Author: Paul Wallbank

  • How safe is your net connection?

    How safe is your net connection?

    Reports last week that foreign “hackers” had intercepted emails between Australian government officials and miners raised the issue of email security, just how private are our online messages?

    When the media uses the word “hacking” it’s always worth taking a step back and finding out the facts. Often a security breach is the result of a simple setup mistake or the information and passwords have walked out the building with a disaffected, lovestruck or just plain dumb employee.

    That’s not to say hackers aren’t a risk organisations should to be conscious of, it’s just that often the security risks are more mundane than we would expect. A good example is the simple matter of logging onto a wireless or hotel network.

    We assume when we log into our networks that the data is secure though often the user names and passwords are exchanged in “clear text”, which anyone with access to the network can view your passwords with the use of a “packet sniffer” that reads each bundle of information sent across the internet.

    Poor security isn’t just a feature of unprepared computer users, every year the world’s leading hackers and security experts gather at that Las Vegas DEFCON conference which since 2001 has featured the Wall of Sheep, an embarrassing display of user information captured off the convention’s network.

    This is a surprisingly common security problem made more frequent with the rise of unencrypted wireless networks which can be sniffed by anyone who can be bothered logging on, this is a common problem when you’re connecting onto free wireless networks at the local coffee shop or fast food restaurant.

    The answer to all of this is to use Secure Socket Layer encryption, which creates a secure link between your computer, mobile phone or iPad and the servers. For email use, your system administrator can set this up or if you use the popular web mail services it’s a matter of ticking the box.

    A similar service works when you’re browsing the web, on visiting a secure site the address should start with https instead of the usual http, the “s” on the former stands for “secure”. A padlock symbol will also appear – in the bottom left hand corner of Firefox or beside the site address at the top of both Chrome and later versions of Internet Explorer.

    Before logging onto any secure service, including social media platforms, both the https address and the padlock symbol should appear before you enter passwords or sensitive information like credit card or banking details.

    Sadly, the secure websites are not always foolproof as sometimes the site will use a secure connection for your password details then once you’ve logged in, return to an unsecured version. This is how the Filesheep program that was released last year works by sniffing cookies and other stored information from unsecured websites.

    It’s surprising how many tourists and backpackers get caught out while doing online banking, checking their email or using social media while on the road.

    Without logging into a network securely, then logging out when finished and making sure their details haven’t been saved, it’s quite common to see travellers getting their details stolen.

    Assuming you’re safe because the network belongs to a high priced hotel or resort doesn’t always work either; a few years ago passengers on a major cruise liner had their bank accounts compromised when one of the crew was stealing data passing through the ship’s Internet cafe.

    You don’t need to be a mining executive in China or Julian Assange to fall prey to the Internet snoops, whole industries and criminal organisations are built around using your data so it’s a good idea to be making sure your information is secure while taking a little bit of caution and using some judgement before logging onto a network.

    Similar posts:

    • No Related Posts
  • Happy birthday, iPad

    Happy birthday, iPad

    Last week the iPad’s first birthday quietly passed, lost among the hoopla of the release of the tablet computing leader’s second version. It’s a difficult to think of another product that’s changed an industry so radically and so quickly.

    All of Apple’s successes in the last decade have been in areas with many already established players; the iMac entered a crowded PC market, the iPod was just another MP3 player and the iPhone plunged into a sector sated with hundreds of mobile devices.

    With each product Apple redefined their segment of the market place and established a secure, and profitable, niche.

    The iPad was somewhat different to the other products; with it Apple redefined the entire market and now leads the tablet computing sector. Yesterday industry analysts Gartner put out figures claiming Apple has over two-thirds of today’s market and will still hold half in 2015 despite the rise of the cheaper Google Android devices.

    Notable in Gartner’s predictions is the absence of Microsoft Windows based systems and that’s the clue for the iPad’s success as industries like healthcare, retail and logistics had been begging for affordable and usable tablet computers for a decade which the clunky Windows based systems had consistently failed to deliver.

    Another factor in Apple’s favour has been the rise of cloud computing, which has freed devices from relying on heavy and power hungry internal hard drives and made them more flexible. One of the most popular business iPad applications has been Evernote, a note taking program which has proved indispensable for business executives.

    Most of those executives work for corporations where the IT departments had blocked the introduction of cloud services and Apple products on compatibility and security grounds.

    Senior management’s adoption of Apple products and cloud services has broken down that enterprise barrier, which is one of the reasons why competing companies that made their fortunes selling desktop and server products are now desperately trying to find other selling points.

    In many ways, the adoption of Apple and the cloud is similar to how personal computers entered business. In the 1980’s computing departments resisted the introduction of PCs for almost the same reasons as IT managers today object to social media, cloud computing and Mac desktops in the office.

    The difference is the PC revolution was initially driven by the office accountants, sales teams and secretaries who found desktop applications like Lotus 1-2-3 and WordPerfect made their jobs more effective. This time, being different, it’s their managers driving the change.

    For smaller businesses and entrepreneurs Apple’s successes open a whole range of opportunities in the applications and services markets to support these devices.

    Those applications also help upstarts disrupt existing industries; the lower cost of entry is reducing barriers and speeding up lead times making slower incumbents more vulnerable to change.

    Disruption is probably the greatest lesson that Apple and Steve Jobs have taught us with the iPad, you can enter an already crowded market with a product different from the existing players and own a substantial part of it.

    All businesses, regardless of the sectors we work in, can learn from the iPad whether it’s how we can use tablets and the cloud in our operations or how we can apply Apple’s disruptive business model to secure a profitable industry niche. It’s a good time to be being open to new ideas.

    Similar posts:

    • No Related Posts
  • Email turmoil

    Email turmoil

    The massive email breach at Epsilon, the World’s biggest email marketing services company, has rightly caused headlines as it appears customer addresses from many of the world’s largest brands has been leaked to spammers and crooks.

    Epsilon looks after the email services of major brands, including Tivo, Marks & Spencer, McKinsey and Dell Australia so the breach has exposed many people’s email addresses.

    What does this mean?

    The breach has not exposed passwords or credit card details, so there’s no direct threat from the breach.

    However, having your name, email address and a company you’ve dealt with means a phishing attack, where a crook poses as a business you’ve dealt with and tries to get your passwords, will be more effective.

    Normally these messages are a give away as they aren’t addressed personally to you and are often from organisations, usually foreign banks, you’ve never dealt with.

    However a scammer who knows the organisation along with your name and email address can now launch a pretty convincing fake email campaign directing you to a site pretending to be say a competition or a security warning that asks you for your password.

    Given many people use the same passwords for all the secure sites they visit, there’s a reasonable chance the bad guys will get a large number of live accounts and be able to access victims’ bank accounts, email services and social media sites.

    What should you do?

    The first thing is to be careful, don’t respond to any suspicious emails and if you are uncertain call the organisation’s support line from a number although do not use any numbers or other contact details shown on the suspicious email.

    If you are concerned you have fallen for a trick, then change all your passwords immediately, we’d also suggest following the instructions on the IT Queries website and having a layered approach to security where sites which don’t matter have simple passwords.

    We can also expect a wave of fake email and social media messages as peoples’ personal pages and accounts are hijacked and the scammers try posing as other people.

    Similar posts:

    • No Related Posts
  • The Networked Business

    The Networked Business

    The first of the City Of Sydney’s Let’s Talk Business workshops looked at how business can use cloud computing services to help improve the marketing, operations and profitability.

    My presentation, Business In The Cloud covered the definition of cloud computing, the benefits for business, the risks and the case for getting on the cloud.

    The text of the presentation, shown here has been broken into four segments each addressing the individual points.

    What is the cloud?

    The opening section looked at what cloud computing is, the underlying definitions and how it works. We discussed how the underlying concepts of cloud computing are nothing new and how the concepts of shared resources across a reliable and robust network are part of the very reason for the Internet itself.

    The benefits of cloud computing

    Having defined cloud computing we look at the benefits of these services, focusing on the flexibility online software delivers and how businesses can use these tools to quickly seize opportunities in our fast changing society.

    Risky business

    Every new technology has its risks and cloud computing is no different. In our third presentation we look at some of the online traps and how to manage them.

    The business case for cloud computing

    Concluding the presentation is a summary of the business case, balancing the benefits and the risks and concluding with how businesses might use cloud services.

    Further information

    Illustrating how businesses can use online tools, we have a list of some of popular business cloud services that can help your organisation use the web to be more flexible and innovative.

    The presentation was part of the Let’s Talk Business series of workshops run by the City of Sydney and held at the Customs House. There’s three more events in the 2011 series covering the new consumer, mobile internet and business leadership.

    If you’ve been along to the Lets Talk Business events, or have some ideas on how business can use cloud services, we’d love to hear your comments.

    Similar posts:

    • No Related Posts
  • The networked business Part 4: The business case for cloud computing

    The networked business Part 4: The business case for cloud computing

    This is the fourth and final part of the presentation given as part of the City of Sydney’s Let’s Talk Business series of events on new business technologies.

    The case for business cloud computing

    Cloud computing is part of the future of of business. Increasingly it’s going to become of fundamental part of our society as we become more connected.

    Business is open 24 hours. Even if your office or staff aren’t working at 4am on a Sunday, customers are checking your website to look at your products. If you are selling online, everything has to be running.

    The cloud is not a tool for every business. For some, the risks or limitations mean they are better served running application or storing data on their own computer.

    For most businesses though the cloud changes the game, it makes them more flexible and productive.

    In an era where we’re seeing massive change in our economy and society, it’s the business who can respond quickly to the new normal who will survive and prosper.

    Cloud computing helps businesses adapt and are part of the key to running a successful enterprise in the 21st Century.

    This is the third of a series of four posts taken from The Networked Business presentation. Parts One, Two and Three are also online. A list of the useful business cloud computing tools to accompany this article.

    Similar posts:

    • No Related Posts