Scam of the Week: Phish with Hidden Sting

04-phishingThere is a particular type of Phishing attack which research teams see more and more often. This attack plays out as follows:

  1. Employees receive an email with an attachment — usually PDF or DOC.
  2. The body of the email contains no malicious links and consists only of a social engineering ruse to open the attached doc.
  3. The attached doc is itself not malicious — i.e., no exploits or malicious macros/scripts. What’s visible to the user is a second ruse to click an embedded link in the document.
  4. The link embedded in the doc leads to either an exploit site/page or a fake login page for a recognized service (your bank or payroll service).
  5. These phishes are slipping past anti-virus (AVs) and email security apps/appliances because the email body contains nothing obviously malicious and the attachment itself is not malicious in and of itself. AV and email security apps are not scanning the links in the attached docs.

Be watchful for this new tactic. Warn your associates about this. Never open attachments you did not request. When you get an attachment, verify if that person sent it to you actually did send it to you and why. When in doubt, throw it out. Always Think Before You Click.

The Importance of Conducting Due Diligence on 3rd Party Providers

04-duediligenceWe’ve entered into an age where network security breaches aren’t just common – they’re alarmingly more common than you think. According to the 2015 Cyberthreat Defense Report, an incredible 70% of all organized were compromised by a successful computer security breach at some point during the previous year. Hackers and other people with malicious intentions are targeting large corporations, small businesses and everyone in between. It’s up to you to ensure that you’re properly prepared. But what do you do when you are tasked to provide a certain amount of control over your data to a third party vendor?

Are third parties putting you, your customers and ultimately your business at the risk of a breach?

The answer, unfortunately, is “probably.”

The Facts
Two of the biggest (and most successful) data breaches over the last few years struck Target and Home Depot, respectively. Each attack cost victims millions of dollars in damages and negatively affected the reputations of two of the most recognized brands in the marketplace. Both data breaches were the result of vulnerabilities at third party vendors that the companies were working with.

According to a recent study that was conducted by the Ponemon Institute, Target and Home Depot aren’t alone. An alarming 53% of all surveyed organizations felt that the negligent actions of third parties like vendors, outsourcers and more were putting their own businesses at risk for similar attacks.

Two Ways Third Parties Are Putting You At Risk

  1. Weak Password Security Policies
    Your organization could institute the strongest possible password policy but if your third party vendor still uses “1234” as the password on their firewall, you’ll ultimately be the one to pay the consequences.
  2. Risk Management (or Lack Thereof)
    Many people don’t realize that your third party vendors often have third party vendors that they themselves are working with. This essentially puts them in a similar situation to the one that your business finds itself in – a breach at a third party vendor three levels removed from your company can eventually find its way back to your virtual doorstep.

Tips & Best Practices

  1. Always make sure that your vendors all have proper governance policies and that they’re strictly adhering to local and federal rules and regulations regarding which departments have access to what types of information, what those employees can do about it and more.
  2. You should always inquire into their password policies to make sure that they’re making sure that their own users are including things like special characters and are periodically changing passwords to help prevent network security breaches in the first place.
  3. Make sure that you’re always aware of exactly who is handling your business sensitive data and be vigilant at all levels. This includes overseeing people like data encrypters, cloud security providers, data backup organizations, point-of-sale maintainers and more – not just the regular IT professionals that you actually see and interact with daily.

Sometimes the people you DON’T see on a regular basis are the ones that you need to be paying the most attention to.

5 Steps To Protect Your Business From Cyber Crime

04-cybercrimeA Seattle company was recently broken into and a stash of old laptops was stolen. Just a typical everyday crime by typical everyday thieves. These laptops weren’t even being used by anyone in the company. The crime turned out to be anything but ordinary when those same thieves (cyber-criminals) used data from the laptops to obtain information and siphon money out of the company via fraudulent payroll transactions. On top of stealing money, they also managed to steal employee identities.

Another small company was hacked by another “company” that shared the same high-rise office building with them. Management only became aware of the theft once they started seeing unusual financial transactions in their bank accounts. Even then, they didn’t know if there was internal embezzlement or external cybertheft. It turned out to be cybertheft. The thief in this case drove a Mercedes and wore a Rolex watch… and looked like anyone else walking in and out of their building. Welcome to the age of cybercrime.

You Are Their Favorite Target

One of the biggest issues facing small businesses in the fight against cybercrime is the lack of a cyber-security plan. While 83% lack a formal plan, over 69% lack even an informal one. Half of small business owners believe that cybercrime will never affect them. In fact, small businesses are a cybercriminal’s favorite target! Why? Small businesses are not prepared and they make it easier on criminals.

