Author: Paul Wallbank

  • What businesses should learn from Wikileaks

    What businesses should learn from Wikileaks

    The Wikileaks Cablegate affair has been entertaining us now for two weeks as we see diplomats and politicians around the world squirming with embarrassment as we learn what US diplomats really think about the foreign powers they deal with.

    Both the leak of the cables and the treatment of Wikileaks and its founder, Julian Assange, by various Internet companies raises some important questions about the Internet, cloud computing and office security in the digital era.

    Security

    It’s believed the source of the leaked cables is Private First Class Bradley Manning, who is alleged to be responsible for leaking the Iraq tapes released by Wikileaks earlier this year.

    The lesson is don’t give junior staff unrestricted access to your data, access to important information such as bank account details, staff salaries and other matters best kept confidential needs to be protected.

    You can stop data leaving the building by locking USB ports, CDs and DVDs through either software or hardware settings on your computers and you should ask your IT support about this, keep in mind that locking down systems may affect some of your staff’s productivity.

    Locking the physical means though doesn’t stop the possibility of data being sent across the Internet and access logs may only tell you this has happened after the fact. So it’s important to review your organisation’s acceptable use policy. Check with your lawyers and HR specialists that your staff are aware of the consequences of accessing company data without permission.

    Incidentally, the idea that Pfc Manning was just one US Army staffer of thousands who were able to access these cables raises the suspicion that the information Wikileaks is now releasing was long ago delivered to the desks of interested parties in London, Moscow, Tel Aviv, Beijing and cave hideouts in remote mountain ranges.

    Don’t rely on one platform

    Wikileaks found itself hounded from various web hosting and payment providers. As we’ve discussed previously, relying on other people’s services to deliver your product raises a number of risks. Make sure you have alternatives should one of your service providers fail and never allow an external supplier to become your single point of failure.

    Concerns about the cloud

    This column has been an unabashed fan of cloud computing, but the Wikileaks saga shows the cloud is not necessarily secure or trustworthy. Not only is there the risk of a PFC Manning working at the data center compromising your passwords or data, but the arbitrary shutdown of Wikileaks’ services is a stark lesson of relying on another company’s Terms of Service.

    Within most terms of service are clauses that allow the provider to shut down your service if you are accused of breaking the law or straying outside of the providers’ definition of acceptable use. As we saw with Amazon’s treatment of Wikileaks, you can be cut off at any time and without notice.

    Amazon’s shutting down of Wikileaks is a pivotal point in the development of cloud services. Trust is essential to moving your operations to the cloud, and Amazon’s actions shown much of that trust may be misplaced.

    Should you be considering moving to the cloud, you’ll need to ensure your data and services are being backed up locally and not held hostage to the arbitrary actions of your business partner.

    Don’t put your misgivings in writing

    So your business partner is a control freak? Great but don’t put it in writing.

    Be careful of gossip and big noting

    One interesting aspect of Wikileaks to date is how senior politicians like gossip and showing how worldly they are to US diplomats.

    That’s great, but it probably isn’t a good idea to tell your best friend they should consider beating up your most important customer. As mentioned earlier, this little gem was probably on polished desks of the Chinese Politburo long before the cables found their way to Wikileaks.

    Resist the temptation to gossip, remember your grandmother’s line about not saying anything if you can’t say something nice.

    Ultimately what Wikileaks shows us is all digital communications are capable of being copied and endlessly distributed. In a digital economy, the assumption has to be that everything you do is likely to become public and you should carry out your business conduct as if you will be exposed on Wikileaks or the six o’clock news.

    Wikileaks is a lesson on transparency, we are entering an era of accountability and the easiest way to deal with this is to be more honest and open. That’s the big lesson for us in our business and home lives.

    Similar posts:

  • ABC Nightlife, 15 December 2010

    Join Rod Quinn and Paul Wallbank for a look at what the Wikileaks Cablegate affair means to Internet users, including some serious questions for businesses moving onto the cloud.

    The recording from the show in now online through the Nightlife website. It will be available until at least 22 December.

    Aspects we discuss include;

  • How secure is our business information in a digital world?
  • Can we trust Internet providers to do the right thing
  • How reliable is cloud computing when Amazon can shut Wikileaks down?
  • Why writing unflattering things about your friends and business colleagues is rarely a good idea
  • Dealing with unethical telcos and Internet providers
  • Listeners’ questions
    As usual we had plenty of listeners calls, these included the following who we said we’d get back to;

  • iTunes not recognising an iPod
  • Removing Installshield
  • The Paypal “horse float” scam
  • Your views are welcome and if you’d like to join the conversation in future shows with your questions or comments phone 1300 800 222 within Australia or +61 2 8333 1000 from outside Australia.

    You can SMS Nightlife’s talkback on 19922702 or twitter @paulwallbank using the #abcnightlife hashtag

    Contact us for anything you would like to hear about in upcoming shows, we’re always happy to hear new ideas.

    Similar posts:

    • No Related Posts
  • What the Internet doesn’t know about us

    What the Internet doesn’t know about us

    In October 2010 Newsweek’s Jessica Bennett asked the the team behind the Internet service Reputation Defender to find all they could about her.

    The results were startling, within half an hour they had found her US social security number and a few more hours digging revealed her address, hometown as well as many other private details.

    But ultimately the picture of Jessica’s life was wrong. The team made mistakes about her personal habits, sexual orientation and the time she spends online.

    The fact the profile was incorrect shows how difficult it is for computers, or people, to understand an individual based on a series of data points.

    Most of us understand that making a generalisation based on single data point – say race, gender, appearance or sexual orientation – is usually incorrect, but when we add more data points things become even more difficult.

    Once we get more than one data point, we have to start weighting them. Would Jessica eating at McDonalds twice a week outweigh her exercising every morning in the eyes of an insurance company assessing her risk?

    That problem could be called the Google effect where a formula, known as an algorithm, becomes so complex that it becomes bogged down under the weight of its own assumptions as we saw with Tony Russo’s gaming of the search engine’s ranking system.

    All of us as are steadily revealing more about ourselves onto the web, whether we know it or not. Every time we like something on Facebook, subscribe to a newsletter or make a comment on a blog post, we are giving a little something about us away on the publicly accessible Internet.

    Over time, anyone can build a picture of us. However it may turn out that nobody will want to know about the detailed, complex and multi dimensional portrait each of our lives would be.

    As information about all of us becomes more available, we may enter a modern version of the Mutually Assured Destruction doctrine of the Cold War as each of us find that everyone around us has enough information to bring our careers, relationships and status crashing down.

    But equally we hold equally damaging data about all our peers as well and to bring anybody down based on this information we have would be to invite the wrath of many others who know about our intimate details.

    We may even find that because all of us, being human, have some damaging traits and history that employers, insurers and governments only care when you start hiding them. Today we see this with security vetting procedures which are more concerned about what we hide rather than the specifics of our foibles and indiscretions.

    The assumption of those security agencies is that a self admitted gambler, alcoholic or philanderer is a manageable risk while those hiding such secrets from their families and employers are the genuine threat to an organisation.

    So we come back to a society where a tacit agreement exists between us all that this dangerous power is only used when someone has acted illegally or hypocritically.

    Perhaps that is the future we are heading for, where the Internet knows all but we simply choose not to access it. Which assumes it’s all correct anyway.

    Similar posts:

    • No Related Posts
  • 702 Sydney Weekend computers: December 2010

    The Christmas holidays are approaching and we take time out to look at what you can do to protect your home and business computers while you are on holiday.

    Listeners’ questions we covered included;

    Removing Trojan Horses from a computer
    Computer virus infections often arrive in the form of Trojan Horses – programs that pretend to be something else such as an image viewer – removing them can be difficult.

    The IT Queries website has the step-by-step instructions for removing a virus infection using the Malwarebytes program.

    Ejecting a stuck DVD or CD
    Steve asked about getting a stuck disk out of his computer. Luckily on most optical drives, at least those with trays, there is a pin hole where you can push in a straightened out paper clip to manually open the drive.

    Tune into ABC 702 Sydney to hear Paul Wallbank and Simon Marnie discuss the tech issues that affect you or listen online through the ABC Sydney webpage.

    We love to hear from listeners so feel free call in with your questions or comments on 1300 222 702 or text on 19922702. If you’re on Twitter you can tweet Paul at @paulwallbank and 702 Sydney on @702sydney.

    Similar posts:

    • No Related Posts
  • Holiday computer checklist

    With the Christmas holidays almost here, a lot of business and home computers will spend a good part of the next month turned off. Even though they are shut down, bad things can still happen. There’s a number of things you should do before heading off for a break.

    Before you go

    Backup
    Before shutting down for the holidays backup all your important data. Your backup should include favourites, mail, address books and documents. Some programs, such as accounting systems, have their own backup routines.

    Store the backups away from the computer, preferably offsite. We recommend making two copies, leave one onsite for easy access and store one elsewhere. If something terrible happens to your home or office while you are away, your data is at least safe.

    For working and essential documents, setting up a free Dropbox service and copying them to it is a great idea. Dropbox is also good for saving documents you foolishly intend to work on while you’re away as well as essential documents.

    Turn everything off
    Printers, modems, routers, should all be turned off and disconnected from power and communications lines. Most modern computer equipment still has power running through it even though it is turned off. Power surges from storms are common, so don’t take chances.

    If your computer is connected to a network, telephone line or cable connection then these should all be disconnected as well. Power surges are common on communications cables. Everything that connects your computer to the outside world should be turned off and unplugged.

    Hide your equipment
    Give thieves as little temptation as possible. Don’t leave computers in full view. Lock away anything portable and draw the curtains or blinds in the room where your computer is kept.

    What to pack

    As technology becomes an essential part of our lives, we tend to take it with us. This is particularly true with devices like iPads and DVD equipped laptops which are as much entertainment devices as they are for work.

    To get the most from them, there’s a few things to consider when packing.

    Update your systems
    Run the update routines for your operating system, essential software and security programs before you leave so there will be no major updates clogging up your downloads while you try to work or play.

    Power
    The most irritating thing when on the road with a computer is running out of power. Do you have all your chargers packed away? If you have space it’s also a good idea to carry a powerboard so you can share scarce power outlets with other users.

    Connectors
    Don’t forget your USB cables to connect phones and cameras so you can download photos, update music and, for some devices, recharge them.

    Packing
    If you are flying anywhere, it’s best to take electronics with you as carry on baggage. Carry them in a bag where they are easily accessible so you can take them out without fuss at security checkpoints.

    When you return

    Your computer is the very last thing you should turn on. Make sure modems, printers, external drives and networks are all running before turning your computer on. If you have a cable Internet connection, give it a few minutes to connect before trying to log on.

    Update your system.
    Before checking emails or surfing the net, update your anti-virus and check for any system updates. Run Windows Update and your anti-virus program’s update program. New nasties will have come out while you are away and there’s a good chance some of them may be waiting in your inbox.

    Christmas and New Year are a time to relax, by taking a few easy steps with your technology you can ensure your phones and computers are part of an enjoyable break.

    Have a merry Christmas and a great New Year.

    Similar posts:

    • No Related Posts