The post How to Handle Negative or Spammy Links to Your Website appeared first on Web Entangled - Zimbabwe.
]]>The post How to Handle Negative or Spammy Links to Your Website appeared first on Web Entangled - Zimbabwe.
]]>The post Hackers Teaming Up with AI: Expert Warns of New Ways You Can Get Hacked appeared first on Web Entangled - Zimbabwe.
]]>The post Hackers Teaming Up with AI: Expert Warns of New Ways You Can Get Hacked appeared first on Web Entangled - Zimbabwe.
]]>The post Will your business survive a Cyber Attack? appeared first on Web Entangled - Zimbabwe.
]]>If you’ve had your computers for any length of time, they likely have applications installed that aren’t strictly necessary for work. Perhaps you have a few games installed or a couple of drivers for a device you no longer use?
The problem is that every single piece of software you install, whether it’s freeware or a well-known application, has its own dependencies and vulnerabilities. In other words, every unnecessary program you have is another potential weak point for an attacker to exploit.
The good news is that these days, most of the things you need for work can be accessed in a browser. For instance, you can create documents, listen to music, and send emails without needing any dedicated applications. Simply: the fewer programs you have, the less risk there is.
Now that you’ve closed as many doors as possible to a potential hacker, it’s time to block the remaining ways in. One of the most important things to do is install a Web Application Firewall (WAF) on your company servers. This prevents some of the most common threats outright, including Cross-Site Scripting and cookie poisoning attacks.
We also recommend using a company Virtual Private Network (VPN) whenever possible, as well as separate email encryption. The VPN not only prevents attackers from observing your employee’s internet traffic (which includes login credentials, contact lists, and internal communications), but it also nullifies most kinds of Man-in-the-Middle attacks.
Meanwhile, the email encryption stops spear-phishing attacks by guaranteeing that the person you’re talking to is who they claim to be.
If something goes wrong, it’s vital that you’re able to find out what happened as quickly as possible. This is where proper monitoring procedure comes in. Your IT staff can use applications like NetCrunch or Spiceworks to find out all kinds of information about the network in real-time. For example, you could set up an automated alert letting your team know about multiple failed login attempts or new changes to user rights.
Further, it’s important to consider the risk of a breach when designing your systems. This sounds obvious, but even major companies neglect this (Sony infamously stored thousands of user passwords in plaintext). We cannot stress this enough: user details should always be salted, hashed, and encrypted to ensure that even if the data is stolen, it cannot be read.
It’s often easy to forget that not everyone is a computer expert. As such, it pays to implement a commonsense internet usage policy. This doesn’t have to be overly restrictive; generally, a simple web-filter, an ad-blocker, and limited application installation rights should protect you from most problems.
We’d also recommend creating disk images of your machine periodically so that you can just roll back to a fresh installation should a rogue piece of malware slip through.
Unfortunately, even the best systems need regular maintenance. New software vulnerabilities are discovered on a daily basis and if these aren’t addressed, they can pose a major threat to your network’s security. Take Heartbleed, for instance: this server bug allowed hackers to view encrypted web traffic and five years later, there are still 200,000 vulnerable devices.
Passwords should also be changed every few months at least to prevent attackers or former employees from logging in with old credentials. A good rule of thumb is that a password should be at least eight characters long, with mixed-case letters, numbers, and punctuation.
Ideally, your system would reject dangerously simple passwords like “qwerty” and prevent staff from reverting to a previously-used password.
Simply put, business owners are caught in a game of cat-and-mouse with cybercriminals. The odds are in your favor, though, as attackers have to try increasingly hard to find cracks in your network’s defenses. In contrast, all you have to do is minimize risk, and the steps above are an excellent way to start.
Ian Garland is a tech writer, programmer, and author with a particular interest in digital privacy.
The post Will your business survive a Cyber Attack? appeared first on Web Entangled - Zimbabwe.
]]>The post What Exactly is Cloud Hosting and Why is it Useful? appeared first on Web Entangled - Zimbabwe.
]]>Nevertheless, while most people are now broadly aware of cloud hosting and perhaps even familiar with some of the arguments in favour of it, many are unaware of the specifics. Here, we take a more in-depth look at cloud hosting, explain what it is and how it works, and outline some of the reasons cloud hosting providers can be useful.
On a basic level, cloud hosting is the provision of on-demand storage resources over the internet. A cloud service provider is responsible for maintaining a network of inter-connected servers, usually in different locations. Data stored on the cloud is then spread across these machines, as opposed to everything being stored in a single central location.
Cloud hosting is further divided into public and private clouds. With a public cloud, as an article for Microsoft Azure explains, hardware and infrastructure is technically shared with other organisations. With a private cloud, resources are used exclusively by your business and the cloud infrastructure is maintained over a private network.
It is one thing to understand what cloud computing is and how it works as a hosting model, but it is also important to grasp why it can be useful. In truth, there are many benefits connected to cloud hosting, but there are four main advantages that are relevant to businesses and are applicable in most cases.
Modern businesses need 24/7 access to data and computer systems, and cloud hosting services can offer excellent reliability to help facilitate this. This is primarily possible because the hosting itself is shared across an inter-connected network of servers, and there is no single point of failure or vulnerability.
Crucially, this means if one server goes down, the other connected servers can take on the workload. This reliability makes cloud hosting a solid option for many SMEs seeking IT disaster recovery services. Using such a service, businesses can back up valuable data off-site and use it to restore systems remotely.
In addition to these reliability advantages, there are instances where cloud hosting can offer cost-related benefits over traditional hosting methods too. For instance, an article written for Amazon Web Services highlights the lack of up-front costs associated with cloud computing, such as investment in IT hardware, or infrastructure management.
Storage management costs can also be reduced, because a lower amount of physical storage hardware is required. Furthermore, many cloud hosting providers offer pay-as-you-go pricing models, meaning you only pay for the resources you actually need and use. Ultimately, this can make it a more cost-effective option for many businesses.
Another major advantage of cloud hosting is its scalability, since good cloud hosting providers will always have plenty of space and processing power kept in reserve. This then allows you to easily increase the bandwidth or storage space needed at any given time, even if you are only expecting short-term fluctuations in requirements, such as dealing with increased website traffic during the Christmas period, or coping with demand during a sale.
“You can always make changes to your requirements, which is the real beauty of cloud hosting concept,” says Om Thoke, writing for Lifewire. “You can add up other servers in the network to tackle downtime, or to expand your existing bandwidth/storage space without affecting the existing set-up.”
Finally, cloud hosting can also offer excellent flexibility through a hybrid model, which combines both on-site and off-site storage, with connectivity between the two. This can be especially beneficial for companies that may have concerns about the lack of control over IT infrastructure, or for those with the most advanced security needs.
Through a hybrid model, businesses can still benefit from many of the other plus points associated with cloud hosting, but can have a much greater level of control over the private, on-site element. The most critical or sensitive data can also be managed on-site, if preferred, avoiding some of the security concerns linked with public clouds.
Although cloud hosting has technically been around for a while, it has exploded in popularity in recent years. Despite this growth, however, many people remain unsure about what it is and why it is useful. The simple definition of cloud hosting is the provision of hosting services, on-demand, via the internet, spread over multiple servers.
Mitesh founded Fifosys, a managed IT services provider in London, in 2001 following completion of a master’s in computer science. He has a reputation for straight talking, delivering focused and effective directives to his clients. Mitesh has an in-depth understanding of both operational and transformational IT projects, and leads the business strategy at Fifosys. He also acts as a mentor, guiding junior aspirants commencing their business career.
The post What Exactly is Cloud Hosting and Why is it Useful? appeared first on Web Entangled - Zimbabwe.
]]>The post How Facebook Marketers Can Manage Privacy to Protect Business Security appeared first on Web Entangled - Zimbabwe.
]]>In June of 2016, hackers briefly took control of Zuckerberg’s personal Twitter and Pinterest accounts. Using a password they’d obtained from a LinkedIn security breach – which Zuckerberg had re-used on the other networks – they gained access, and then posted messages boasting of their success.
Facebook itself has also fallen victim to cybercrime. From 2013 to 2015 the social media giant transferred tens of millions of dollars into bank accounts belonging to a Lithuanian swindler who had forged email addresses and invoices in order to trick Facebook employees into sending him payments that they believed were going to a major Asian manufacturer of computer parts.
Both incidents were enabled by online impersonation – also called e-personation – which happens when someone takes advantage of the relative anonymity offered by digital communications to masquerade as another with the intent of causing harm or perpetrating fraud. In Zuckerberg’s case, the hackers pretended to be Zuckerberg himself in order to show off their hacking prowess – and mock his incompetence. In the Facebook scam, the criminal forged email addresses, invoices and corporate logos to divert payments from the supplier into their own accounts.
For Zuckerberg personally, and for Facebook as a company, the consequences of e-personation weren’t severe. Zuckerberg’s hacked Twitter and Pinterest accounts were mostly unused, his access was quickly restored, and his primary Facebook account was unaffected. So he lost face briefly, but little else. Facebook maintains that they were able to recover “the bulk of the funds” stolen from their company after the hacker’s arrest and the start of extradition proceedings.
The outcome can be very different for small to medium-sized businesses victimized by digital fraud, however. Not only do these companies generally have fewer resources available to prevent or combat security breaches, but they’re often less able to survive the business disruptions or financial losses that accompany them.
And the consequences of victimhood might be even more serious for you – both as an individual and as a marketer.
E-personation scams grow and thrive on a diet of publicly available information. The more facts scammers are able to gather about potential victims, the more likely targeted phishing or fraudulent email campaigns are to succeed.
As the largest social media network in existence today, and the most widely used by advertisers, Facebook has become a virtual paradise for identity thieves, who see it as a perfect “hunting ground” for stalking potential victims and gathering intimate details about their lives and finances. As Facebook’s total user base has increased in size, the number of users with illegitimate or malicious intentions has grown as well. One report states that as many as 600,000 individual accounts may be compromised daily. Another survey found that among social media networks, Facebook is trusted least by its users.
This is especially important to you if you’re among the more than 250,000 social media marketers who use Facebook on a daily basis for professional purposes. Because all Facebook Pages (business accounts) must be maintained and administered by users with personal Profiles (individual accounts), you’re essentially mandated to use an individual asset (your private Facebook account) at work.
You probably think quite often about how to protect yourself online, but you may not have considered how your job might be putting others – your family, friends, and acquaintances – at risk. But by publicizing their relationship with you (and your employer) you might well be making them into targets.
So what can marketers do to protect themselves, their networks, and their employers on Facebook? Here are some simple tips:
Any business Page on Facebook is only as secure as the Profiles that administer it. To protect your employer – as well as yourself – configure yours correctly. Facebook recommends that you use two-factor authentication to protect your login details, and it’s a good idea to set up email alerts to keep you informed whenever your account is accessed from a new device. Choose a strong password, change it regularly, and refrain from sharing it with others. Facebook itself offers additional guidelines on its Security Page.
The benefits of following these guidelines are more than worth the time you’ll spend reviewing them. Make sure your company’s Page has the right administrators, and that these admins have the right privileges. Because Page security depends upon the security of the Profiles that administer it, and because all admins are humans who make occasional mistakes, it’s wise to have as few administrators as possible. Do designate at least two, so that someone’s available to step in should the primary administrator’s account ever be compromised. But you don’t keep a large number of people in this role.
Periodically review the list of privileges granted to writers, editors, advertisers, consultants and others within your company (Facebook calls these Roles). Delete any users who have become inactive and limit everyone’s access to the minimum level necessary.
By default, postings on a Page will appear under the company’s name, not the name of the individual who created it (though other administrators will see the Profile responsible for posting the content, this information will not be visible to others). Keep this setting intact, and ensure that all other administrators are posting under the company’s name as well. Not only does this unify your messaging and keep you on-brand, but it also prevents you from becoming a target of scammers seeking specifics about your company. Such information can be used to make phishing attempts look more believable and authentic.
One of the ways that social media engagement can benefit your company is by making your brand more personal. Using your real name and photograph online can help building your customers’ trust. And identifying in-house subject matter experts (SMEs) as team members can help you showcase the intellectual capital that your company possesses.
However, Facebook is often used by criminals trying to map individuals onto the roles they fill within their organizations. These maps are then employed to create highly targeted and specific fraudulent email campaigns like the one that victimized Facebook itself. Before identifying anyone as a Team Member on your Page, ask yourself: what objective does this identification accomplish? What are the risks? People in some industries (such as cybersecurity) are more likely to be targeted, as are those in certain departments (accounting, payroll). Identify Team Members only in ways that are limited and strategic.
You probably google yourself from time to time. It’s natural to be curious about what others might be saying about you online. But this natural curiosity can also help to keep you safe. One of the most common Facebook scams involves setting up a fake profile under a name that’s almost identical to yours, complete with a photograph copied via screen shot, and then using the fake account to request money from people in your network. It’s also common to see falsified Pages on Facebook, ones with no connection to the legitimate brand or real company they appear to be advertising. Sometimes scammers use these Pages to promote fake contests or sell counterfeit products. Other times they’re merely intended to defame the real brand. In any case, you should report any fake Profiles or Pages you come across to Facebook immediately.
Don’t blog or post about your employer outside of the workplace without a clear goal and express permission. Maintain a clear separation of roles, and avoid promoting your employer to your personal network.
They can provide quick and reliable answers to your most pressing security questions. What policies and procedures does your organization have in place to deal with online fraud? Is there a process for remotely deleting data from personal devices that have been lost or stolen? What endpoint security software is currently being used in your company, and how often is it changed or updated?
These might seem like technical questions, but getting good answers involves building relationships. Years ago, IT departments and marketing departments were widely separated within organizational structures, but today’s marketers depend heavily on data analytics and computing-driven insights, and can only benefit by drawing closer to IT professionals. Not only can forging these alliances help you stay safe, but it can also enable you to take better advantage of the tools at your disposal.
Companies have long lamented that social media causes their employees to waste huge amounts of time at work, but when it’s your job to be present on social media regularly and for extended periods, the game has changed. Nonetheless many marketing professionals may still feel embarrassed or ashamed to admit that they’ve clicked on an infected link or installed a questionable app. All human beings make mistakes, and even the most professionally accomplished social media manager has been distracted or careless at some point. A culture of honesty and open communications can help prevent the spread of malware by allowing security personnel to combat infections soon after they occur.
Good habits can go a long way when it comes to defending against online fraud, and organizations with carefully designed policies and procedures are less likely to be at risk. Start talking and thinking about privacy and security now, and you’ll be doing your part to keep cybercriminals from gaining a dangerous foothold in your company.
Dawn Blizard, PhD, was trained as an English professor and seasoned as a technical editor before becoming a freelance copywriter and content creator. She helps research-driven B2B companies educate their target audiences in the digital space with standout white papers, blog and feature articles, website copy and more.
The post How Facebook Marketers Can Manage Privacy to Protect Business Security appeared first on Web Entangled - Zimbabwe.
]]>