Dec 15

Nearly one-third SMEs don’t emphasize on data secure backup

According to the survey conducted by the Internet and Mobile Security Organization AVGTechnologies, most companies hadn’t noted real value of their data. The result of the test showed that 37% of small business manager spent more time on tidying up desks and ordering new business cards rather than doing backup for data. This survey was give to 500 U.S. small businesses managers, and the result showed that although most (75%) businesses relied on automatic backup system, about a quarter (24%) of businesses didn’t require employees to back up data at least every week. However, 30% of respondents thought that more than half of their data were critical data.

 

Given that small business claimed that more than half of the data were sensitive data, the loss of employees’ mobile devices should attract more attention. In fact, about half of small businesses said they had experienced the loss of mobile devices. Interestingly, the survey showed that many small businesses management staff didn’t think employees’ mobile devices contained a lot of sensitive data. They cared more about the security of data transferred to cloud. When asked about cloud-based backup, 64% of small and middle enterprise said security was the issue they cared about most.

 

And the results of the survey can be concluded as below:

 

1. Compared with backup data in UK (22%) and US (21%), a substantial proportion of small and middle businesses often spend more time on tidying up desks and ordering new business cards, which is not even the most conventional computer-related work. 43% of UL companies and 53% of US companies said they spent more time changing passwords.

 

2. When it comes to cloud backup, security is still a most concerned issue. Other key issues include the cost, data recovery and lack of control.

 

3. Most small businesses have not experienced mobile device data loss, but they are approaching (51% in UK, 53% in US).

 

4. Most SMEs (62% in UK, 66% in United States) are confident that they can prevent data loss when employees leave the company.

 

5. Most small businesses (59% in UK, 54% in the US) still don’t require employees to back up daily. A considerable number of backup data (68% UK, 75% of the United States) is operated by IT automation systems.

 

6. When it comes to mobile device data, only 1-10% of employees of about one-third of SMEs (32% in UK, 34% in the US) go out of office at least once a week. On the other hand, mobile devices are increasingly used to work, and only a small number of companies said 80% -100% of their staff go out of office one day a week.

 

7. When the device is lost or stolen, 39% of UK businesses and 41% of US companies priority is to ensure that data cannot be viewed by an unauthorized third party. That’s why you need to protect files in drive with password and configure different users’ permission to content in the drive.

Aug 25

Top 10 Security Issues Revealed in 2014 Blackhat Conference (2)

6. Insecure family router

In-Q-Tel’s CISO (Chief Information Security Officer) Dan Geer said in hacker conference that the home router was most likely to be invaded. These routers could be easily found through a network scan, which usually contained the default login information, and most people never thought of upgrading their router firmware to the latest version. Perhaps in 2014 family network security will be a hotspot for hacker attack.

7. NAS with numerous loopholes

Storage devices connected to the network even have more loopholes. A security analyst at an Independent Security Evaluators agency Jacob Holcomn said the topic at this year’s hacker conference theme is NAS network storage.

He said there’s no one device that he cannot get, at least half of the device he could intrude without authentication. Through invading NAV devices, attackers could hijack other devices’ traffic on the same network, using the sniffing technology similar to ARP. “Jacob Holcomb said in a hacker conference.

More alarming is that, loopholes Jacob Holcomb showed in hacker conference had been submitted to the NAS manufacturers, but these loopholes had not been fixed yet. And the NAS patches usually take a few months to reach users.

8. Network management procedure

Do you remember Carrier IQ that develops smart phone hidden tracking program and the chaos caused by it? In fact the original intention of this phone app was just monitoring the phone flow, and it’s just a network performance diagnose tool. However, phones that install this diagnostic tool are vulnerable to attacks. Just like Mathew Solnik and Marc Blanchou from said in hacker conference, this vulnerability could be used to execute remote code, and bypass the local protection mechanism of operating system.

The researchers said that about 70% to 90% of mobile phones sold worldwide were equipped with device management program. Some other devices, such as notebook computers, wireless devices and networking equipment hotspots, etc., were facing risks from the “Open Mobile Alliance Device Management Protocol” (OMA-DM) contained loopholes.

9. Cheap picklock

Qualsy company’s researchers Silvio Cesare demonstrated how to use cheap and easy to get components to patchwork a tool, and then use it to get a car with smart system.

Cesare said this tool can be used to open the car door, and opened the trunk. But it takes implementers 2 hours to stay in the vicinity of the car, so now the car thieves still not abandon the rowbar and turn to computers.

10. Invade Hotel

The loophole mentioned by Security consultant Jesus Molina in hacker conference is more practical. Molina had lived in five-star hotels St. Regis Shenzhen, China Shenzhen, at that time Molina cracked iPad app “ digital butler” the hotel offered for customers through reverse engineering and used protocol vulnerabilities in KNX / IP router successfully control the hall way lights. In addition to lighting, television, temperature, music in room, and even the window-blinds in more than 200 rooms in the hotel were all in control. More exaggerated, the hacker who controlled all of this even had no need stay in China.

If you need more information about individual data protection and enterprise file management, you can visit Kakasoft.

Nov 19

Master Data Leak Proof Initiative with Encryption Software

Security has always been a relative concept, data security is the same. Even though it is a relative concept, it doesn’t mean that it is not important. Data security is absolutely safe, but the secure level user can select is relative.

“Users should be free to choose secure level they need. Some users may need more Internet information exchanges, their required safety level might be a little lower, a number of special populations such as children, and they need higher secure level.

But some people who are used to use network security, data security programs for free make themselves be tied up with many software ads packages when they enjoy the free service. Such kind of security program is free, while it will grasp user’s mind and decide users secure level when they choose this free program. This is equal to give the autonomy of data secure to others, or it’s just the reason why data leakage happens so frequently.  

Currently, people are paying more and more attention to information security and personal privacy. People are gradually willing to grasp the autonomy of data leak proof, but don’t want to be controlled by others.

How can we get back our autonomy of data leak proof? Where shall we begin? The answer is the data itself, as long as you control the data itself, which is as the main body of information security, once the data has been controlled, and then the information security initiative naturally will be returned to your hands.

So what if you control data itself or ensure the security of the data itself? That is file encryption software. Choose trustworthy encryption software, use its technology to automatically choose data protection method, once you do so, you get the data defense initiative for your own data, even though you want to use other programs to further enhance the security, as long as you control the data, the data leak proof initiative is still in your hands.

Multi-mode encryption is a kind of transparent data encryption technology that can offer a variety of usage scenarios and adopt a variety of encryption strategies. In multi-mode encryption mode, the user creating secret files ways include both active and passive methods, which contains at least the following modes: specific format encryption mode, specific directory encryption mode, specific format unencryption mode, specific user unencryption mode(able to modify and check other’s secret files), particular user unencrypted mode (able to view but can’t modify other’s files), USB flash drives and other external hard drive encryption mode , Network Neighborhood network encryption mode, manual encryption, full disk encryption, etc.; these encryption modes can be assigned to different users or user groups .

This flexible encryption technology that can be selected according to the user’s own requirements just meets people’s desire for the right of choice, so that people can master data security and information security initiative.

Oct 09

The Ban on Samsung Smartphone Import Is in Effect

According to the news, the U.S. Trade Representative’s office (USTR) said on Thursday that the ban on importing Samsung smartphones proposed by U.S. International Trade Commission (hereinafter referred to as “ITC”) will come into effect.

The earlier report said that owing to the absence of a veto by the United States President Barack Obama, the ban on imports of Samsung smartphones ruled by ITC is already in force.

However, the ITC’s ruling has to be handed over to U.S. President Barack Obama for considering, Obama has 60 days to give the final result of this ruling. If Obama does not veto the ITC ruling, the ruling will come into effect. Several media reports said, now 60 days time has passed, and Obama did not veto the decision.

ITC’s decision does not clearly indicate which devices of Samsung infringe, but has been determined that, Galaxy S 4G, Fascinate and Galaxy Tab these old models are infringing.

In sharp contrast, Apple has had a similar experience, but the result was the opposite. In June this year, ITC has ruled that some old products of Apple has infringed the patent of data transferring of Samsung’s products and ban the import or sale of AT & T version of the iPhone 4, iPhone 3GS, iPad (3G version) and iPad2 (3G version). But in August this year, the Obama government has rejected ITC’s ruling.

Nowadays, innovations in the field of IT usually rely on many small improvements involving numerous technologies, which means the patent is not always clear precisely. The open secret is that everyone infringes others’ patents in some way.

The battles of patent between companies are continuing, the fights of copyright are also continuous. If you operate a business and your company specializes in selling created videos or documents to customers, most companies tend to store the videos or documents into a USB and sell this USB to customers, but what can you do to protect your copyright from being breached by others? Here, I recommend you to use USB encryption solution to ensure the contents in your USBs will not be copied or transmitted by unauthorized users. You can use USB copy protection program to password protect the USB and configure access permissions to specific groups or individuals to allow them to access the contents in it and prevent other unauthorized access at the same time. Complete protection is the indispensable measure to ensure the security of companies’ wealth and inventions.

May 06

Google Glass Is Coming

Google glasses are coming into being! Wearable device, visual search, smart assistant, all of these concepts is abstract for ordinary people. We are still confused and wonder that what on earth can we do wearing Google glasses?

 

Google glasses has been known weigh 5 ounces which is more than 150 grams, while weight of normal spectacles frames are generally not more than 30 grams, and the lightest is only 8-9 grams. The weight of overall glasses are generally less than 100 grams, the lightest is less than 30 grams. Theoretically, the optimization of Google glasses weight won’t be less than normal glasses, for apart from glasses, there are several components such as chip and camera, etc.

 

Google glasses are completely integrated with Google server. As for the third-part application  developers, they can only utilize Mirror API for development. If you were Twitter, you can create a card which can be launched through voice recognition function to tweet a new card. However, all the data and information must be tweeted to Google server by Twitter first, and then Google will tweet them to Google glasses. Of course, when you enjoy the fun brought by Google Glass, what you should take notice every moment that your information and data are at risks of being stolen and missing. Password protect files stored in your portable devices.

 

This is a flexible and firmly controlled system by which you can tweet anything into your glasses card, such as a website or an IOS application. On the other side, Google thoroughly control every service to directly communicate with glass system. For example, there is no way to close the share system of glass, you don’t have systematic sharing method. On the one side, this way will enable Google to firmly control glasses applications. On the other side, this can ensure the system won’t use too much power owing to applications.

 

Nowadays, Google concentrates on making Mirror API and sharing system more effective, and the developers will gain ADB permissions as using Android.

 

For the time being, Google Glass is a smart phone companion, basic communication, input and output, etc. are still rely on smart phone. Google Glass, it along with cell phone makes our live richer. If Google Glass develops gradually to tackle the problems such as input and output, it will be a competitor against cell phone. At this stage, Google Glass and cell phone are in coordination. Google Glass will force cell phone to produce more applications to assist it, such as My Glass. For cell phone, it can also utilize the functions of Google Glass such as camera feature, interaction between visual search and eyes dominate, etc. which are portable and unique to innovate new applications for it.

 

Google Glass show us a new era where human beings make a further development between ideal and reality. The appearance of Google Glass makes more opportunities to connect people all around the world. You can express yourself as well as learn others with it.

Apr 22

A Ban is Not a Proper Solution to USB Leakage

Since April, 2011, Wikileaks has published hundreds of thousands of military documents about the wars in Iraq and Afghanistan. After a investigation by U.S. military, the leakage of these files are caused by the leakage of USB flash disk of former U.S. intelligence analyst in Iraq.

According to CNN reported on Dec.13, 2011, since there was no better leak prevention techniques, the commander of U.S. air force network division, Richard webb major general would publish network control orders that the army should be forbidden to use USB removable storage media ,offenders would be court-martialed. It’s reported the other services also received a similar command, it’s also said that this action the army took aimed at preventing the recurrence of military secrets by websites such as Wikileaks. In fact, as early as the end of 2008, in order to prevent the spread of the virus, the U.S. had banned removable storage media, as the ban had brought a lot of troubles to the military data transmission, in February 2010, the ban was canceled, then resulting in a lot of confidential documents by Wikileaks, in this situation, American army had to ordered the army to ban the use of portable storage media once again.

In information age, removable storage devices have become an indispensable part of people’s life.USB flash devices, as one of the most convenient storage tools, have played an important role in people’s life, study and work. Perhaps it’s the excessive dependence that makes USB flash devices a way of data leakage. However, the action of forbidding the use of USB flash devices, alone, is not enough.

As for how to solve the problem of data leakage, we should change the thinking way. Since USB devices have become our necessities, that what we should do is how to use anti-leakage technology to prevent the problem happening, rather than banning the use of USB devices to block the way of transmission of information. That’s to say, what we shall consider is how to use USB flash drive encryption to protect USB disk security.

Nowadays, many people have been aware of the problem of data leakage, and some solutions have accordingly come into being to tackle it, such as USB security software.

U.S. army told us that the information security should avoid the misunderstanding of heavy technology, light management, and build a solid defensive line by strengthening the management of information security on the basis of necessary technical measures. In addition, notice to enhance education of information security for personnel to improve the awareness of information security.

Mar 15

Samsung Galaxy S4 Finally Comes out and Within Reach of People

For years, in the market of smartphone, Apple and Samsung have been competing with each other for the market share. Ever since the release of Galaxy S3, Samsung has made Android phone more adorable than any other phone could. On March 15, 2013, Radio City Hall was filled with people, at the same time at the heart of New York City in Times Square an even larger crowd waiting there. At the beginning of the release conference, a piece of video which is about the company’s Unpacked Event campaign, and people are wondering about what it is in the little boy’s box.

Samsung made a perfect secret keeping job before the real release of Galaxy S4, so that it left much more space for all kinds of guesses and rumors and made it the most awaited phone of Samsung. Recently, with the popularity of all kinds of smartphones, tablets and ultrabooks, people enjoy more freedom in data on the removable devices, while USB security issues or folder protection case becomes more and more important at the same time.

Finally, when the box was opened and all guesses and anticipated come into the eye of all people. It is proved that Samsung S4 deserves a highly praise whit its strong and powerful hardware and featured new features. It sports a larger 5-inch 1080p Full HD Super AMOLED display and come with a much smaller bezel, has 441 ppi. Other specs include a 13MP rear-facing camera and 2MP for front camera, 2600mh battery and thinner body.

Apart for the improved hardware, the highlighted features of S4 lie in the brand new updated user experience. Sound Shot, Drama Shot, Eraser, Air Views, S Translate, Adapt Display, Story Album, Home Sync, S Voice Drive, Smart Switch, Group Play, Air Gesture and other special features make Galaxy S4 a perfect smartphone also brings people more convenience in use.  There are more chance for people to access the digital files on phone or computer, which also pose your files and folders to dangers and risks of data leakage, therefore, you need to lock files on your smartphone or PC.

Also, some people think that S4 is much like the previous S3 in appearance. There are a large amount of people talking about the disappointment about the new Samsung phone. But there are still space for improvement. We cannot deny that the development of technology keeps presenting surprise and changes to people’s life, from the original computers, phones to the recent advanced software and apps, such as USB flash drive copy protection application. Maybe this time you are not so satisfied with a single technology, more or less time will tell you about the reality. We can just anticipate for the next new product or new invention to enter our life.

Mar 13

How to deal with password leakage and breach in the current world?

The revealing of one of the Weird’s reporter’s most precious password was hacked by complex social exploits and t soon arouse people’s attention for the possibility of breach of their password for important accounts. Passwords are confidential personal information needs people’s special attention and it equals the urgency of USB security and folder encryption for files with valuable data on USB drive disks or a computer.

In June of 2012, hackers breached 6.5 million LinkedIn passwords and revealed them on a website, which surprised the ordinary users and made people realized that some sites that they usually visit with simple password may pose their information in danger. Some people also think that some sites should take higher level of security protection for their account and data. Although people find many problems about the current password and authentication system, there is no a better one can replace it in the current platform of Internet.

It is said that Google is working on find a substitution for password may be a USB device or a piece of jewelry. Till now this is just a concept that hasn’t turned into reality, so we cannot count on this completely new technology to save us out of the trouble now. Some people with confidential information or files still use password to protect folder on their computer or secure USB drive with USB security applications, but for these protecting methods, passwords is a must.  

There is still a little hope for ordinary people to fight with hackers and other cyber- criminals on the Internet and prevent them from getting your account and password easily. That is people need to make their password stronger, for example choose both numbers and characters and a proper length for your password, or abandon specific words or names in the password will increase the security strength more or less.  

There are more things to do if you want to password protect USB drive or other important files. For all people live in the digital world, they encounter passwords in all webs and social networking sites. Hackers may aim at the weak password, but the root of the problem is people attention and minding of the password as well as the information. As long as people concentrate and care about their password they can protect their data better.

Mar 07

Microsoft: who is peeping on users’ privacy in e-mails?

According to the report of some international media, that “Scroogled” campaign, which is advocated by Microsoft has moved on from sniping at Google Shopping to charge Gmail with invading its users’ privacy for it peeps e-mail for keywords that can be used for advertising purpose. It is said that Microsoft is planning to cease this campaign, but Microsoft said to Businessinsider that they will proceed on this campaign as long as Google peeps on users’ privacy.

Data protection and privacy security has long been a focused topic for people all around the world, if you think you lock file and folder on your computer with data security program is enough to safeguard your personal information, you are totally wrong. Files and documents in computer may have some of your information, however, how about the online world? People send and receive e-mails on the Internet from time to time, and they shop online and pay bills online too. Therefore these activities pose yourself to the danger and threat which may result in data leakage of your privacy and other information.

When Microsoft found that Google scan users’ Gmail and send them targeted advertise, they encourage users to abandon their Gmail accounts and take up accounts in Outlook.com which belongs to Microsoft in the first round of Scroogled campaign.  And then in the second Scroogled campaign which is advocated in the November of 2012, Microsoft built Scroogled.com and criticized Google adwords.

Privacy protection contains many contents such as USB copy protection and many other aspects, and people care about these topics very much. It is said that Microsoft will end their activity which aims at Google by changing the way used. They will give up using advertise to impact, while about the new measures and policies which they still keep in secret. But one thing can be sure is that no matter what measure Microsoft take to object Google, there is too soon to declare the end of it.

Actually, Microsoft also scans users’ emails in their Outlook mail service, but they said that they doing this just for the sake of preventing the invasion of spam and malware. It is hard to tell who people should believe and blame about the two giants. People need to pay attention for their privacy and protect personal information, or one day they may fall into endless trouble.

 

Mar 04

IT Security Problems Come from Internal Professionals

There are so many kinds of security dangers that threat the operation and protection of confidential information in a company or the enterprise. Hackers and phishers are not rare on the internet anymore and they plan attacks on website and servers all around the world. From time to time, USB security issue, leakage of personal information and other data breach from computer system of the company is worrying and drawing more attention from the public.

People who are very familiar with the inside operation and mechanism of a business is the biggest potential of data leakage and insider cracker for the whole company. Today, more and more people depend on online transaction and data exchange, which requires online account information very often for the whole business. And once these data fallen into the wrong hand, the coming consequence or loss is irrevocable.

Online privacy now is a vital concern for all people who use computer and rely on Internet to fulfill the need of data exchange. It is common that when people store some of the important files and folders on computer and usually they lock file and folder up to prevent the potential data breach and data leakage. While, this protective measure will not go for the business which contains many independent users.

The increasing number of identity theft posses more need and urgency for data protection for the data management of company. While, one thing for sure is that, the crime rate related to data protection inside the business gradually has a tendency of growing in recent years. The online world seems free and flexible, while there are also traps or even threats that hinder the integrity of people’s privacy, such as some targeted content or advertisement. For a browser, the inside plug-ins can track all activities of the user and send you ads and spam according to the account information and your surfing record.

It is reported that most of the data leakage related to personal information are come from the inside of the business or institution. Therefore, the situation is more serious for security professionals than normal attacks from online hackers and malware. In order to protect privacy and personal information from illegal breach and malicious attempt, people have to pay close attention on USB copy protection and file protection on computer or any other device.

There is no doubt that some big enterprises are gradually collecting information about their customers, in the online world, dangers and threats can be found everywhere. Most people haven’t realized the problem or they just have no choice to become the current situation for the Internet world.