The result? Cyber-attacks cost SMBs an average of $188,242 each incident and nearly two-thirds of the businesses affected are out of business within 6 months (2011 Symantec/NCSA Study). A separate study by Verizon showed that over 80% of small business cybercrime victims were due to insufficient network security (wireless and password issues ranked highest). With insecure networks and no formal plan to combat them, we make it easy on the criminals.

How They Attack

The #1 money-generating technique these “bad guys” use is to infect your systems with malware so that whenever you (or your employees) visit a web site and enter a password (Facebook, bank, payroll, etc.) the malware programs harvest that data and send it off to the bad guys to do their evil stuff.

They can get to you through physical office break-ins, “wardriving” (compromising defenseless wireless networks) or e-mail phishing scams and harmful web sites. Cyber-criminals are relentless in their efforts, and no one is immune to their tricks.

5 Steps To Protect Your Business

  1. Get Educated. Find out the risks and educate your staff.
  2. Do A Threat Assessment. Examine your firewall, anti-virus protection and anything connected to your network. What data is sensitive or subject to data-breach laws?
  3. Create A Cyber-Security Action Plan. Your plan should include both education and a “fire drill.”
  4. Monitor Consistently. Security is never a one-time activity. Monitoring 24/7 is critical.
  5. Re-Assess Regularly. New threats emerge all the time and are always changing. You can only win by staying ahead!

The second annual Microsoft Small Business video contest is here!

02-small-biz-contestMicrosoft is launching their second annual Small Business video contest, and we need your help. Last year we launched our first small business video contest with a simple request for small businesses to share their business stories via a 2-minute video. We reached 21 million people and had over 175 entries.

Our 2016 contest, starting January 25, is a great opportunity for business influencers to help small businesses in the US.

We will recognize the best, most inspirational and original video that showcases a small business story. The grand prize winner will win $20,000, new Surface Pro 4s, and subscriptions to Office 365 for their business (up to 10 devices/seats) in addition to a publicity package.

In addition, this year we will award a prize to four business associations. When a business connected to your organization enters the contest, they can write in your organization name for a chance to win a Surface Pro 4 and one-year subscription to Office 365.

The 2015 grand prize winner was Citizen Frederick, a men’s retail clothing store. Other winners included an innovative technology product for pets, a women’s clothing boutique, an embroidery franchise and a frame shop. Among the dozens of entries we received there were many inspirational stories from non-profits, retail, and online businesses.

Contestants can read more and enter the contest

“It was great fun and more importantly, our small business was seen by a few more people… It is great for a large company like Microsoft to support the little guys and both Luke and I appreciate your help!”
~ Custom-Wood-Urns

How you can help

We encourage you to be a part of this campaign and help make it a success by promoting it to your members. Following are a couple of suggestions:

Project Health Reporting – The Overlooked Project Success Factor

02-project-healthSooner or later every organization is faced with a technology or organization change project in trouble. Most times we find out when the money is gone or when it’s too late to do anything beyond surviving the outcome. Very often project sponsors see project reporting as a routine process that only requires selecting the right project manager, outsourced systems integrator or systems provider. Experience tells us this perception is far from valid. Those of us who have run projects or supervised the work of project managers recognize four realities:

  • Good projects led by strong project managers sometimes go bad
  • Project Managers are under tremendous pressure to show progress
  • Most reporting is after a problem surfaces, rather than leading in anticipation of a problem
  • In large projects and multi-project programs, key communications and expectations are often missed or misinterpreted

These realities led us to look at a two-phase approach to look at project health/status reporting that goes beyond the typical, cost, schedule, and issue reporting.

The first step is to apply a type of 360° assessment to strategic projects. In this approach, input is collected from key project players — half on the management or customer side and half on the in-house or contracted integration or project delivery side. Weekly input is collected anonymously. Each factor is rated on a simple scale from poor to excellent.

Click to view larger
The weekly collection is displayed in a dashboard that allows decision makers to look at trends that anticipate current and emerging issues. The cross section and anonymous nature of inputs removes the bias towards looking successful.

Click to view larger
The second phase aligns expectations in order to ensure everyone on the team is on the same page. This step addresses the critical communication of expectations within the project team and between the project team and key stakeholders.

