Icon Insurance Quotes

We've searched our database for all the quotes and captions related to Icon Insurance. Here they are! All 4 of them:

Security is a big and serious deal, but it’s also largely a solved problem. That’s why the average person is quite willing to do their banking online and why nobody is afraid of entering their credit card number on Amazon. At 37signals, we’ve devised a simple security checklist all employees must follow: 1. All computers must use hard drive encryption, like the built-in FileVault feature in Apple’s OS X operating system. This ensures that a lost laptop is merely an inconvenience and an insurance claim, not a company-wide emergency and a scramble to change passwords and worry about what documents might be leaked. 2. Disable automatic login, require a password when waking from sleep, and set the computer to automatically lock after ten inactive minutes. 3. Turn on encryption for all sites you visit, especially critical services like Gmail. These days all sites use something called HTTPS or SSL. Look for the little lock icon in front of the Internet address. (We forced all 37signals products onto SSL a few years back to help with this.) 4. Make sure all smartphones and tablets use lock codes and can be wiped remotely. On the iPhone, you can do this through the “Find iPhone” application. This rule is easily forgotten as we tend to think of these tools as something for the home, but inevitably you’ll check your work email or log into Basecamp using your tablet. A smartphone or tablet needs to be treated with as much respect as your laptop. 5. Use a unique, generated, long-form password for each site you visit, kept by password-managing software, such as 1Password.§ We’re sorry to say, “secretmonkey” is not going to fool anyone. And even if you manage to remember UM6vDjwidQE9C28Z, it’s no good if it’s used on every site and one of them is hacked. (It happens all the time!) 6. Turn on two-factor authentication when using Gmail, so you can’t log in without having access to your cell phone for a login code (this means that someone who gets hold of your login and password also needs to get hold of your phone to login). And keep in mind: if your email security fails, all other online services will fail too, since an intruder can use the “password reset” from any other site to have a new password sent to the email account they now have access to. Creating security protocols and algorithms is the computer equivalent of rocket science, but taking advantage of them isn’t. Take the time to learn the basics and they’ll cease being scary voodoo that you can’t trust. These days, security for your devices is just simple good sense, like putting on your seat belt.
Jason Fried (Remote: Office Not Required)
Friedrich Hayek, who has become an iconic figure among today’s conservatives, was a strong proponent of the idea. In his three-volume work Law, Legislation and Liberty, published between 1973 and 1979, Hayek suggested that a guaranteed income would be a legitimate government policy designed to provide insurance against adversity, and that the need for this type of safety net is the direct result of the transition to a more open and mobile society where many individuals can no longer rely on traditional support systems: There is, however, yet another class of common risks with regard to which the need for government action has until recently not been generally admitted. . . .
Martin Ford (Rise of the Robots: Technology and the Threat of a Jobless Future)
Quick Gmail Trick Noah and I both use the Gmail “+” trick all the time. Let’s say your email address is bob@bobsmith.com. After signing up for services or newsletters, how can you tell who’s sharing your email, or contain the damage if someone discovers your login email? Companies get hacked all the time. Just use + as cheap insurance. If you append + and a word to the beginning, messages will still get delivered to your inbox. Signing up for Instacart, for instance? You could use bob+insta@bobsmith.com. I use this, or benefit from it, on a daily basis.
Timothy Ferriss (Tools of Titans: The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers)
Why Consider Fasting? Dom has discussed the idea of a therapeutic “purge fast” with his colleague Dr. Thomas Seyfried of Boston College. Per Dom: “If you don’t have cancer and you do a therapeutic fast 1 to 3 times per year, you could purge any precancerous cells that may be living in your body.” If you’re over the age of 40, cancer is one of the four types of diseases (see Dr. Peter Attia on page 59) that will kill you with 80% certainty, so this seems like smart insurance. There is also evidence to suggest—skipping the scientific detail—that fasts of 3 days or longer can effectively “reboot” your immune system via stem cell–based regeneration. Dom suggests a 5-day fast 2 to 3 times per year. Dom has done 7-day fasts before, while lecturing at the University of South Florida. On day 7, he went into class with his glucose between 35 and 45 mg/dL, and his ketones around 5 mmol. Then, before breaking the fast, he went to the gym and deadlifted 500 pounds for 10 reps, followed by 1 rep of 585 pounds. Dom was inspired to do his first 7-day fast by George Cahill, a researcher at Harvard Medical School, who’d conducted a fascinating study published in 1970* wherein he fasted people for 40 days.
Timothy Ferriss (Tools of Titans: The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers)