Cyber Security Advancements
Using the terms “cyber security” and “data science” in the same sentence seemed very out of place until recently. Traditionally, cyber security solutions have been based on signatures, relying the matches to specific patterns that were previously identified malware to capture the attacks in real time. This has led to the use of big data, advanced analytical techniques, and all the traditional components that have become synonymous with “data science” not being at the center of cyber security solutions that are focused on prevention of cyber attacks and identification.
However, this is not very surprising. With a signature-based solution, any given malware will need to be identified, and sometimes reverse engineered and have a matching signature deployed in an update of the product in order for it to be considered “detachable.” Due to this, signature-based solutions are not able to prevent zero-day attacks, while also providing a very limited benefit when compared to the predictive power that is offered by data science.
There are three main technological advances that are enabling data science to deliver innovated and new cyber security solutions, including:
- Computing – the easy availability of large computing power allows for the easy use of sophisticated machine learning techniques to help build models for malware identification.
- Storage – simply and efficiently collecting and storing large amounts of data to which various analytic techniques can be applied, which is distrusted systems as cluster deployments.
- Behavior – which is the fundamental shift from identifying malware that has signatures to identifying the specific behaviors that an infected computer will exhibit.
For more information on the new cyber security solutions and how they can benefit your company, contact Proactive Networks in Pasadena, California.
Google Cloud Encryption
Google recently announced that it will allow enterprise customers of one of its Cloud Platform services to use their own encryption keys to lock up their data if they are concerned that the company is looking at their corporate information.
Google started offering companies that use their Compute Engine service the option to use their own encryption keys instead of the industry standard AES 256-bit ones that are provided by Google. The encryption keys are used to lock up data so that it is not able to be read by other parties.
The keys can be used the entire time that the customer’s data is stored on Google’s platform, including any data that is stored on boot disks, data volumes, and solid state drives. Google does not retain the keys and does not have any access to any data that is encrypted. Google has not yet mentioned if this feature will be extended to any other Cloud Platform services that are offered.
Even though Google does not monitor customer data that is stored on the Google Cloud, having your own keys to secure your data can help to provide the extra assurance that is needed to protect highly sensitive data. The new option is also working to allow organizations to streamline their encryption process, allowing them to use a single set of keys for both Google Cloud and all of their in-house operations.
Sungard Consulting Services has already expressed that they are excited to start using the new option. The company, which uses GCE to run a customer service to process high volume financial market transactions, will be able to better control client data without having to pay for third-party encryption providers.
Contact Proactive Networks in Pasadena, California for more information on the new Google Cloud security and how it can benefit your business.
LinkedIn Marketing Tips
LinkedIn is one of the fastest growing social media sites. For both industry professionals and those who are looking to expand their network, knowing when and what to post can help you get noticed. Keep these tips in mind to help you write and schedule the best updates for your profile.
- One post a day, at least 20 times per month – posting at least 20 times a month can help you reach 60 percent of the unique audience that you are targeting. If you have the resources, time, and content to post more than 20 times a month, you should start aiming for 3 to 4 posts a day.
- Updates of around 25 words – the number of words that your update should contain depends on who you are targeting. If you are a business to business company, your updates should be between 16 and 15 words. However, if you are a business to consumer company, your updates should be between 21 to 25 words.
- Post during workday hours – schedule your posts when the largest audience is logged onto their account, which is during work hours. Try to avoid posting in late afternoons, weekends, and evenings when your posts are more likely to be skipped over.
You should also be paying attention to what you are posting. Industry highlight content is the most in-demand among LinkedIn members. If you are looking for higher engagement, your posts should include links. For more comments, include images or questions when you post. Status updates that have an image lead to a higher comment rate of more than 95 percent.
For more LinkedIn marketing tips to help build your network and profile, contact Proactive Networks in Pasadena, California.
Windows 10 and WiFi Sense
The recent launch of Windows 10 has brought on tons of discussions about the new capabilities and features offered by the OS. While some of the features are upgrades to what was previously offered, others are already starting off controversial, including WiFi Sense, which was brought over from the Windows Phone 8.1.
WiFi Sense automatically connects you to crowd-sourced WiFi networks that are detected, and can be used to automatically share your WiFi password with various contacts on Skype, Facebook, and Outlook, and acquire network information and provide “additional information” to networks that require it.
WiFi Sense is automatically enabled by default in Build 10240 of Windows 10. If you choose “Express Settings,” the options will be automatically enabled and will allow your device to acquire WiFi passwords from your friends and share your password with them. If you decide to leave the function enabled, it will request permission to connect to Skype, Outlook, and Facebook. Your friends who also run Windows 10 will have all their contact information shared with you as well, as long as they have enabled the function.
Microsoft claims that WiFi Sense helps to reduce frustration and improve security. Instead of having to write down and remember passwords for friends and guests, they will automatically connect as soon as they are in range for your home network. Keep in mind that you will not be able to see the WiFi passwords, and will simply get Internet access. Your guests and friends will not have access to devices, computers, or files that are stored on your home network, and you will not have access to theirs.
One of the biggest concerns with WiFi Sense is that there is no granularity beyond the surface level. While you can choose to share or not share information with Outlook, Facebook, and Skype, you cannot choose specific contacts. If you share it with your Facebook friends, you are sharing it with all of your Facebook friends.
For more information on Windows 10 security and how it may affect your devices, contact Proactive Networks, in Pasadena, California.
Anytime you want to access your profile, no matter if it is your social media profile or your online banking profile, you have to input your password. While this may not seem like a big deal, it is very easy to forget your password, which could mean being locked out of your account. As hackers get better and better at figuring out passwords, companies are finding ways to get around passwords with new ideas, including:
- Smartphone solution – many companies use a two factor authentication system, which requires you to confirm your identity by entering a code that is sent to a separate device, to help keep information secure. While this was an issue in the past since nobody was carrying around two computers, the smartphone has made this issue obsolete. Almost everyone has a smartphone with them at all times, which makes it very easy to ask for an authentication code.
- Biometrics – smartphones are going way beyond access codes. Apple Pay, Android Pay, and the upcoming Samsung Pay allow users to use their fingerprints to verify payments for mobile devices. USAA also deployed various biometric options to login to its mobile app, which is being used by more than 650,000 of their members.
- Stay protected – while all of the newest technology is working to make life easier, it is still important to make sure that you stay safe right now. Make sure to use different passwords for all of your accounts, and change your passwords a few times a year. Never use a password that is easy to guess, such as “password” or “12345.”
Contact Proactive Networks in Pasadena, California for more information on how your business may be affected with the ending of passwords in the future.
For many years, digital marketers have been tied to cookies to generate approximations of how many people viewed an ad. This technology is becoming increasingly outdated and is no longer able to provide good, reliable information on how many people see an ad each day.
Facebook, the social media giant, has an answer to the outdated cookie method – Atlas. The company is working to move the digital marketing world far beyond what is currently being offered. There are many abilities that are provided by Atlas that cannot be found anywhere else, including:
- Ad buyers have the ability to measure, target, and optimize mobile and digital ads across all digital medium. Since Atlas operates as a separate entity from Facebook, it does not have access to personal information from the social media site, nor does it share marketing information with Facebook.
- Atlas can go beyond the cookie based measurement to more clearly establish a reliable ROI of digital ads, specifically when mobile ads are involved. Marketers now have the ability to look at metrics that are beyond the last click and observe the multi-device process that leads consumers to purchase online or offline.
- Since cookies do not have the ability to work on mobile apps, marketers have no jumping off point for in-app ads. Atlas is able to match device-ID data with anonymized identity data of the user that access Facebook on the same mobile device.
- Atlas is able to connect offline purchases to digital ads that are shown across the web and mobile. In order to do so, they have to have access to advertisers’ customer or consumer data from third party data vendors.
For more information on how Facebook’s Atlas Ad Server can help your company reach more customers, contact Proactive Networks in Pasadena, California.
Google Map Upgrade
Google Maps is used by thousands of people each day. While the app is very convenient for those who are traveling in urban areas, it can be very difficult to find where you are going with no service. Google has found a way to solve this problem by announcing that they will be offering users access to Google Maps when their phone is offline.
Users of the app already have the option to save maps that they can pull up later. The new upgrade will feature many important and useful abilities, such as finding hours of operations, reading reviews, and getting turn by turn directions.
The new features of the app are especially crucial for anyone who spends time in places that have limited cell service or internet connections. While it may seem like an issue that you will not have to face in today’s world, there are plenty of areas that have scarce service, which can lead to you being stranded without any knowledge of where you are. If you forgot to save the map that you were looking at, being able to work offline can help to ensure that you are able to get to your desired location.
For all of your computer support needs for your business, to ensure that your employees never have to feel lost, contact Proactive Networks in Pasadena, California. We will help to ensure that your business is properly protected while helping to boost your overall productivity.
One of the biggest decisions you have to make when you buy a new iPhone or iPad is how much storage you need. The more apps you download, songs you keep on your iTunes, and pictures you take, the more storage you will need. To ensure that you do not run out of room, keep these storage tips in mind.
- Check your storage – by finding out which app is using the most storage, you can find out where you can cut back. Checking your storage is very easy. Simply tap on Settings, then go to General > Usage > Manage > Storage.
- Uninstall un-played games – everyone has downloaded a few games that they loved. However, when the novelty of the game wears off, the app is wasting tons of space. Find any games or other apps that you are not using and delete them to open up some more space.
- Delete old podcasts – one 30 minute podcast can take up to 25MB of space. While it may not seem like a lot, having a ton of old podcasts can take up a huge amount of space. Simply swipe left on your podcast to delete what you do not want or need.
- Use the cloud – cloud applications allow you to keep all of your information within easy reach without taking up too much space on your phone. Apple has their own cloud that you can use, as well as third-party apps, such as Dropbox.
- Do not use Photo Stream – Photo Stream allows you to automatically sync 1,000 photos with all of your Apple products. However, if this function is enabled, it means that you have doubles, maybe even triples, of all of your pictures.
For more tech tips to ensure that you have all the storage space that your business needs, contact Proactive Networks in Pasadena, California.
Each time you open a web browser on your computer, you may be being watched. From government tracking to common hackers, what you do online may be monitored. While there is no way to completely protect yourself from Big Brother while online, there are some steps that you can take to stay a little safe. Keep these Internet security tips in mind to ensure that your private information stays private.
- Clear your browsing history – at the end of every day, clean your Internet browsing history. Since you are most commonly tracked by your emails and IP address, this is how others can find out exactly where you have gone and what you have been looking at. There are also some apps that are available, such as Piriform, which will actively work to delete parts of your online footprint.
- Create specific passwords – while it may be easier to use the same password for every online account that you make, it is not very safe. Instead, create a unique password for every account that you create to keep your information secure. If you have hard time keeping track of what password works with what account, write it down or try a password app, such as LastPass.
- Encrypt your emails – GNU Privacy Guard allows you to encrypt your files and emails so that they will be unreadable unless someone correctly answers your “secret question.” You will be asked to create a private and public key when you install the application, which will work to keep your information safe.
Contact Proactive Networks in Pasadena, California for more tech tips on how to stay safe online.
Computer Backup Tips
A compromised computer, no matter if it was caused by a spill or a virus can be enough to ruin your entire work week. All of your bookmarks, projects, and pictures can be gone in an instant, which is why it is so important to make sure that you regularly backup your computer. Keep these tips to back up your computer in mind to ensure that all of your important information is not lost.
- Use cloud programs like Carbonite, Crashplan, and Backblaze – the best way to backup all of your information is by using a cloud based service, which helps to protect everything in cyberspace. Cloud services are so effective since they are able to update without you having to do any work. They will also provide the most up to date information and is always accessible through any internet connection.
- Internal backup – many operating systems have a “time machine” function that allows you to restore your computer to an earlier date. When you shut down your computer at the end of the day, it will save all the programs and update them through that specific date. If you are able to go back to an earlier date, you can work around any suspicious files that may contain a virus or malware.
- External hardrive – external drives allow you to store major files safely. Although it is one of the most outdated ways to back up your computer, it also ensures protection and privacy. Keep in mind that this is a user dependent way to back up information since you will have to consciously decide what gets backed up. If you do not regularly backup your information on an external drive, you may lose important information that you recently added onto your computer.
For more tech tips and to keep your computer running efficiently, contact Proactive Networks in Pasadena, California.