The importance of logging off

It’s the simple things that bring us unstuck in the online world.

English Labour MP Tom Watson today learned why logging off your computer is important when his office intern cracked what she thought a joke on his behalf.

What appeared to be a mis-step by the Member of Parliament bought predictable criticism from his enemies in politics and media, particularly given his role as a critic of News International.

The biggest risk in computer security are your staff and co-workers; they have access to your systems and the data saved on them.

In Tom’s case – like most business security breaches – the intern wasn’t being malicious, she was making a very valid point about a serious topic, it was her unfortunate choice of words that caused a problem.

Luckily for her, the boss has taken a mature attitude towards the problem – there’s many bosses who wouldn’t. So the intern seems safe unless the media can beat the story up further.

The moral for all of us is to log off or shut down our computers whenever we step away from them.

If we’re using public terminals in flight lounges, Internet cafes or hotels, then we should make sure we’ve logged out of our email, social media or banking services before the session ends.

Should someone leap on your system when you turn your back, you could find anything from your social media or email account used to send out fake messages about you being robbed through to your online bank balance being pillaged.

We often worry about evil, sophisticated hackers breaking into our accounts but often it’s these simple mistakes that let opportunistic thieves get our details.

Often it’s the simple things that bring us unstuck, so logging off is a good habit to get into. Tom’s intern is right.

Similar posts:

Megaupload, cloud computing and trust

Has Megaupload damage cloud computing’s reputation.

The closing down of file sharing site Megaupload has raised the question of trust in the cloud; “It has made cloud services look that much less legitimate” one daily paper quotes futurist Mark Pesce as saying.

For those of us advocating cloud services and advising businesses on using them, this trust issue isn’t anything new. All of us have to be careful about who we trust with our data and Kim Dotcom, the founder of Megaupload, doesn’t come to mind as someone who would stand a great deal of due diligence.

Like investments – another area where trust is essential – we have to spread our risk around. Saving copies of data to your own computer and making sure the information you save on the cloud is in a form easily read by different systems is important, as is not trusting any one service for critical services.

The taking down of Megaupload also raises other questions – as privacy advocate Lauren Weinstein points out;

“But the Megaupload case is more akin to the government seizing every safe deposit box in a bank because the bank owners (and possibly some percentage of the safe deposit box users) were simply accused — not yet convicted — of engaging in a crime.

What of the little old lady with her life savings in her box, or the person who needs to access important documents, all legitimate, all honest, no crimes of any sort involved.

They are — to use the vernacular — screwed.”

It’s this over-reaction by government agencies which is the real concern and the co-operation of large corporations in shutting down services – as we saw with the shutting down of Wikileaks – probably does more to damage trust in all online services, not just cloud computing.

Cloud services are no less trustworthy than our computer systems, all of which can breakdown, catch viruses or be compromised by staff making mistakes. We have to understand that all technologies carry some degree of risk.

For businesses and home users, we need to spread the risks around – don’t just trust one service or technology to deliver your products or services and have a fall back plan if things go wrong.

Similar posts:

Password blues

Sharing passwords is like giving away the keys to your car, be careful.

“Johnny down the street hacked my Minecraft account!” is something almost every parent today has heard in one way or another.

If you believed the kids, the schools are full of 12 year old hacking geniuses that can unravel passwords faster than a CIA super computer.

Usually it turns out the “evil hacker” in Grade 5 had the password all along as the kids share their login details with all their friends.

The New York Times recently pulled together story showing how teenagers are sharing passwords to show their affection. One wonders how many abusive relationships see the dominant partner control the other’s social media and online accounts.

It isn’t just kids and teenagers who find themselves in trouble though, businesses make the same mistakes. Commonly sharing a password to important files and tech functions across the organisation.

Thinking this is just a small business problem would be a mistake; Australia’s Vodafone made all their entire customer base available on the Internet thanks to single logins and shared passwords for each of their dealers.

Over the years this caused major problems for customers and the honest Vodafone dealers as their unscrupulous competitors hijacked accounts and churned clients to new plans. The cost to Vodafone Australia must have been huge but impossible to quantify given they apparently had no tracking mechanism to figure out who had accessed accounts.

In households and business, the main reason we share passwords is convenience – security by nature is always inconvenient. It’s convenient not to bother locking your front door or leaving your keys in the car.

When you really value something, you lock it up and you don’t give a key to everyone in your neighbourhood. It should be the same with passwords, keep them strong and keep them secret.

Our kids learn this the hard way, we shouldn’t have to.

Similar posts:

Strategic lessons from a security breach

What businesses can learn from Stratfor’s data lapse

2011 has been the year of the IT security breach. Big and small organisations around the world ranging from major corporations like Sony through to smaller businesses such as security analysts Stratfor found their customer data released onto the web.

The frustrating this is most of these breaches are avoidable and “hacking” is often giving too much credit for the security used by the targeted companies.

While the ‘hackers’ themselves may be skilled, the compromised organisations are often easy targets as they don’t follow the basic rules of protecting their data.

Standards matter

Customer payment account details are covered by the Payment Cards Industry -Data Security Standard (PCI-DSS) operated by the PCI Security Standards Council.

The PCI Security Standards Council helpfully has a range of information sheets for merchants of all sizes and if you are taking payments off the web you should make yourself aware of the basic requirements.

For most businesses, the cardinal rule is not to save customer’s card details. Once the payment is approved, you have no business retaining the client’s credit card or bank account numbers.

In Stratfor’s case, they were almost certainly processing payments manually and credit card details were being saved on customers’ records in case of errors or to make renewals easier.

Call in the professionals

There’s no shortage of payment companies, ranging from PayPal through specialist services like eWay to your own bank’s services. Choose the one that works best for you. If you have no idea, call in someone who does.

One of the arguments for using outsourced services, particularly cloud computing, is how data security is a complex field that requires professional and qualified expertise. The internal systems of Sony, Telstra and Stratfor were not up to the demands placed upon. A professional service is better equipped to deal with these issues.

Size doesn’t matter

A major lesson from the last year’s security breaches is that it’s not just the local shop or garage e-commerce business that is careless with data. Some of the world’s biggest companies and government agencies have been compromised.

If anything, Sony’s experience has shown the double standards at work in the application of security rules; there’s no doubt that had a local computer shop been as thoroughly compromised as Sony were, they would have been shut down on the second breach and the management would have been carted off to jail well before the twelfth.

For the management of Sony, there seems to have been little in the way of sanctions of the people nominally responsible for this incompetence. This has to change both within organisations and by those charged with enforcing the rules.

The lesson for customers is you can’t trust anyone with your data; don’t assume the big corporation is any more secure than the serving staff at your local sandwich shop.

Passwords matter

Every time one of these breaches happen we hear about password security, with “experts” pointing out that some of the subscribers were using passwords like ‘statfor’ or ‘password’.

For customers, this actually makes sense if you can’t trust third parties with your details so specific, disposable passwords for each site should be used. There’s little point in having a complex password if some script kiddie is going to post your login details onto 4Chan.

Naturally your passwords for banking and other critical websites should be very different and far more secure than those you use for sites like Stratfor and the Sony Playstation Network.

Will 2012 be any different?

Given the data embarrassments of 2012 for businesses and government agencies, can we expect lessons to be learned in 2012?

While many businesses are going to learn specific lessons from these breaches, there’s a management cultural problem where any spending on information systems is seen as a cost that has to be minimised.

This cost cutting mentality lies at the core at many organisations’ failure to secure their systems properly and until a more responsible culture develops we’ll continue to see these lapses.

Good managers and business owners who understand the importance of guarding their organisation’s and customer’s data are those who are ahead of their competition. Over time, these folk who will have the competitive advantage.

For customers, the sad lesson is we can’t trust anyone and a layered approach to security along with keeping a close eye on our bank accounts and credit card statements is necessary.

Similar posts:

Protecting your technology over the holidays

There’s some easy things we can do to protect our systems over the Christmas break.

This post first appeared in the Xero Accounting Software Blog, the advice for protecting your computers and networking equipment applies for home and business users.

The holiday season is here and for many it’s time for a much needed break. Before doing so it’s worthwhile taking a few precautions with your computers and other electronic equipment.

While most of us are moving our data to the cloud, there may still be some data that remains on your office systems. Bear in mind that if your router is damaged or desktop computer has gone missing, you won’t be able to access the web.

And even though your systems will spend much of the next fortnight turned off there are still risks such as power surges, fire and theft etc. There’s even the risk of a virus creeping in when you turn things on when you return. So here’s some things to consider before you leave.

Reset passwords

The New Year is a good time to refresh passwords, so review what your key login details are and update them to stronger, more secure phrases. I personally like using phrases like a song or poem and dropping characters into the spaces so a password might look like: Mary$had$a$little$lamb

You can make the passwords stronger by adding numbers and capitals as well.

Staff turnover happens in all businesses and you may have forgotten to remove some former employees from your accounts when they left. The end of the year is a good time to review who has access to your cloud and remote access accounts.

If you’re a social media user it’s also worthwhile checking what applications you’ve allowed to access your Facebook, Twitter or other online services. That mafia or farm game looks harmless, but often you’ve given it the right to post things and collect data from your account, so take off the ones you no longer find useful.

Unplug everything

Even when turned off, most modern computer equipment still has power running through its systems. This puts technology at risk during storms or brownouts. Printers, modems, routers, should all be turned off and disconnected from power and communications lines.

Network, telephone line or cable connections should be unplugged – power surges can often affect phone and cable network connections. In fact you should unplug anything that connects your equipment to the outside world.

Hide your equipment

Give thieves as little temptation as possible. Electronic equipment has a high resale value and is easily moved. Lock away anything portable and draw the curtains or blinds in rooms where less portable equipment is kept.

If you have an old laptop or mobile phone sitting around it’s not a bad idea to hide away the modern equipment and leave the old stuff in an obvious location. This is a variation on the old “leave ten dollars in the cash draw” ploy that gives thieves something without them ransacking the place. Don’t leave the sacrificial laptop in plain sight or you’ll be inviting break-ins.

Backup

One of the advantages with cloud computing is that many of your backup needs are taken care of. Unfortunately you still need your own local backups.

In most offices not everything gets saved to the cloud and that information matters. For many small business years of work is sitting on the hard drive.

External hard drives and DVDs are the most popular ways of saving backups. Your backup should include documents, email, address books, favorites and bookmarks.

Store the backups away from the computer, preferably offsite. I recommend making two copies, leave one onsite for easy access and store one elsewhere. If something terrible happens to your home or office while you are away, your data is at least safe.

For home offices, it’s a good idea to leave a copy of the backup with your neighbours or a relative in a nearby suburb. An old client of mine swaps external hard drives with his mother- in-law at church each week so he has a reasonably up to date copy of his data somewhere he knows he can get to.

When you return

Your computer is the very last thing you should turn on. Turn on modems, printers, external drives and network equipment before your computer. If you have a cable or ADSL Internet connection, give it a few minutes to connect before trying to log on.

Update your system

While you were away new Internet nasties in the form of viruses, Trojan horses and spyware will have come out and there’s a good chance some of them may be waiting in your inbox.

Before checking emails or surfing the net, update your security software and check for any system updates. Don’t do anything on the net until everything is updated.

Christmas and New Year are times when you should relax. There’s nothing worse than returning to find office equipment and valuable data lost. By backing up your systems and taking some precautions you don’t need to feel anxious about your business being up and running quickly when you get back to work.

Enjoy your holidays and let’s all look forward to a great New Year.

Similar posts:

Distrusting the cloud

Why are customers distrusting cloud computing services?

The recent KPMG Convergence Report looking at online trends in the mobile web found that nine out of ten Australian consumers are concerned about the security of their online data.

In light of recent corporate security breaches such as Sony’s and Telstra’s this is understandable which creates a real barrier for the adoption of cloud computing services.

For cloud computing to be taken seriously, customers have to be certain their data and applications will be respected and protected.

The corporate sector’s failure to hold senior management responsible these problems shows how big businesses largely aren’t taking user privacy or security seriously.

This is a great opportunity for new businesses, we’ve already seen Amazon become the biggest host for cloud services over storage and Internet incumbents who five years ago would have dismissed Jeff Bezo’s company as a glorified book stand.

For newer companies offering cloud services it’s a chance to build a culture where customer service, privacy and respect comes before management bonuses and perks. Where delivering what you promise is more than waving a vague Service Level Agreement (SLA) document under customer’s noses.

As customers, big and small businesses have much to gain from cloud computing‘s productivity, collaboration and cost saving aspects but trust that data will be protected and the service will be available is essential.

Before choosing a cloud service have a search of the web and popular forums to check what people are saying about the product.

Don’t rely on fancy marketing, or assume that a big company will be better at protecting your data. The evidence is clear that smaller, newer companies are doing a better job at protecting data and ensuring business continuity than many of their bigger competitors.

Over time, customers are going to get used to trusting cloud service providers and the businesses who’ll succeed in the online applications world are those who’ve been shown to be trustworthy.

This is one way the web is changing the way we do business.

Similar posts:

  • No Related Posts

The online business playground

This article originally appeared as The Business Playground on Smart Company.

Last week, I was lucky to be invited to talk about digital citizenship with school kids and their parents in the Griffith area.

The concept of “digital citizenship” is pretty simple – your behaviour online should be no different from how you’re expected to conduct yourself in the playground or business world.

When talking to some of the parents about the issues their kids face, it stuck me just how seriously most of the concepts like being accountable for your behaviour, safe computing and avoiding bullying are as applicable as much to business as the schoolyard.

Bullying in the workplace is pretty common and – as the tragic case of a young waitress who killed herself after being bullied at a Melbourne café shows – employers are directly responsible if they don’t control it.

While the Melbourne case didn’t have a digital aspect, what employees put up about their co-workers on social media sites or on blogs or in emails can be bullying as well.

Making things worse when social media or the web is involved is that most of the evidence is in writing and difficult to erase.

Safe computing, such as creating strong passwords and not sharing them, is one important part of being safe online.

Just as kids get into trouble by sharing their passwords with their friends, so too do businesses that common login details for their key systems and services.

Some weeks ago there was the story of a Texas waterworks that was hacked because their systems had a simple password.

No doubt the login was kept simple to make things easy for staff and management, just like a 12-year-old sharing their Minecraft or Moshi Monster accounts with their big brother or best friend.

Being accountable for your behaviour is probably something both kids and business people struggle with; just as kids don’t understand that taunting their friends through a Facebook page has real life consequences, many managers and entrepreneurs forget that laws and professional standards apply online as much as they do in any other area.

Of course in business, it’s not just ourselves that can cause problems – our staff can get us in trouble too. Employees need to know that upsetting co-workers, customers, suppliers and competitors is unprofessional and can cost them their jobs.

Having a staff acceptable computer use policy makes it clear employees are responsible for work related comments they make even on their personal accounts outside of working hours is now essential for all enterprises.

In many ways, business is just like being in the playground. It’s usually fun, but when things go wrong it can be painful in many ways.

Just as schools are on the look out for digital trouble among students, watch out for similar pain points among your staff.

Similar posts: