Archive for August 27, 2015

Back to School Cybersafety Resources

Back to School Cybersafety ResourcesThe new school year is here. If cybersafety is not on your “back to school” checklist, it should be. SecureWorld offered up a list of resources to help parents have a meaningful conversation about “cyber-safety” with their children. Parents need to talk with their kids about what they can do to protect themselves from the threats that are lurking online.

There are a variety of resources available that can help parents teach their children about the importance of Internet safety and privacy. Here are some recommended in the article.

threats lurking onlineIn 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help Americans understand the dangers that come with being online. The program stresses that cybersecurity is a shared responsibility. Parents can download a Cybersecurity for Kids tip card (PDF) that offers helpful hints and advice designed specifically for children.

ConnectSafely.org is a nonprofit organization dedicated to educating users of connected technology about safety, privacy and security. The website offers a number of Parent Guides, written by parents for parents, including:

Back to school

The National Cybersecurity Alliance is an industry-led group, founded by the likes of Symantec (SYMC), Cisco (CSCO), Microsoft (MSFT), and EMC (EMC), whose mission is to educate and therefore empower a digital society to use (rb- their products) the Internet safely and securely at home, work and school.

Parents and teachers can download tips and resources from their website StaySafeOnline.org. The tip sheets are created specifically for different age groups ranging from kindergarten to college students. This site offers resources like:

Free Security Check-Up and Tools – Which has download locations for tools from A to W – Avast to Webroot. (as always use at your own risk).

Tip Sheets for:

The author states that industry professionals are also placing a high priority on preparing children for life in cyberspace. For instance, the (ISC)2 Foundation’s Safe and Secure Online program was introduced in 2006 in conjunction with Childnet International. They offer resources for parents which include Top 10 Tips for Parents (PDF) and the Parent-Child Commitment to Safety Agreement (PDF).

The Business Insider polled and a bunch of industry cyber security experts about what they teach their kids about the internet. The experts working in the field recommend you:

  • Start discussing online safety at an early age.
  • If you wouldn’t do it face to face – Don’t do it online.
  • Once you’ve written something you can’t delete it.
  • Not just to tell them the rules but also to spend the time/

You can read the rest of the tips at Business Insider here.

rb-

Good luck, you will need it.

Talk to your students about cyber safety – Staysafe.org’s guide on Internet Safety for Teens: https://www.staysafe.org/teens/

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Data Never Sleeps

Domo has created this infographic which shows just how fast data proliferates. The amount of data that can be produced in a single minute is mind-numbing and shows no sign of slowing down. CEO and chairman of the Domo board Josh James blogged; “Since 2013, the global internet population grew nearly 20 percent – from 2.4 billion to 3.2 billion people“. These new users are using new services in an unprecedented number. Domo says that every minute on the web, users:

  • Vine users play 1,041,666 six second videos.
  • Snapchat users share 284,722 Snaps
  • Buzzfeed users view 34,150 videos
  • Uber passengers take 694 rides.

rb-

Who is storing all of this information and how are they storing it and the metadata that surrounds it? What kind of information are TLA’s, Marketers, and credit card companies culling out of this data? 

Domo infographic

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Sweating the Oldies

Sweating the OldiesIf you’re “sweating assets” and holding off on making major network upgrades, you’re not alone. No Jitter brings our attention to Dimension Data’s annual Network Barometer Report. The report surveyed the system integrator’s worldwide clients and found that the percentage of aging and obsolete devices in today’s corporate networks around the globe is at its highest in six years signaling that the recent global financial crisis may still have a lingering effect today.

 

More than half of devices are aging

RecessionAccording to the article, more than 51% of all devices assessed are now aging (3-5 years old) or obsolete (5 years or older). In addition, 27% of all devices are now ‘later’ in their product life-cycle and at the point where the vendor begins to cut support.

The aging was highest in Asia-Pac and the lowest in the Americas. The survey found equipment in the Americas, was considerably lower at 44%. Dimension Data ascribed this variation to regional macroeconomic conditions.

The oldest equipment

The “sweatiest” companies were in the travel/transportation vertical which had more than 50% aging/obsolete devices according to the study. Other verticals were “sweaty as well:

  • BaystacksConsumer/retail and utilities/energy, all of which had more than 50% aging/obsolete devices.
  • Automotive/manufacturing had an aging/obsolete base of 41%
  • Technology industries had a 37% aging/obsolete gear 37%
  • Construction/real estate was most up to date with 28% aging or obsolete.

The level of aging/obsolete networks hit 45% in 2012 without triggering a refresh and climbed to 48% in 2013 and reached 51% in 2014. That author suggests that either we’re long overdue for another refresh, or else we’re moving to an environment where aging network gear is the rule.

He goes on to speculate that as the BYOD/BYOEverything trend grew over the last 3 years and enterprises diverted technology spending to ad hoc device/cloud purchases, we’re looking at a fundamentally new buying environment.

Obsolete devices fail less

The survey results suggest that “sweating” network assets may be a smart strategy. They analyzed 91,000 trouble tickets from its own practices and found that “Obsolete devices fail less often than current devices. And, when they do fail, problems are quicker to resolve.” Specifically, the survey found that:

  • Obsolete devices had the lowest failure rates (compared with new and aging),
  • Aging devices had the lowest mean-time-to-repair rates among the three classes.

Old equipmentOld hands might be tempted to greet these findings with some variation of the old lament, “They don’t build ’em like they used to,” but the truth might actually be even more flattering to the organization.

Dimension Data suggests that gear that’s been in place while is supported by more mature processes, hence the decreased likelihood of breaking, and faster ability to fix when they do break. Of course, an asset-sweating strategy should have some rationale behind it–it’s’ not about just clinging to old stuff so you don’t have to deal with replacing it.

How to keep the old stuff going

Dimension Data “Tips for Sweating Assets” that included:

  • Have an accurate inventory of your entire network estate.
  • Understand the function of each device and how critical it is to the network’s uptime.
  • Know at which stage in their life cycles these devices are.
  • Have the right operational support strategy in place to resolve any performance issues or outages that may occur, as vendor support will be either limited or unavailable during later life cycle stages.
  • Ensure that the device’s capabilities are not constraining architectural changes, which have driven upgrades in other areas of the network.

rb-

The aging of network gear is not unique. Many firms are still reeling from efforts to survive the depression, recession, economic downturn. In some places, they don’t pick up the trash regularly or replace stained ceiling tiles. The Business Insider says the average age of private fixed assets is at a 50-year high. and here a chart to prove it.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Prevent Pervy Pics

Prevent Pervy PicsFrom the world of unintended consequences, iPhone users have become the victims of a new phenomenon known as cyber-flashing. Reports out of London state that Apple iPhone users are being sent pervy pics. The pervy pics are unsolicited and indecent photographs. The pics are being sent over a new Apple feature in iOS called AirDrop.

BluetoothAirDrop is a feature on the iPhone, iPad, and Mac computers. AirDrop allows users to send files, such as images, to each other at a close range. The pics can be sent up to 33 feet (10 m) via a Bluetooth connection. Apparently, even if the receiver rejects the photo, they are still shown an uncensored preview of the image.

AirDrop initially establishes a connection over Bluetooth. It then uses a direct Wi-Fi connection between the two iPhones to send files. This makes the transfer much quicker.  It’s supported by devices from the iPhone 5 onwards with iOS 7 released back in 2013.

How to prevent the pervy pics

Pervy pics appearing on your iDeviceTo prevent the pervy pics from appearing on your iDevice, you need to take action. Mark James, a security specialist at ESET UK, explains. You have to set your AirDrop settings to “Contacts Only” which will only permit AirDrop file transfers from people in your address book or disable AirDrop entirely. He explains that AirDrop is not turned on by default, but it’s easy to set AirDrop to receive from Everyone, and then forget all about it.

ESET explains how to prevent cyber flashing:

  1. On the home screen of your iPhone, swipe up to open the Control Center.
  2. Tap on AirDrop, below the media playback and volume controls.
  3. Tap ‘Off’ or ‘Contacts Only’ to prevent files from being sent from strangers.

Apple Airdrop settings

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers and anything else that catches his attention since 2005. You can follow him at LinkedInFacebook and Twitter. Email the Bach Seat here.

Mobile Apps Leaking Your Info

Mobile Apps Leaking Your InfoJust in time for Blackhat, San Francisco-based Appthority released its Q2 2015 Enterprise Mobile Threat Report. The big headline from the Appthority report is that enterprise mobile apps are leaking your info. They are sending personally identifiable information (PII) and other sensitive information all over the world often without the enterprise’s knowledge. Your phone is leaking your info all over the web.

Appthority logoFierceMobileIT says that the Appthority Enterprise Mobile Threat Team (EMTT) collected and analyzed security and risky behaviors in three million apps. They found that the top iOS apps sent data to 92 different countries, while the top Android apps are leaking your info to 63 different countries.

Zombie apps are leaking your info

The report found another threat to all data. Appthority’s all-in-one App Risk Management service shows that 100% of enterprises surveyed have zombie apps in their environments. Zombie apps are apps that have been revoked by the app stores and are no longer getting security updates. Zombie apps can give attackers a conduit into the enterprise.

zombie appsThe report estimates that 5.2% of the Apple (AAPL) iOS apps on employee devices in an enterprise are dead apps, and 37.3% are stale Apps. On Google (GOOG) Android devices, 3.9% are dead apps and 31.8% are stale apps.

Zombie apps can leak your info. Appthority explains that malicious third parties could use a man-in-the-middle attack to hijack the update mechanism for these apps to install new malware on user devices.

Threat to the enterprise

Despite the threats, app stores run by Apple, Google, and Microsoft (MSFT) are under no regulatory obligation to tell users of revoked apps anything after release. Including copyright infringements or serious security/privacy concerns.  The report points out. Domingo Guerra, president, and co-founder of Appthority classified this as a stealthy risk; “The ongoing threat of zombie apps and stale apps continues to be an ‘under the radar’ threat to the enterprise.

programmersA third risk to the firm’s data comes from their own programmers according to the venture capital-backed Appthority. The firm says over-taxed enterprise app development teams are increasingly relying on third-party libraries and software development kits. Vulnerabilities in the third-party packages can put enterprise data at risk when they get baked into a corporate app.

The company told CSO that few mobile devices have security applications installed. In particular, only 4 percent of Android devices in use within enterprises had on-device scanning solutions.

Rb-
Firms that depend on mobile solutions as part of a Bring Your Own Device (BYOD) effort need to look after their apps as well as connectivity and hardware and data and governance and reimbursements. Bring your own device hardly seems like a cost saver to me.

I have said this repeatedly, it seems like costs are just being moved around. From spending on a PC in the office that is very less likely to be lost and that can be controlled to a bunch of new enterprise applications like EMM, mobile anti-malware to app monitoring.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.