s lead, creating apps
for Android and BlackBerry devices. In fact, in 2015, more than 200 million apps
were downloaded – per day – totaling 75 billion apps for the year. In 2016, that
number jumped to 90 billion apps, lending credit to the notion that there truly is
an app for just about everything you could imagine (and several things you
couldn't ... or wouldn't want to).
After-Reading Task: Find 5 examples of the Past Simple Tense in the text.
26
Text Nº4: Have we fallen out of love with voice assistants?
Author: Katherine Latham
Source: https://www.bbc.com/news/business-64371426
To begin with, Abigail Barnes loved her voice assistant. Now it lives in the
drawer.
"I used [my Amazon Alexa] to turn on the lights or set a timer, and as a speaker
for books and podcasts," says the 43-year-old Londoner. "She turned my fan on
and off during the heatwave and played me Christmas music in the winter."
Ms Barnes would ask her device to set alarms, tell her the time or for the weather
forecast.
"I kept my first Alexa in the kitchen and, a few months later, I got a second Alexa
and set it up in my bedroom."
However, Ms Barnes fell out of love with her voice assistants when they began
giving her frequent delivery notifications, asking her to review purchases or
prompting her to reorder items.
"It started giving me random updates or asking me to rate a product I'd bought
last month," she says, "which I found really irritating."
"I stopped asking her to turn off the lights when I went to bed, as I'd ask a number
of times and then manually turn them off anyway."
What started out saving her time, she says, quickly became something that cost
time.
27
© BBC News
Voice assistants, such as Amazon's Alexa, Google Assistant and Apple's Siri, enable
users to control IoT devices by voice command.
It is estimated that this year, the number of voice assistants in existence will
match the global population - at around eight billion.
However, after several boom years, the big tech companies are making cutbacks,
with their voice assistant units in particular trouble.
Amazon is in the process of cutting 18,000 jobs. Of those cuts 2,000 will fall on its
devices and services unit, which develops Alexa and smart speakers.
Google also reportedly made the decision to scale back development of its
Google Assistant.
Do these mounting losses and job cuts point to the downfall of the voice assistant?
When Alexa launched, Amazon pioneered a new business model. The goal wasn't
to make money from selling the devices themselves but for shoppers to make
purchases using the voice assistant.
In terms of engagement Amazon's voice assistant has been a success. Amazon says
it has more than doubled the number of active Alexa customers over the last three
years and Alexa has "billions" of interactions every week.
28
But it's not clear whether they are money-making opportunities. Reports say most
interactions are relatively simple tasks like checking the weather, or playing
music.
More broadly, according to one report, over the past three years voice assistant
use has been falling and another report suggests that the adoption of smart
speakers is slowing.
"Voice assistants have not become as socially sticky as promised," says Helen
Jambunathan from consumer insights agency Canvas8.
"A number of factors have fed into this, including concerns about privacy."
In its defence, Amazon says it reviews only a tiny fraction of Alexa requests to help
improve the service.
Add the cost-of-living crisis to this, she continues, and voice assistants have
become a luxury item "unable to compete with other aspirational luxury or tech
purchases".
However, while voice assistants may be losing their appeal for general use, in
healthcare they are on the rise.
29
"Smart assistants are evolving - it's early days," he says. "We've come a long way
over the past eight years and we're certainly not stopping. What we're doing can
change people's lives."
Majesticare provides residential, nursing and dementia care, and is one of the
UK's first care groups to introduce Alexa Smart Properties for Senior
Living into their homes.
"It's just amazing to walk into a resident's room and know that they are listening
to music they have chosen, or catching up on their favourite radio shows," says
Angela Boxall, CEO of Majesticare.
Residents are able to connect with family and friends. They can ask for a drink,
find out what's on the menu, or ask what activities are planned that day - simply
by talking.
"Video calls with loved ones bring peace of mind," says Ms Boxall, "and [the
residents have such] wonderful smiles when they see the ones they cherish."
While voice assistants might have found a useful niche in healthcare, their appeal
in the broader market may be on the wane.
Abigail Barnes's Alexa won't be seeing daylight again any time soon.
"I do miss her," she says. "I may revisit her, but [if I do] I'll invest time in looking
into the notification settings, and reading the terms and conditions."
30