30 Jun 2012

The common sense guide to working on the go

It’s a plain and simple fact, working on the
go can involve a lot of technology. Every
application (or “app”) these days seems
to have migrated to a mobile version of
software that used to be confined to the
desktop PC arena as recently as a decade
ago.
Today we are never much more than
a short skip away from a keyboard or
touchscreen of one form or another,
so the question of how we stay secure
while working on the move has become a
popular talking point.


Staying secure – and of course we mean keeping your ‘data’
secure – is not just about protecting your files and folders
from malicious hackers; staying secure is also about securing
your computer, tablet PC and smartphone’s defenses against
identity theft, phishing scams and the many methods that
purveyors of malware will typically use to take up residency on
an unsuspecting user’s computer.

Anti-virus protection
should be a prerequisite for
every user, whether they
predominantly use their
machine for business or
personal use. But technology
without common sense is like
a car without petrol -- and
there is plenty you can do
to protect yourself just by
being aware of the risks of
“computing in public” so to
speak.
Computing in public
So many people cause
themselves unnecessary
amounts of stress while
working on the go, but there
are simple ways to make your
life easier and safer. AVG’s ten
top tips for effective mobile
working should be learned by
heart, or bookmarked at the
very least!
1.Count the items you take
out of your bag out and
count them back in if you
are working while on public
transport -- don’t forget your
power cable or any other
important item!
2.Think about where you
are sitting and whether
anyone can look over at your
screen -- this might sound
like an obvious thing to point
out, but thieves steal credit
card PIN numbers by looking
over peoples’ shoulders all the
time, so what details do you
have on your screen?
3.As use of personal
mobile Wi-Fi hotspots
grows, users should not be
tempted to connect with
an apparently free wireless
connection in a public place
unless it is advertised by
the web café owner etc. If
you don’t know where your
connection comes from, then
you don’t know what you are
connecting to.
4.Shut down your
Bluetooth connection
(unless you need it) when
working in a public place.
So-called ‘Bluejacking’ and
‘Bluesnarfing’ attacks are
not the biggest information
security risk around, but they
are a consideration to be
aware of.

5.If you have to use a
“public” (or kiosk)
computer then make sure
that you never access your
online banking details, make
electronic purchases or enter
ANY personally identifiable
information (including your
address) on the machine. Be
equally careful on your own
laptop if using public Wi-Fi.
6.If your smartphone has
Internet access, have
you enabled filters and other
on board protection barriers?
Similarly, turning off GPS
capabilities can also limit
location-trackers attempting
to connect with your phone.
7.Don’t ask a stranger to
“look after” your laptop
while you use the restroom
or go to the bar in a web café.
Similarly, keep your laptop
bag close to you throughout
an evening event if you have to
keep all your equipment with
you.
8.Password protection
should be enabled on
your laptop and smartphone
-- and 12345678 or password
or admin are not sensible
passwords. Opt for an
alphanumeric mix with
special characters in upper
and lower cases such as
“puppyLove567$”.
9.Make a note of
your smartphone
manufacturer’s emergency
phone line so you can call
them to have your phone
immobilized in the event of a
loss.
10.Most important of
all, make sure that
you have a fully updated
anti-virus suite installed
and fully operational on your
PC at all times. Protection
should cover not only Internet
security for web browsing, but
also firewall technology, email
defences and shields to guard
against threats carried via
Instant Messenger services.
At work
The common sense guide
to working on the go

All of this advice should take you no more than a few
minutes to think about and no more than a couple of clicks
to bring into action. We’ve called it our common sense guide
because these actions should become as natural as closing
the lid on your laptop once you have finished working. Why not
share them with a colleague and keep a friend safe too?

16 Jun 2012

Business: Tax and Finance: E-business finance dangers

E-business finance dangers, the electronic blank check and other stories

Electronic business and financial electronic transactions have become the norm in many parts of the western world today. In the UK for example, the HM Revenue and Customs service has recently issued an edict stating that from 1 April 2012 “virtually all” VAT customers will be required to file VAT returns online.

Amusingly perhaps, the HMRC issued this notice on paper sent by traditional post, but let’s not harbor on that point; business has gone online and we all know it. Electronic commerce brings with it inherent new data risks due to where and when (and by whom) transactions themselves are carried out.

Electronic business risks

“Of course, no business owner would normally write up and sign off a load of blank checks and then leave them in somebody else’s hands. But that is effectively what happens when the power to make payments is handed over to the accounts department or an office administrator of some kind. It is at this point that the business should look to ensure that systems are in place to control the movement of funds and that appropriate levels of authorization and control have been met,” said Daniel Hyde, is an international tax advisor at Westleton-Drake.

They say that with great power comes great responsibility; in this situation it’s more a case of with just a little purchasing power comes great responsibility. Leaving one or more of your employees in control of the opening and closure of the “money pipe” into and out of the business has risks. Realizing this basic business truth and addressing security policies for usage as well as authorization controls is a prerequisite.

Phishing fraud

The truth is that the banking and investments market along with the taxation and revenue services have all been exploited for potential usage in phishing scams quite prolifically in recent years. If a firm has any questions as to the authenticity of communications they receive, then first steps should always be visit the official websites of the organizations they deal with where policy statements will generally always exist

To pick one international bank purely for the sake of example, HSBC immediately advises customers to: “Stop. Don’t click on any links. Don’t open any attachments. Just forward the email to phishing@hsbc.com – We’ll investigate it.”

HSBC offers more information on phishing saying that these scams often manifest as email requests asking the recipient to update or to verify their personal and financial information, including date of birth, login information, account details, credit card numbers, PIN numbers, etc.

“Financial authorities, as we stand today, will never ask for personal information via email and never suggest that (for example) tax refunds are due over web-based mail services. Common greetings such as ‘Dear Taxpayer’ (or other openings) are obvious signs to look out for and should raise suspicion levels immediately. Once again it comes back to systems, using formal (boxed and branded if you prefer) accountancy packages and accountancy services is a small to medium sized business’s best means of insurance for financial data safety,” said Westleton-Drake’s Hyde.

Systems and electronic finance security are then, it appears, inextricably linked.

Business: How to keep your LinkedIn account secure after the hacking scare Posted 2 days ago by Adrian Bridgwater

The business-focused social networking website LinkedIn has this week confirmed that “some” user passwords have been hacked, stolen and compromised by what appears to be a Russian web forum.

After initial reports suggesting that as many as 6.5 million properly encrypted passwords had been stolen, the company’s Vicente Silveira has detailed the steps taken by his company to rectify the issue.

All members whose passwords have been compromised will now find that their LinkedIn account password is no longer valid. All these members will have received an email CONTAINING NO LIVE LINKS, but with instructions on how to “request password assistance” to then receive a subsequent email from LinkedIn with a password reset link.

LinkedIn’s Silveira also reminds users that members whose passwords have not been compromised will still now benefit from additional security measures the company has put in place, which involve the “hashing and salting” of its current password databases.

In his role as director at the San Francisco based social network, Silveira has also issued his own set of guidance on how to update your LinkedIn password and follow some industry-standard best-practice advice when it comes to security best practice.

For those users who now want to visit the site and perform a basic password change, the BBC News website has provided the following instructions:

  1. Visit www.linkedin.com, and log-in with your details
  2. Once logged-in, hover over your name in the top right-hand corner of the screen, and select ‘Settings’ from the menu
  3. You may be asked to log-in again at this point
  4. On the next screen, click the ‘Account’ button which is near the bottom of the page
  5. Under the ‘Email & Password’ heading, you will find a link to change your password

If you happen to use the same password that you use on LinkedIn for other sites, it makes very good sense to be sure to change those too.

Email-based scams resulting from this high profile hack are reported to already include links to counterfeit drugs websites and data website e-Harmony. Users are reminded to be wary of all “warning” emails that differ from the format described above here.

14 Jun 2012

1 Jun 2012

ARE YOU LEAVING A DIGITAL WILL?

Most of us have lots of downloads and information stored online, but what would happen if you died? We look at how important it is to leave a digital will.



MAKING YOUR DIGITAL WILL LEGAL.


Security for online data has deliberately become more complicated in order to thwart hackers. Some accounts need numerous passwords, codes sent to mobiles and physical keycards to access them. But if you leave the correct legal procedures in place, your family and friends should also be able to access your accounts.

You could of course, simply write down all your passwords and give it to your next of kin, but this poses a security risk. One way to safely pass on your details is to include in your will details of which relative or friend should have access to each account.


WHAT ABOUT BIOMETRIC TECHNOLOGY?


The rise of biometric technology, which uses facial recognition and fingerprint scans, instead of traditional passwords, to identify the correct owner of an account. It’s one of the most secure alternatives to typed passwords, but it raises the question of what would happen if you died and access to your accounts became impossible.

Websites and services that use biometric logins have plans for getting people access to their accounts if the technology fails or is faulty, which usually involves a master password or a series of security questions. But that only works when the user is still alive.

We asked several companies that use biometric technology how families could access an account after the owner dies, but none of them had specific plans in place. It’s worrying that this technology effectively means peoples accounts will be permanently locked after they die.