Communication gap indentified between IT and management

Bad news is filtered out of communicaiton to the C-suite and 63 percent of IT staff only start talking after a breach has taken place.

Research from the Ponemon Institute claims to show that IT staff from more than half of businesses (51 percent) filter out any negative facts before reporting security risks to their C-level (CEO, CFO etc) bosses.

According to the independent report - entitled `Security Metrics to Manage Change: Which Matter, Which Can Be Measured,' sponsored by FireMon - 71 percent of respondents to the survey said that communication occurs at too low a level - or only when a security incident has already occurred (63 percent).

The report took in responses from 597 people working in the IT, IT security, compliance and risk management divisions of major companies.

The survey found that a security posture perception gap places organisations at risk - with just 13 percent of respondents rating the security posture of their organisation as very strong. Against this, 33 percent of respondents said that their CEO and board believe their organisation has a very strong security posture.

The Ponemon report concludes that this gap reveals the problems the security function has when it comes to accurately communicating the true state of security.

It was with this in mind that we caught up with Jody Brazil, CTO of FireMon, whose idea the report was - and we asked him what the key takeouts from the analysis were for him.

The real crux of the issue, he said, is the cost challenge in most large organisations, as most major businesses do not want to pay the real cost of `security insurance' in the shape of effective security defences.

Then there is the disconnect between different people in a typical organisation, he added, noting that the technical team often does not have the language to talk to other disciplines in the company. It is, he explained, a tough challenge.

Phil Turtle, a Master Practitioner in NLP (Neuro Linguistic Programming - defined as a language-based and behavioural approach to management) said that most people intuitively filter out any negative issues before relaying any information to their C-level managers, due to the `culture of fear' that exists in most businesses.

"Coupled with the fact that IT people are not very good at communicating to C-Level management what needs to be done, and it's clear that there is a communication gulf in play here," he said.

"The real issue here is that IT professionals only rarely have the skills needed to explain their information in a format suitable for C-Level managers to understand the nature of the problem. This means that the C-Level professional does not really understand the nature of the security problem," he added.

Professor John Walker of the Nottingham-Trent University School of Science and Technology agreed that the communications gulf challenge exists, saying he has seen it at many different companies where he has worked as a security consultant.

"It comes down the fact that people tend to be more worried about their bonuses than actively communicating the scale of the problem to their managers. The solution needs to come from the board itself, and foster a better understanding the challenges the IT security department faces on a day-to-day basis," he said.

Kevin Bailey, head of market strategy with Clearswift, said that the need to provide the reality of an organisation's security risk profile has to be consistent and in real-time.

"Companies do not expect the resolution to a malware or APT attack to be dealt with as a tick box exercise once other tasks are completed or wait for their finance teams to tell them that they have made a loss during the financial year the day before they post their fiscal results, so why should their security risk be left as 'other business' on senior management agenda items?" he said.

Bailey - a former IDC Research Director - went on to say that organisations need to revisit their investment strategies when allocating budgets, to ensure that they appreciate the tools that can provide early visibility - and resolution - to potential concerns that could severely damage the financial and reputational aspects of the company.

"Think about an organisation which has closed its eyes to social media and continued to rely on email to reach its market - by the time it acknowledged its mistake, the competition had already swarmed the prospect base, creating the need to invest heavily to catch up," he said.

"This is no different to becoming pro-actively aware of their security risk profile, if they don't do it now, the costs in financial and resources will become too steep to maintain the balance between company growth and company security," he explained.



Technology and Smiles: Brooklyn Bakery Brings In the Dough With iPad POS and Analytics

New York City is filled with all kinds of neat bakeries and little shops to please your palette.

What separates those who succeed and those who don’t succeed are two things. First, an executive and team who has the vision and passion to make a great product and treat customers well. Second, is the strategic use of technology to boost efficiency, save money and ensure overall business operations are humming along effectively.

I took a visit to Brooklyn and visited with the team at One Girl Cookies. Check out our video interview here or further below.

When Joel Branson, a manager, started working at One Girl Cookies they were using old school cash registers. Joel knew that if he was going to take the company to the next level he needed technology that could help him mange One Girl Cookies locations from anywhere - not just in the store.

Joel was looking for a solution to give him analytics and intelligence about what the numbers MEANT - such as how were sales this quarter compared to last quarter or what baked goods are most profitable during the day and which ones are better at night and all sorts of other intelligence.

In his search for a solution, he found Shop Keep POS an iPad based point of sale system all manged online - no software to install.

Using Shop Keep Joel could now know, how many staff he should have in the store at certain times, how many customers could he expect on the weekends, which products were most profitable and other data points to help him drive more revenue and lower costs.

For example, during Valentines day Joel’s point of sale analytics enabled him to sell out of all of his Valentines Day inventory - this is every retailer’s dream. Joel used very granular analytics to make an educated estimation of how to best prepare his store for the holidays - which basked items to have and which ones to NOT have.

While other retailers might have to GUESS in how to run their store - and waste time and money - One Girl Cookies efficient use of technology is making them a well run operation.

The Shop Keep point of sales system is not the only tool in One Girl Cookies tool kit. Joel explained how they use Evernote to closely communicate with other managers.  The store also uses Sonos speakers to remotely control their customer entertainment from an iPhone :)

Beyond technology, another lesson I learned while looking at One Girl Cookies is that not only does their store look great inside (well designed) but their web site is a delicious manifestation of One Girl Cookies attention to detail as well. (10WebSiteMusts.com is a great resource)

Finally their cookies and cupcakes taste great (make sure your product or service are awesome) and their customer service is simply splendid.

What does every retailer need to succeed

  • Great product
  • Great location
  • Great customer service
  • Great employees
  • Great management with vision
  • Awesome use of technology

PS - check out this image from ShopKeep which shows a sample screen of their analytics. Not only are analytics important for social media they’re also VERY important for retailers.



What’s Your Marketing Score? Free Tool To Grade Your Marketing and Get Expert Advice: SmallBizMarketingScore.Com

Online marketing is easy - yet challenging at the same time. It’s pretty easy to create a Facebook page, but having profitable business success through that Facebook page can be elusive (see The Facebook Guide to Small Business Marketing).

You know you can buy advertising - that’s easy. But how do you ensure the ad is working and generating sales.

Tweeting is pretty easy - but how do you “Tweet” so that it drives online engagement and business results.?

There’s a new free tool from Infusionsoft - the Small Business Sales and Marketing Score Card, which is designed to grade elements of your marketing and give you guidance in what to do better.

The Score Card is based on Infusionsoft’s popular (and free) Lifecycle Marketing process comprised of Attract, Sell and Wow.

Greg Head, Infusionsoft’s chief marketing officer, says the tool helps small business owners overcome the daunting task of creating a powerful sales and marketing strategy. By entering their website URL into the tool, businesses receive a grade on the Attract phase. The Scorecard then guides small business owners through a quick Q&A about the other two areas of Lifecycle Marketing: Sell and Wow. At the end of the test, Infusionsoft will provide free resources to help the small business owner put a sales and marketing plan in place, resulting in immediate, meaningful improvements.



The Sky is the Limit as Google Acquires High Altitude Drone Company

Google has come one step closer to making its balloon-powered Internet initiative, Project Loon, a reality. The tech giant recently acquired Titan Aerospace, a New Mexico-based company that builds drones for high altitudes, the Wall Street Journal reports. Though the price of the acquisition hasn’t been released, Business Insider estimates that it must be higher ...

The post The Sky is the Limit as Google Acquires High Altitude Drone Company appeared first on Small Business Trends.



4 Reasons IBM’s Massive $500 Million Private Cloud Hartford Deal Is Symbolic

IBM recently landed a huge deal - a $500 million, six-year private cloud whopper with insurance colossus, The Hartford. The Hartford will move to a private cloud-based infrastructure on IBM’s PureFlex System. Under the $500 million agreement, IBM will also provide a number of other services related to mainframe, storage, backup and resiliency.

The Hartford will define the services it requires, and IBM will be responsible for the solution and delivery of those services. The partnership supports The Hartford’s strategy to drive profitable growth and increase operational effectiveness as it continues to focus on its property and casualty, group benefits and mutual funds businesses.

Cloud Investment Is A Mandate

As The Hartford continues to execute on its strategic plan, it is making significant technology investments to increase operational effectiveness and improve competitiveness.

The partnership with IBM will help The Hartford implement a strategic technology infrastructure that will provide greater agility and offer more flexibility and transparency as you continue to grow our businesses. This move, by The Hartford, is being mirrored in diverse strategies by enterprises in all industries today.

Businesses Want IT Partners - Not Just Providers

The $500 million directive, according to Philip Guido, general manager, IBM Global Technology Services, North America, is an example of how leading organizations are utilizing cloud technology to gain competitive advantage.

Clients today are looking for IT partners who can understand and help drive their business with a focus on innovation and delivering business outcomes - not just IT efficiency.

Cloud Adoption Is Rising - Fast

A recent IBM study reveals that 66 percent of organizations are using cloud solutions to strengthen the relationship between IT and lines of business - with the majority using cloud to integrate and apply mobile, social, analytics and Big Data technologies.

Businesses of all sizes are moving to the cloud to operate from a platform ideally designed for today’s mobile workforce.

IT Partnerships Create Collaborative Opportunities

As part of the agreement, The Hartford and IBM will also partner on the creation of a joint innovation committee to foster collaboration on strategic initiatives.

The project will leverage the expertise of both firms, market insights and research to build new business models and competitive capabilities that will enhance The Hartford’s ability to anticipate and meet the needs of customers and agents - all thanks to a robust commitment to adopt cloud technologies in one massive sweep.

With more businesses of all sizes researching and adopting cloud technologies to empower business functionality and improve client engagement, a new directive for smart business is rapidly unfolding. . .grow your business with the cloud - or do not grow at all.

IBM Photo via Shutterstock



Spotlight on Righteous Marketing: Dedicated to PPC Campaigns

righteous marketing

This week we shine the spotlight on Righteous Marketing, a niche marketing agency. This Utah-based company was founded in 2010 by Robert Brady (above) and currently has two employees.  Righteous Marketing manages pay-per-click (PPC) marketing campaigns for small businesses to medium sized businesses.

WHAT THE BUSINESS IS KNOWN FOR:  Deep expertise in pay-per-click advertising.

This includes Google AdWords, Bing Ads, Facebook Ads, Twitter Ads, and LinkedIn Advertising.  By focusing obsessively on the pay-per-click niche, the team is able to stay up-to-date on new features, strategies, and best practices. But they also look at the big picture, to make sure pay-per-click ad campaigns work hand in hand with a small business’s other marketing. “We understand how PPC fits in the overall marketing mix and can support other areas such as email marketing, content marketing, SEO, conversion rate optimization and sales. ” Brady adds.

BIGGEST RISK TAKEN IN THE BUSINESS:  Hiring the company’s first employee.

“With employees you need more consistent cash flow as well as cash reserves to ensure you can always make payroll,” Brady explains. Hiring also adds more expense â€" and that puts the company under pressure to bring in more sales. “The worst case scenario would be to add employees just before losing clients and creating a situation where the company doesn’t have the revenue to justify the headcount, leading to layoffs,” Brady says. Fortunately things have worked out well with the hiring of the company’s first employee, however. And Brady says Righteous Marketing  continues to grow.

FIRST MOVE IF THE COMPANY SUDDENLY GOT AN EXTRA $100,000:  Deploy software to automate highly repetitive tasks the team does every day.

“Whether that would entail purchasing a software solution currently on the market or developing our own, that would be my first move,” Brady adds.

After that, attending more conferences for the added networking, visibility and training they provide would come next on the list.

IF THIS BUSINESS WERE A SONG IT WOULD BE:  ”TNT” by Australian heavy metal band AC/DC.

“Because we really are dynamite and are ready to blow up your PPC campaigns!” Brady explains.

FAVORITE QUOTE:  ”I’m kind of a big deal. People know me. My apartment has many leather-bound volumes and smells of rich mahogany.”

The quote is from the movie “Anchorman” starring Will Ferrell.  In one scene, Ferrell’s character TV anchorman Ron Burgundy famously makes that quip  in a comically self-important way. Of course, Brady, a humble likeable man, sees the humor in that quote.

FAVORITE TEAM FOOD: Owner Robert Brady lists Arby’s among his favorite places to eat. He says he knows it’s weird but likes it anyway.  “It’s the combination of seasoned curly fries, Mountain Dew on tap, and roast beef sandwiches,” he explains. Righteous Marketing’s first employee Sam Turner  is a huge fan of the macaroni and cheese from Noodles & Co.

FUN FACT: Each day at 3 p.m. in the afternoon the two-man team at Righteous Marketing has a “shootout” on a Little Tikes basketball rim. Each gets two practice shots and then 10 regular shots. The highest score wins for the day. If there is a tie, team members have an overtime round with five shots each, no practice. If still tied after that, they go to sudden death, one shot at a time. “It’s fun and helps break up the afternoons when people tend to be getting a little tired anyway,” says Brady.



Your Smile is Worth a Thousand Words

We meet so many people in our business activities at events, conferences, meetings, workshops and even randomly.

I have found that if I invite and attract someone to me by my energy, attitude and self confidence all wrapped up in a big, warm smile and a firm handshake, it’s worth a thousand words.

I don’t know why more people don’t smile.  I understand the fear of meeting new people and being at events with a large crowd where they may not know people. It’s daunting and scary. It is for me too sometimes, and I consider myself very good at this. But I have had to work on it - and through it.

I find that if I go into networking and meeting with people from a neutral, fun position rather than with an agenda, things turn out the best. Using the power of a smile can be a secret weapon and superpower. It’s everyone’s.

The power of a smile is transformative and we all have that power when we smile. Turns out, there is a science behind smiling that begins in the brain. Once the smiling muscles in the face contract, there is a positive feedback loop that goes back to the brain and reinforces our feeling of joy:

“Smiling stimulates our brain’s reward mechanisms in a way that even chocolate, a well-regarded pleasure-inducer, cannot match.”

Our brain can even distinguish between a real smile and a fake smile, and it’s all in our eyes when we smile. Your brain keeps track of your smiles, kind of like a smile scorecard. It knows how often you’ve smiled and which overall emotional state you are in.

Studies have shown how smiling reduces stress, increases our overall health, well being and attitude. Below are a few things that can help you get your smile on more - especially in business.

Use Your Imagination

Imagine and think about happy, joyful experiences and situations before you go to events. Set up your mindset before you attend.

Researcher Andrew Newberg says:

“We just ask a person, before they engage in a conversation with someone else, visualize someone they deeply love, or recall an event that brought them deep satisfaction and joy. It’s such an easy exercise, and we train people to do it in our workshops.”

Practice Smiling in a Mirror

As silly as this sounds - is as effective as it can be. Practicing smiling with yourself can get you through some of the fear that makes you uncomfortable with smiling at others. Try going through the day and smiling a lot to everyone and everything. You’ll be amazed at how it is reciprocated.

Get Comfortable Drawing People Towards You

Smiling is magnetic and it’s a conversation starter. People who smile are kind of intriguing and magnetic to me. I find myself wondering what they are smiling about, and isn’t that a great conversation starter:

“What’s making you smile today?”

Researcher LaFrance concluded that overall, women smile a lot more than men. She says:

“In general women are more accurate than men in detecting what is really going on with someone by looking at their face and listening to their voice. Women are more likely to tell the difference between a felt and a fake smile.”

I bicycle regularly and have started smiling at other riders, walkers and runners that I pass on the trail I ride on much more. Turns out, they are more than willing to smile back, give me a head nod or a thumbs up.

At business events, I am naturally drawn to people who are smiling and enjoying themselves. When I use the power of my smile, it not only puts people at ease, and gives them an opening for a conversation, but people who smile at me - I am much more inclined to engage with.

Your smile is worth a thousand words. Trust it and use it as much as you can - it’s your superpower.

Smile Photo via Shutterstock



Winning strategies in cyber warfare

The adversary has enormous capabilities in the cyber world, but it too is not without its vulnerabilities, and these must be exploited says Calum MacLeod.

