Hacking is a form of black art. The malicious types of hackers are even referred to as “black hat” vs the “white hat” hackers who look for vulnerabilities for altruistic reasons instead of malicious. Put differently, “black hat” vs “white hat” is a sort of throwback to the old western movies where the bad guys always wore black hats and the good guys wore white/light colored ones.
We here at Spes Technologies are all for making our customers more efficient. We do our best to leverage technology they may already own (but aren’t fully utilizing) before recommending additional solutions. We’ve already covered a few basic tips on getting more out of your smartphone or tablet, now we’ve compiled this list of apps to help you get even more out of them.
So, you’ve started a business. You’ve purchased your domain, had a web designer create a website that profiles your business, products and services. Great! Now it’s time to start serving your customers, earning money and living the dream.
There is one small problem, however. The dreaded GMAIL, Yahoo or other generic email address. It’s a problem for a number of reasons.
It’s unprofessional. After having gone through the hard work of buying a domain and building a website, the additional effort required to create a couple of email boxes on that domain is insignificant. It makes it seem like the branding of the business is only partially complete. It’s also a nearly instant giveaway that the business has only one employee or perhaps that it is a disorganized mess if there are multiple users for that one email address. Is this the kind of service a client can expect from your business?
It lacks forward thinking. Sure, a single email address is sufficient for a one person operation. But what if the business begins to grow and now all of a sudden there are 3 employees. Do they just use their own personal email addresses?
It’s un-secure. Hacking and cybercrime in general is becoming an increasingly prominent issue in society, one that’s unlikely to diminish any time soon. Anyone can create a copycat generic email address with a simple typo in it and start impersonating you. Don’t believe me? Do a search on “typosquatting”. This is outside the fact that the cybercriminal could be a disgruntled employee. No, an email address on a company owned domain does not automatically prevent this type of behavior but the right system will have Data Loss Prevention(DLP) measures in place to mitigate the problem. Recent advancements in technology make this affordable for even the smallest of businesses.
Whether you’re a small business owner or a web developer, please take the extra few minutes to set up proper email addresses for your business or clients. Not only will it give your business a more credible and professional appearance, it will be easier to manage when additional employees come on board and also help save face with your clients should something go wrong.
That is the phrase that comes to mind as we sit here and analyze the events that unfolded at the end of last week. In case you didn’t hear, there was a significant DDoS attack on major DNS provider Dyn. In plain English, someone tried to set the Internet’s phone book on fire. This cyber-attack took down or negatively affected large parts of the Internet all over the world.
That’s a big deal in our ever increasingly connected world and it was all done by exploiting vulnerabilities in IoT(Internet of Things) devices, which is a fancy way of referring to the quickly growing list of gadgets getting connected to the Internet. Manufacturers are rushing to implement these connected strategies for all of their devices with little to no regard to security or the ramifications of flooding the market with unsecured and often times unnecessary gadgets.
Be extremely cautious of any connected device you bring into your home or business, especially ones from little known manufacturers or if the device is inexpensive. We all love cheap gadgets but the old adage that says “You get what you pay for” very much rings true in this category as well.
If this trend continues on the current path, the outages will get much worse and have far bigger consequences. We aren’t far away from large scale hacks of our place of business, our cars and our homes. We must demand better.
The following is a guest-blog written by Michael Wright, a security expert and faculty of Harrisburg University teaching security courses.
This is the first in a three-part series that covers the security of social networking and what it means to you.
In part 2, I’ll explain how you can become compromised. In part 3, I’ll explain how to protect yourself. The goal is to get you thinking about what you do online and how you do it.
Passwords. Passwords everywhere. Any website we visit these days requires a username and password. It is not hard for one person to have logins for 100+ websites by the time we consider computer logins – work and home, email accounts – work and personal, banking institutions, social media, forums & blogs, shopping, multimedia and entertainment sites and more. There seems to be no end to them. What do most people do? Recycle the same username and password or some combination thereof.
Just take a look at this chart of the most popular passwords of 2014: