Wednesday, March 27, 2013

Issues and Apples

 
 
 

                               
Apple once stated that there was no such thing as a virus for the Mac. That thought process bled over to all its devices and nowadays they are eating their words. They may be a well-oiled machine but they don’t get make statements like that anymore.
One of the recent hacks gets a user in by having Siri call a number and then opening the SIM card (taking it out), thus gaining the user access to photos and contact info.
Constant iOS updates have been implemented to fix bugs and patch security holes. The 6.1.3 update, which was meant to fix these security hacks, has now given us issues with Wi-Fi connectivity and battery drains. It seems every time they fix one issue they cause another. Frustrating, to say the least.
A major issue to consider is the virus Trojan.Yontoo.1. There are many avenues it can use to install; the preferred method is showing up as a movie trailer (in Adspace) that requires you to download a new media player or install a plug-in. Once clicked you are directed to a site and the virus downloads itself on your browsers (all of them) and copies your information as you work or browse data on your device. This is only the most recent of the larger viruses to attack an Apple OS and as they grow bigger Apple will find many more.
Finally, this last piece is not really virus or hack related but a call to action to improve iCloud. For everyday consumers iCloud works seamlessly. We download and upload to the cloud and feel safe that our data is stored. Well, consumers find it useful but App Developers have been wrestling with it for some time now.
Did you know that in order for Apple to promote a developers new App they must have the data stored in the iCloud? The problem is that Apple has an issue with Database syncing. When a developer tries to sync the new app to the cloud, data goes missing, and devices stop working. There has been no comment from Apple on this issue besides past statements of upgrading iOS. Hopefully iOS7 will offer a fix.
Until all is solved, we must realize that no technology is impenetrable. Every device can be hacked, destroyed or eavesdropped upon and it’s in our best interest to enhance our security and privacy as well as possible. The fact is that Apple, Microsoft and Google will always have issues with their software and should never make statements that make them seem hypocritical.
 
 

 

Wednesday, March 20, 2013

BlackBerry not safe enough for British government security agency.


BlackBerry’s new BB10 software has been rejected by a British government’s Communications Electronics Security Group (CESG) as not secure enough for sensitive government work. The most recent version of BlackBerry software (version 7.1) passed the rigorous CESG guidelines up to ‘restricted’ status which is two levels below ‘secret.’ While they have negated the use of the BB10 software for now, their decision could change to approve the new platform in the future.
The UK Company’s decision comes despite BlackBerry’s efforts to add new security measures like ‘Balance’ which partitions work, personal data, and applications that lets users carry out encrypted communications. Balance has won over US and German government agencies recently but this deferral from the UK agency could put a snag in BlackBerry’s future.
In response to this BlackBerry stated,” We have a long established relationship with the CESG and we remain the only mobile solution approved for use at ‘Restricted’ when configured in accordance with the CESG guidelines. “

BlackBerry has confirmed the CESG’s decision but has not offered a revision date for software compliance. In a statement to The Guardian, BlackBerry did say, “We are continuing to work closely with CESG on the approval of BB10 and we’re confident that BlackBerry 10 will only strengthen our position as the mobile solution of choice for the UK Government.”
This is a large blow to a hopeful BlackBerry who is relying on their security based devices to win back government and corporate customers. Apparently the problem is not as much a software issue as much as an process issue. There is a re-structuring of the approval process due to the Government Protective Marking scheme review and the new CESG Commercial Product Assurance scheme which impact the BB10 timeline to receive similar levels of approvals. With any luck the security software will be approved which will them strengthen their position in the mobile solutions market.

Tuesday, March 19, 2013

What is a Firewall and how does it work?


Cisco recently released their 2013 Annual Security report and the numbers are contradictory to what most people think. Cisco found that riskier links were not found on ‘shady’ sites but actually found more often on regular safe-looking sites such as search engines or online shopping sites.  In fact Cisco says that a person is 182 times as likely to download malware on a ‘safe’ site’s advertisements as opposed to a site promoting pornography. 

Have you ever asked yourself, “What prevents malware, viruses, or hackers from accessing my computer or device?” No? Well you are probably thinking about that now, and the answer is a ‘firewall.’ A firewall is a program or device designed to prevent unauthorized access to or from a private network or computer. All information passes through the firewall which examines each piece of data and blocks those that do not meet security criteria. 

There are two kinds of firewalls: Software and Hardware. A software firewall is a program you install on your computer. Software firewalls protect the individual PC it is loaded on. Each PC or laptop should have a software firewall operating on it as a safeguard. It is important for it to be loaded onto a PC because it is a secondary line of defense that protects the PC from malware or viruses that might be on flash drives or files that get thru the hardware firewall via emails.

A hardware firewall is a software driven device that is integrated into the network structure of a coporations' network. It is a physical device that works with your router and is the primary line of defense against invasions. It also gives the IT department the ability to apply restrictions on users to allow or limit access to different software programs, features sets of the software, company servers and limit access to the internet.  
Firewall Diagram
Firewalls use one or more of the following methods to control traffic going in and out of your network:


Packet Filtering: The system filters each packet that enters or leaves the network and will allow or reject it based on the criteria you set for the firewall. This can be difficult to configure and is susceptible to IP spoofing (impersonating another computer system).
Circuit level gateway: This applies security mechanisms for TCP and UDP connections. Once connected packets can be transferred without additional checks.


Proxy Server: A proxy server is an intermediary between clients. Instead of one machine talking to another directly they go through the Proxy (Think of two friends that won’t speak to each other but use you to relay messages). The Proxy can be configured to have firewall capabilities and only allow certain types of traffic to pass. The only downfall is that it may slow network performance by analyzing the traffic.
Web Application: This type of firewall is a software filter that blocks data from within. For instance; Windows 7 and Vista have software firewalls that are built into the operating system. They notify you of malicious sites and downloads.


Stateful Inspection: This compares key parts of each packet to a database of trusted information. Info traveling from the firewall to the outside is monitored for defining characteristics, and then incoming info is compared to these characteristics. If the comparison reasonably matches, the info is allowed through, otherwise it is discarded.
Many firewalls use two or more of these techniques, because of the numerous ways viruses or threats can hack your system. Your firewall is considered a first line of defense in protecting private information. You need a firewall because once you are online your computer is continuously connected to the internet and identified by your IP address. It’s potentially visible to anyone on the network and malicious users may be able to gain access to it. There are many firewall options available to you so be sure to find out which one is best suited for your needs. Firewalls are a cheap way of ensuring security on your network and continuous access to the internet. Without such devices our networks would be highly susceptible to hacks and viruses, leading us to buy new systems altogether.

Thursday, March 14, 2013

How to sell in 2013.


The recession hasn't left us just yet. It's on the way but we still have hurdles to bypass and sales goals to meet. With the advent of new technology and social media, clients have become more savvy and resourceful. Demonstrations and presentations are still prevalent but selling has become more sophisticated and challenging. Here are some ways to you can evolve your methods for 2013 and beyond.

1. Transitioning

In this connected online world, people expect results fast. It's time to expedite your implementation process. Whether that means processing orders faster or running a quick and smooth installation, you have to show your clients that you can efficiently take orders and implement them without hassle. This compels people to buy faster and with more confidence.

2. Sympathize with their Business model.

They want to hear how your product can positively impact their business. Clients get enough salespeople clogging their phone lines with pitches but do you really understand how your product can help them? Sure you want to make a sale and think your product is beneficial, but clients can find that anywhere these days. A sales pro needs to research the company and provide specific examples of how their product can save time, money and make the end users’ work day more efficient through your product. You shouldn't try to sell to a company if you don't know what they do or who they are, it’s just ignorant.


4. Be honest

Clients don't want to talk to a stranger who is trying to sell them something. They view you as a used car salesman, but instead of them coming to you (most of the time) you are calling them. Instead of offering your pitch from the get go give them the truth. Ask if they have a minute to speak, tell them this is a sales call and let them know you aren't trying to waste their time. They will respect your honesty and give you the same back. Being honest is a sure sign that you are a professional that understands the clients’ schedule. At the end of your introduction tell the client you don't want to waste anyone’s time calling every so often; you should ask for an appointment. If they say no then you don't have to waste your time leaving unanswered voicemails. If they say yes you have made a good impression. If they are finicky (or don't know a good time) tell them when you have available and respectfully ask for an opportunity to further the solution process. Any way you do this, you will have a definite answer and will be able to spend your time doing more productive activities.

5. Be Consistent and Smart

Many of us call over and over once we have had the introduction and then never hear from the client again. Stop doing that. Consistency in sales means you are utilizing all the facets of communication to keep your company fresh in the mind of the client. You have multiple communication tools within your reach like voicemail, email, texting, video calls, social media connections and (if you still have one) fax. Be persistent in your communications but don’t beat the horse to death. Social media has become a default requirement in the sales world. Be inventive in your means of communicating with your clients.

6. Be genuine and show it through content.

Attempts at mixing friendships with selling may fall flat. A salesperson who genuinely listens to their clients will win more business than those who hear but keep to their sales pitch. When contacting them you can add content about yourself by giving them your blog address, newsletter or social media sites. Companies appreciate the value of providing helpful content to potential buyers.

These are just some of the advances the modern salesperson could benefit from. There are plenty more ways to enhance your methods and strategies. The main point of this list is to let the sales rep know to be faster, intuitive, caring, honest, creative and consistent if they want to survive in this new world of social media and technology. Times are changing and sales must adapt with them. The more adept you become at these characteristics the better your relationships with your clients will be.

Wednesday, March 13, 2013

BlackBerry Success has not been Confirmed just yet.



Blackberry has followed a detoured road to its recovery, which may disrupt their plans for bouncing back into the market. It seems their goal isn’t to catch up with iOS and Android but to survive to fight another round. International sales are supposedly doing well but the US market hasn’t been hit yet. The Z10 is set to come out on March 2 and the Q10 a couple of months later. Amidst their own statements of smashing sales records we still don’t know official numbers until they report 4th Quarter results on March 28th.

What it really boils down to is perception and interest. Blackberry is no longer clamoring solely to businesses; it is individual consumers who hold the majority of buying decisions. With this in mind, people are skeptical of Blackberry due to poor performances of the past. They needed to revitalize their company, their brand and their image in the public eye. Kevin Burden, an analyst at Strategy Analytics says, “Unfortunately, BlackBerry has gone a great number of years where users have built their own perceptions of what BlackBerry is, and in many cases it’s a negative connotation...” 

The end of March/beginning of April will tell us whether BlackBerry has failed, maintained its survival or brought itself back to its once honored position in the smartphone market. Their products are on par with other smartphones and operating systems, but that may not be enough. Their delays and prior damaged image may halt their growth or lead to their demise. They are seeing an intense rise for pre-orders but growth from rock-bottom isn’t saying much. This is the time to prove their worth. So far things look positive but there are a lot of relationships that still need mending, will Blackberry be there to answer the bell for the next round?


Thursday, March 7, 2013

The Pros and Cons of Telecommuting.





With advancements in technology we have seen business morph from usual work practices into something more relaxed and productive. Telecommuting has become a luxury that has its pros and cons and now with its wide use, companies are starting to see drawbacks of not having employees in the office every day.

In some cases telecommuting increases productivity, enhances retention and is environmentally friendly. In addition it saves workers money and commuting time. It can eliminate gender gaps in the workplace, allowing mothers to care for their children while working from home.  A telecommuter may work harder and longer with this work-life balance, and gain confidence in their abilities. It gives employees the opportunity to work, outside of the coventional 9 to 5 day.

With any luxury there are also downfalls and negative aspects. Telecommuting can expand hours, may increase work-family conflicts, raise expectations of work tasks into home time, decrease management control of work being done and increase the potential for abuse. It can seem like an efficient and friendly work environment but with constant lack of supervision employees may lose direction. In person employee interaction also fosters collaboration and encourages better performance through expectation. Reluctance to allow telecommuting stems from management not wanting to lose control over their employees work, fear of employees slacking off and bitterness toward management due to the absence of human interaction.  

Yahoo and Best Buy have recently ended their open policies of telecommuting for many of these reasons. Apparently their procedures had spun out of control and required cutbacks in this area. Both companies are facing hard times and are re-evaluating the efficiency of some of their programs. While they may still allow telecommuting, barriers have now been established that rely on management to make the decision of its necessity. It may prove difficult to turn your company around when employees aren’t in the office.

A Census Bureau report recently released showed that 13 million people (up from 9 million in 2010) work from home at least one day a week.  Many companies are asking if it’s worth it. Telecommuting definitely provides a friendly and flexible work environment but, there is worry that work is not getting done efficiently and that people are abusing their privileges. Working from home poses a question though; if there are no extenuating circumstances why aren’t you in the office? If you’ve broken your leg you should be allowed to work from home, but feeling lazy, tired or hung-over aren't really reasons to work from home. Telecommuting is here to stay but it is no longer a luxury and needs to have more regulations surrounding it. Careful monitoring of the work-life balance will help management and employees understand the pros and cons of telecommuting and should increase morale and productivity.

Wednesday, March 6, 2013

What is the controversy over unlocked phones? Why it should be consumer choice and not mandated through government policy.


There has been some controversy over the issue of ‘locked’ versus ‘unlocked’ phones. A recent revision by the Librarian of Congress to the Digital Millennium Copyright Act (DMCA) which criminalizes sharing of copyrighted materials has made it illegal to unlock phones (in most circumstances) from service providers. This resulted in a petition to the White House to review and coerce the Librarian of Congress to rescind the ruling and make the act of ‘unlocking phones’ legal.  The White House and the FCC have separately commissioned statements to the Librarian of Congress in agreement with petitioner’s that unlocking phones should be consumer choice and made legal.

The Digital Millennium Copyright Act was established in 1998 and made it illegal to use or develop software that shared copyrighted material for free. Among others, Napster spawned the development of this act.  Decreased profits and computer piracy created the need to address rules and regulations regarding copyright infringement. In October of 2012 the Librarian of Congress decided the ‘unlocking of phones’ would be removed from the exceptions to the DMCA and now consumers are required to gain carrier permission to unlock their phones or face large penalties and cancellation fees.

This deters customer choice and lowers resale value for devices that consumers paid for. Besides affecting the consumer ability to switch plans during a contract, it also impedes international travelers who would be able to switch services for lower rates when traveling. A petition regarding the changes to the DMCA were submitted to WhiteHouse.org.  The White House is in favor of the petition and extended the requirements to all mobile devices including Tablets. The FCC backed up this statement by saying they should look into this matter personally and that it, “raises serious competition and innovation concerns, and for wireless consumers, it doesn’t pass the common sense test.” (Julius Genachowski, FCC Chairman).
These statements spurred a defensive memo by the Library of Congress stating its process of determining the exception and that it would stick to its ruling. This is due to the fact that service providers offer options for unlocked(ing) phones like when buying direct from the manufacturer or when your contract has expired. Service providers offer unlocking policies but do not grant consumers full control over their phone options.

What does this mean for the Telecommunications industry? It means that resale of used or refurbished mobile devices will have a greatly reduced market.  Consumers will only be able to buy phones that work with their service providers’ network. Someone  trying to resell iPhones from a company that bought them directly through Sprint, will not be able to resell them to another company that uses Verizon. A consumer that bought an iPhone through AT&T but found a better plan through Sprint, will not be able to switch without paying exorbitant fees and penalties.

The positive responses from the White House and FCC may potentially lead to legislative fixes and possibly persuade the Library of Congress to rescind their decision. Addressing the issue may take more time in reviewing the DMCA policy. Nothing should prevent the choice to switch carriers and even though service providers give consumers options, the impediments of the DMCA ruling are intrusive on our rights. The petition and statements from government agencies are the beginning steps towards reforming the Library of Congress decision and hopefully we will see a position change in the near future.

What is an Unlocked phone vs a locked phone?



There has been a lot of talk lately about issues concerning locked and unlocked mobile devices. So we decided to do a little research and explain what an unlocked phone is. It is a phone that can be used with a SIM card from any network provider. A SIM card is in most mobile phones and identifies a phones’ number/ contact data and are used in phones on a network that utilizes Global Systems for Mobile communications (GSM). Most service companies install ‘locking software’ on their phones that prevents the phone from being used with any other networks’ SIM card. Consumers can request their phones to be unlocked so they can use them on other networks but this can violate the service contract.
Locked phones are typically sold to the carrier (by the Mfr) and are coded to only accept SIM cards from that specific company. If you were to end your contract with your service provider early (to switch to a better data plan) your new service providers’ SIM card would not work with your phone because it was sold and coded specifically for that company. You would have to persuade your old service provider to unlock your phone or just simply buy a new phone with the new provider. Locked phones keep mobile providers from losing money with consumers who buy a phone with a provider for a discount and then turn around and activate the phone on another network for a better rate.

Unlocking your phone can be done by your current mobile provider as long as there is no longer a contract tied to the provider. An unlocked phone gives you the choice of any service provider and increases your phones worth for resale.

What does an unlocked smartphone mean to you? It means you can buy any phone from anywhere and activate service from your choice of carriers. There is a catch to this; if you already bought your phone at the carriers discount (instead of paying $800 for a phone directly from the manufacturer) then you have to abide by the contract and will be at the mercy of your provider if you want to unlock your phone and switch to another service. There has been some debate on the legality of locked phones and public petitioners and a few government agencies have backed the thought that it should be the consumers choice whether to switch carriers. Details are covered in this story: