New Fox Drama Spotlights Austin,
A new Fox TV drama starring Rob Lowe is set in Austin. But, the big question is: Will we be spotting Rob Lowe out and about when he’s not shooting scenes? The short and sad answer is no. The series, 9-1-1 Lone Star, is scheduled for a two-night premiere in January.
Although the show takes place in the Capital City the show will be filmed in Los Angeles rather than Austin. It always stings to see a show set in Austin film elsewhere, especially with all Austin has to offer, including a talented crew base, facilities, vendors, and diverse locations,” Brian Gannon, director of the Austin Film Commission, tells CultureMap.
Over the years, a number of TV and film productions have been shot in and around Central Texas, including Dazed and Confused, Friday Night Lights, Miss Congeniality, Office Space, Spy Kids, Temple Grandin, The Texas Chainsaw Massacre, True Grit, Varsity Blues, and Walker, Texas Ranger. Every year, the creative sector — including TV and film productions — pumps billions of dollars into the area’s economy.
9-1-1 Lone Star, a spinoff of Fox’s top-rated drama, 9-1-1, follows a “sophisticated” New York cop, played by Lowe, who relocates to Austin with his son. Lowe’s character, the announcement says, “must try to balance saving those who are at their most vulnerable with solving the problems in his own life.”
4 Ways to Stay Cyber Safe When Traveling for Business or Pleasure
Whether traveling domestically or internationally, for business or for pleasure, your online identity is at risk.
Business and government executives are especially vulnerable because they bring connected devices loaded with sensitive information, providing a window into an organization’s top secrets. They also travel internationally, which exposes their data to further risk.
However, any tourist can be a target for hackers. They travel with fewer cyber defenses and can have their personal information stolen and inadvertently provide hackers with access to additional data, systems and networks.
Even with the security risks, travel is an inescapable part of life. Here are proactive steps you can take.
1.Exercise good cyber hygiene before departure – One of the first actions to take is to keep your device operating systems up to date. Outdated systems might miss important security patches that could protect hardware and personal information. Make sure to change passwords before and after traveling as well as selecting complex words or phrases that are hard to guess. A strong password should be over 12 characters, with upper and lower case letters, include numbers and symbols and not be the same as any other passwords you use. Setting up two-factor authentication is another step that adds an extra layer of protection from hackers.
2.Think twice before posting on social media- There’s more than one way to overshare on social media. You can accidentally reveal your exact location using GPS-enabled devices like smartphones or tablets that have apps using “Location Services.”
Once you post something about your business trip or vacation on social media you’re handing over information to a third party. As soon as you do that, you have little control, if any, over how they use that information. Travelers should wait until a!er their trip to post photos, videos or other information that malicious actors might find valuable.
3.Reduce access points to devices- Anyone who has to use public Wi-Fi systems, whether it be waiting for a flight or for a meeting in a hotel lobby, should invest in a Virtual Private Network. A VPN secures your data on the network so malicious actors can’t see your activities.
In that same vein, disable automatic connection to Wi-Fi networks on your devices to prevent joining public Wi-Fi networks without notification. You should only use public, no password required Wi-Fi as a last resort.
It is also worth noting that international cellular data plans do not offer any additional protections. When traveling abroad, treat cellular networks as untrusted and conduct business on them accordingly. Travelers should also turn on their Bluetooth when not in use, as hackers can connect to a device and quickly download user data through this connection, access personal information and send messages or join infected networks.
4.Take only what you need- The fewer devices you have with you during your travels, the lower the risk of someone physically or logically accessing your data. If on personal travel, leave your work devices at home. If you can manage your work travel without your laptop, try to do so.In the world of cybersecurity, sensitive information is more valuable than money. Travelers need to treat data and connectivity with extreme caution.
August 21 is Senior Citizens Day #SeniorCitizensDay