The purpose is not to perfect the expectations between all members of a large team as the number of combinations would become unmanageable. We want to:

  • Identify the key relationships (e.g. Sponsor to Project Manager; Project Manager to Technical Lead, Architect, or Process Analyst; etc.)
  • Identify areas of misalignment and take corrective action at project initiation, key milestones and in response to issues raised through “Pulse Checks” mentioned above
    1. Coach each stakeholder to develop specific and measurable expectations of others and what they think is expected of them for identified areas of misalignment
    2. Analyze results to identify the largest misalignments
    3. Feedback the results to the Project Stakeholders and develop an action plan to resolve expectation differences

This two phase approach moves project reporting from a rehash of what has happened to a dynamic look at the drivers of project success. It will enable decision makers to anticipate problems and when required, develop a blueprint to full project recovery.

Click to view larger
In terms of overall project delivery, project controls and health checks are one part of the project delivery process, which also includes steps required to initiate, plan, execute, and close. Success in all areas requires strong and systematic project management to ensure delivery that meets requirements within budget and on-time. For projects that require a change in behavior beyond product delivery, we strongly believe emphasis needs to be placed on organization change management to assure realization of measureable business value.


1 PMI.org

Social Media Tips and Tricks

02-SMMtipsPick One Platform

If you don’t have time to fully devote to social media upkeep, choose one platform (Facebook, LinkedIn, Twitter, Instagram) and do it well.

Planning

Choose how much time you want to devote to social media and include it in your weekly/daily schedule. Pre-write any posts/blogs and proof before sharing (spelling mistakes and grammar errors get called out all the time!) Make sure if you are posting pictures that the picture is cropped to showcase correctly. Great shots of products are only great if the product is visible!

Find Your Voice

If you have the ability to do so personify your business. Decide on a voice that fits your brand and attach your target demographic to it. For instance, if you are selling sneakers, perhaps the voice is that of a runner. If you are promoting a day care perhaps the voice is a grandma that smells like cookies. Have fun with it but really think through and commit. Consistency is incredibly important to develop a solid personification.

Target Audience Digital/Advertising

Take a look at some of the costs of advertising on Facebook. It is REALLY cheap in comparison to other avenues and it hits your target audience! Be aware that this ad needs to be less than 7 words if possible since people will view it scrolling. I would recommend an image and a punchy headline. Also, here is a weird thing…stay away from putting words on a red background. We discovered in our research that people don’t typically read words on red. Decide where your audience will be directed if they click on the add. Would you like them to go to your home page, to the actual item picture, to a lead capture form? You might have to do some testing to find out what works best. Digital add designs are one place that I would recommend consulting with an expert. Paying a little bit for an hour or two to sit down with some one and talk through what really captures people’s attention is never a bad thing.

Have Fun

Social media reaches a mass audience, have fun with it. The more interesting your business is portrayed in the online community the more followers you will. Take selfies of events you attend or places you go and tag people/places/businesses. Share posts or articles that were interesting to you and say why when you post it. Shout out to people that you meet or know publicly on social media, promote others and they will promote you!

Build A Fan Base

This is where it really gets going. If you can, offer contests for your audience and give away prizes to whoever wins. For example, who ever get’s a 100 likes on a picture of your product first will receive a free sample. Get creative with it and reward your followers that are constantly retweeting, sharing, and liking your business. Create some monthly online event that promotes your product or service — Today is donut day send us a pic of your favorite donut! Highlight local events and associate your business with them “Come on out to (event) and visit us!” The list can go on. Pretty much anything you can think of to share with your fans or get them to like and repost is where you will see fantastic results!

ROI

Because social media is so easy to track you will be able to see your return on investment and will quickly understand that spending a couple hours on social media a day will really help generate business!

Social Media Options

Facebook: Facebook allows you to post pictures and long captions. Facebook pages don’t show up in news feeds often. The best ways to get people to share your posts are to ask for people to share your posts and to promote your posts. Promoting doesn’t cost a lot of money. Seriously, it’s not expensive at all and you’ll be seen.

Twitter: Twitter is fast-paced. This platform works well with restaurants and bars especially. The key to Twitter is to not take yourself and your business too seriously. Have fun and tweet back to the people who tweet at your business.

Instagram: Instagram is great for businesses that have goods that can be photographed. Clothing, furniture, food. If it can be photographed, it can be Instagrammed. Make sure your pics are in focus!

LinkedIn: LinkedIn works similarly to Facebook, but is more professionally oriented. Ditch the casual and familiar language for more professional language. LinkedIn is good for B2B businesses and for finding new hires.

Now go be a social human!

On Leadership – In a start-up environment

02-leadershipThe subject of “leadership” is an interesting one and many people have offered their opinions.

My overriding belief is that not everyone is a “born leader.” You can attend classes on leadership and maybe learn the principles, but that doesn’t mean that you can become an effective leader. Or, perhaps more on point, just because a person assumes the mantle of leadership (like the title of president of a start-up), it does not defacto make that individual a leader. Only by actions and not words can someone be considered a leader.

In my opinion, a leader has:

  • Such extraordinary confidence in his/her abilities, that subordinating his ego for the benefit of the company isn’t a thought;
  • The vision of the future and is able to communicate that vision in all of the others on the team and motivate them to accomplish great things;
  • The ability to make sure that important things get done, even if he doesn’t do them directly
  • Is driven to see the venture to succeed
  • Embraces the team mentality — “we” and “us” and never the “me” or “I” For now, I’ll contrast the traits seen as important to strong leadership with those seen as “fatal flaws” that doom a person as a leader.

In an article, “Decoding leadership: What really matters,” McKinsey & Company highlighted four key attributes that account “for 89% of the variance between strong and weak organizations.”

These are:

  • Being an effective problem solver — problem solving is the precursor of decision making. A leader gathers information, analyzes it and then makes a considered decision. Along the way, in my opinion, a leader, especially a self-confident leader, will draw upon the opinions of others and reach a composite decision.
  • Operating with a strong results orientation — setting objectives or having a vision on the horizon isn’t enough. A strong leader actually accomplishes milestones that move the organization toward the longer term goal.
  • Seeking different perspectives — it is important to enlist the opinions of others. Drawing conclusions based on a composite is not a sign of weakness. Rather is shows confidence and involves others in the decision process. This engenders a strong team orientation and has people “buy-into” the directions being taken.
  • Being supportive — leaders consider how others feel. Ignoring those around you diminishes your effectiveness as a leader.

In some ways, it might actually be easier to understand the true characteristics of leadership by highlighting those of a bad leader. A good reference for this is a Forbe’s article from 2012 titled “15 Ways to Identify Bad Leaders.”

  1. Leaders who can’t see it probably won’t find it: Leaders without vision will fail. Leaders who lack vision cannot inspire teams, motivate performance, or create sustainable value.
  2. When leaders fail to lead themselves: A leader who lacks character or integrity will not endure the test of time. It doesn’t matter how intelligent, affable, persuasive, or savvy a person is, if they are prone to rationalizing unethical behavior based upon current or future needs, they will eventually fall prey to their own undoing.
  3. Put-up or shut-up: Nothing smacks of poor leadership like a lack of performance. Nobody is perfect, but leaders who consistently fail are not leaders, no matter how much you wish they were.
  4. Beware the know-it-all: The best leaders are acutely aware of how much they don’t know.
  5. When there’s a failure to communicate: When leaders are constantly flummoxed by those who don’t seem to get it, there exists both a leadership and communications problem. Show me a leader with poor communication skills and I’ll show you someone who will be short-lived in their position.
  6. It’s all about them: If a leader doesn’t understand the concept of “service above self” they will not engender the trust, confidence, and loyalty of those they lead. Any leader is only as good as his or her team’s desire to be led by them. An over abundance of ego, pride, and arrogance are not positive leadership traits. Real leaders take the blame and give the credit – not the other way around. Long story short – if a leader receives a vote of no-confidence from their subordinates…game over.
  7. Sing a little Kumbaya: While love and leadership are certainly two words you don’t often hear in the same sentence, I can assure you that rarely does great leadership exist without love being present and practiced.
  8. One size fits all leadership style: The best leaders are fluid and flexible in their approach. They understand the power of, and necessity for contextual leadership. “My way or the highway” leadership styles don’t play well in today’s world, will result in a fractured culture, and ultimately a non-productive organization.
  9. Lack of focus: Leadership is less about balance and more about priority. The best leaders are ruthless in their pursuit of focus. Those leaders who lack the focus and attention to detail needed to apply leverage and resources in an aggressive and committed fashion will perish.
  10. Death by comfort zone: The best organizations beat their competition to the future, and the best leaders understand how to pull the future forward.
  11. Not paying attention to the consumer: Leaders not attuned to the needs of the market will fail. As the old saying goes, if you’re not taking care of your customers, someone else will be more than happy to. Successful leaders focus on the consumer experience, which in turn leads to satisfaction and loyalty.
  12. Get Invested: Leaders not fully committed to investing in those they lead will fail. The best leaders support their team, build into their team, mentor and coach their team, and they truly care for their team.
  13. The “A” word: Real leaders are accountable. They don’t blame others, don’t claim credit for the success of their team, but always accept responsibility for failures that occur on their watch.
  14. It’s the culture stupid: The lesson here is that culture matters – forget this and all other efforts with regard to talent initiatives will be dysfunctional, if not altogether lost.
  15. Show some chutzpa: Leadership absent courage is a farce. I’m not referring to arrogance or bravado, but real courage. It takes courage to break from the norm, challenge the status quo, seek new opportunities, cut your losses, make the tough decision, listen rather than speak, admit your faults, forgive the faults of others, not allow failure to dampen your spirit, stand for those not capable of standing for themselves, and to remain true to your core values.

That’s 15 characteristics of “faux leadership” which often translate to “toxic” leadership, especially in a start-up environment. I’ve recently disengaged from a situation in which the anointed leader was a habitual “me and I” person and who was incapable of making progress on even the simplest milestones. Truly, leadership means getting stuff done and motivating the team to do it.

The Challenge of I.T. Customer Service in Higher Education

With the rapid advance of consumer technology in recent years, customer demand for new technology solutions in the workplace has increased dramatically. For support organizations, this has created new challenges to provide technology related services while maintaining security and providing greater customer service. This problem is magnified for higher education Information Technology (IT) support groups who are struggling to keep up with customer technology demand in an environment where the academic culture is very permissive but resources dedicated to change are limited. Curtis Bonk, Ph.D., Professor of Instructional Systems Technology at Indiana University, states that educators have an ethical obligation to consider using technology to enable students’ learning. Higher education IT organizations have the same obligation to consider the use and support of technology for enabling both students’ learning and empowering instructors’ use of technology to achieve these outcomes. Providing good customer service while meeting this obligation represents the major challenge to higher education IT support organizations.

Success in Information Technology is typically associated with a monetary goal, either in revenue or savings achieved from the implementation of a technology project, with a new solution that is considered to be implemented on time and under budget, or with a project that has achieved the internal goals of what the IT organization desired. The customer’s input is often overlooked. IT frequently fails to ask:

“What are the benefits to the customer?”
“Did the implementation achieve what our users want?”
“If the new service is implemented, how does this change our relationship to our customers?”

Attention to these customer-centric questions, or the lack thereof, is what promotes either good or bad customer service from the IT organization. Achieving good IT customer service in higher education calls for a fundamental change in mindset toward improved communications and a focus on the people aspect of IT service—regardless of whether it’s the employee or a customer. Everyone should be considered a customer, but it takes time to build this mindset, and it definitely requires team members who have a “Servant’s Heart” approach.

Simultaneously, the organization must continue its focus on understanding new technologies and how they help anticipate and are tailored to customer needs, as well as how these technologies can contribute to the effective attainment of business goals. Being consistently responsive to customer needs via their questions, complaints, and requests determines your relationship with the customer. It is this responsive quality of your service offerings that will either enhance or degrade the relationship with your customer.

In order to achieve a greater customer relationship while providing IT customer service in higher education, our organization has focused on the needs and the care of our customers by:

Embracing a customer-centric approach to providing IT services. This is a shift from the old days of IT being perceived as dictating what services are provided. It places the focus on customer needs and how IT can partner with the business in fulfilling those needs.
Acknowledging the successes and failures of our organization’s efforts. By transparently acknowledging our organization’s strengths and weaknesses, the organization is better positioned to understand our capabilities in providing IT services.
Recognizing within our organization those areas where gaps exist in providing good service and working to improve those areas with measurable and sustained results.
Empowering our customers at every level. Our organization starts by empowering our IT team members through training, decision making, and team member effectiveness. From a higher education perspective, empowering our team members enables our University faculty and staff to instruct without technical issues and to provide a great learning experience for our students, which translates to improving the learning outcomes for our students—empowering them to achieve their educational goals and aspirations.

In summary, exercising greater responsiveness in your communications, acknowledging your organization’s strengths and weaknesses, and recognizing what actions are needed to improve overall service will result in the empowerment of your customers. It is this approach to your customer that will improve your relationship with the customer, resulting in a greater customer service outcome.

Mastering the compass: leveraging data to provide direction

The growing amount and accessibility of data can be a significant contributor guiding internal audit toward its True North—or, as sometimes happens, too much data can result in taking internal audit off course when it is not effectively used. Today there are 2.7 zettabytes of data in the digital universe, and by 2020, big data is predicted to be 50 times what it is today.1 As business operations become more proficient in their use of both structured and unstructured data, analytics are informing decisions across the business in ways never before considered.

For many years, internal audit has focused on using data in limited ways to conduct analytics for fieldwork purposes—commonly known as computer-assisted audit techniques. With advancements in technology, ease of use, and affordability of tools, now more than ever internal audit can focus on building a keen sense of direction to leverage data in a way that provides greater business insights, increases efficiency, enhances monitoring activities, and allows the company to respond better to risks. Leveraging data is not a destination of its own, but rather a mindset shift to integrate data into the audit life cycle—from risk assessment to planning, fieldwork, execution, monitoring, and reporting.

Our survey and interviews revealed that most, if not all, internal audit functions are thinking about how they can better leverage data to be not only more efficient but also far more effective. Most are experimenting with expanding its use, particularly in such areas as fraud management, compliance monitoring, and risk analytics (Figure 1). However, a critical difference between where internal audit functions are today and their True North lies in how data is being used. While 82% of chief audit executives (CAEs) report they leverage data analytics in some specific audits, just 48% use analytics for scoping decisions, and only 43% leverage data to inform their risk assessment. Thus, many still report they have a substantial journey ahead.

Internal audit functions that are evolving in pace with the business are more advanced in their use of data, including wider application across the audit life cycle. For example, risk identification has traditionally been done through a combination of executive meetings and the use of limited financial data. Internal audit functions that are headed toward True North are using data to identify where risks reside in the organization in order to determine where they should focus their efforts. They are also leveraging data not only to focus on where and what could be audited but also to decide whether auditing is needed at all. Ultimately, success with data is predicated on connecting data to insights about the business and the risks it is facing.

CAEs report that obtaining data skills is a top challenge. While 65% of CAEs report they have some data skills on their team, either in-house or through third parties, our interviews revealed a lack of the combined business acumen and data skills. Internal audit functions with sufficient size and scale are reporting the ability to invest in a combination of in-house and third-party resources, while many are turning completely to third parties to gain more immediate access to business-minded data skill sets.

Enhancements in tools have made it easier and more intuitive for business users to access data and gain comfort with how data can be leveraged. By providing a better view of risks, data visualization tools are enabling internal audit functions to absorb information in new and more constructive ways so they can identify and respond to emerging trends faster.

For those functions that are not far along the maturity curve of embedding data analytics into their audit life cycle, we have found that there is a need to work through various roadblocks, create quick wins, and gain momentum. In order to do this, many internal audit functions are still starting with pilot data programs.2 These pilots serve as proof of concepts for both stakeholders and those in the internal audit function. Pilots give practitioners the opportunity to work with data, get comfortable with it, and increase their creativity in thinking about how to use it. Sharing early wins with stakeholders will jump-start the momentum needed to drive more creative use of data.

10-internalAudits

1 “Infographic: The Explosion of Big Data,” sales-i, October 16, 2014, accessed January 26, 2015.

2 For more information on how to create best-in-class enterprise risk management, refer to PwC’s 2015 Risk in Review study.

The Value of Tech Education

Technology has transformed the way we do almost everything. And yet, all too often, we resign kids to a use-only mode. Teaching students to create, rather than consume—to understand how technology works, not just how to use it—serves to strengthen a host of lifelong skills like logic, problem solving, creativity, and critical thinking. You see that kid playing on his computer? He may be the next Steve Jobs. And that teenage girl building a robot? She may discover a new advancement in biomedical engineering. But those possibilities may become realities only if we are able to help them connect the dots from playing with technology to using it to create something new to real world jobs.

Fortunately, there are a host of programs throughout San Antonio to help them on their way—from maker camps and free coding events to certification programs and boot camps to degree programs. All are outlined in the recently released San Antonio Technology Education Report, which was researched and developed by the 80/20 Foundation. “It’s our education system,” reads the report, “that allows a company to continue hiring talented individuals. The cities that produce high-skilled technology talent at the necessary magnitude for companies rise above the rest in building a vibrant, prosperous community in our modern economy.”

In fact, according to “The Hidden STEM Economy” by the Brookings Institution, “STEM-oriented metropolitan economies perform strongly on a wide range of economic indicators, from innovation to employment. Job growth, employment rates, patenting, wages and exports are all higher in more STEM-based economies.” So what are you waiting for? If you know a student, point them to one of the many fabulous camps, events, or classes. Don’t know a youngster? Then support their education—volunteer or donate to those who are working to build programs to fuel a STEM-based economy right here in our own backyard.