Today we live in a world where the “giants” are lined up against us. Cyber Crime, Cyber Sabotage and Cyber Espionage is a daily fact of life. Whether we're talking about botnets, defacing of web sites, spear-phishing or theft of intellectual property, everyone seems to be defenceless against the relentless attacks that are targeting everything from your Facebook page to the SCADA systems controlling nuclear power stations.

Governments talk about the risk of Cyber-Attacks being more deadly that atomic weapons, and company after company are being pillaged for their intellectual property.

The technologies that have traditionally protected us are no longer able to provide any effective defence. Firewalls, Anti-Virus, and whatever other latest and greatest panacea that is being touted as the answer to our problems are all proving ineffective.

And yet every user, and organisation, has the means to stop every giant in their tracks, but most are, as the saying goes; ‘so blind as those who will not see.' The most deluded people are those who choose to ignore what they already know.

Stopping Malware and APTs Dead In Their Tracks

Breaches such as those discovered at Target, the NSA, or wherever, all follow a set pattern. Breaches are not a shot in the dark, but require careful planning and execution.

In the first instance, the attacker has to identify the target, essentially looking for the weakness in the defence. Multiple tools are available on the Internet that allow anyone to scan for systems or components that have vulnerabilities. Tools such as Nessus, and web sites such as Shodan provide an easy way for an attacker to identify a weakness.

Once the point of entry is identified, the next step is to gain entry. In other words, looking for access to a system which can then be used as an escalation point. Again tools such as Metasploit and others make it easy to do this on an industrial scale with brute force attacks.

“The attack process is usually focused on a particular system, or set of systems. We will then attempt  to access the system, either through the use of an outright attack or using credentials that we have managed to gather from somewhere in the environment, through social engineering, or other means. Once we have an account on the system, we may need to escalate the level of access that we have in order to accomplish our goals. The target for such privilege escalation is often root or administrator level access, giving us relative freedom on the system. Given the needed level of access to the system, we can then exfiltrate any information that we wish to, cause damage to the environment in any way that benefits us, then install any measures that we need to in order to ensure future access.” - Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by Jason Andress and Steve Winterfeld.

Getting the information out, and covering their tracks is relatively easy once a beachhead is established, using applications such as Corkscrew and others, and then using Tor or other deep web service to move the information. Additionally there are plenty tools available that make it possible to hide stolen data on USB drives, mobile devices etc.

And of course, as Aramco discovered, once in, the destruction of data, software and even systems is relatively straight forward. Again the applications are easily available on the net.

Faced with giants that guarantee zero day exploits, with a guarantee that vulnerabilities will not be detected for several months, and that promise that all leading anti-virus and threat protection technologies have been tested before the release of these exploits, technologies that protect us against these attacks are helpless. It eventually gets very tiresome to be continually be told by the security industry after the fact. It's like my wife always telling me after the speeding camera has flashed that we've just passed a camera! For once I'd love her to tell me where the camera is ahead of time.

Of course my navigation system tells me where cameras are, or rather tell where they were when the GPS software was installed, so it's equally useless!

But all malware and APTs have a chink in their armour. To be able to do their worst, they need privileged access to a system. Ultimately if they can't install something, they can't attack. The little pebble of managing privileged accounts, whether used by administrators, services, tasks, whatever, will stop them dead in their tracks. In other words, every organisation has the means to protect themselves if they simply enforce a policy of continuous monitoring and scanning, like the enemy,  of components such as registries, daemons, tasks, hardware components, services and privileged accounts, and eliminate all vendor default accounts, they can win.  

Pebble beats sword, pen beats sword, password management beats malware! It is just that simple!a

Contributed by Calum MacLeod,  VP EMEA at Lieberman Software



11 Tips for Putting Together a Strong Company LinkedIn Page

What tips do you have for putting together a brand page on LinkedIn that supports company growth?

The Young Entrepreneur Council (YEC) is an invite-only organization comprised of the world’s most promising young entrepreneurs. In partnership with Citi, YEC recently launched StartupCollective, a free virtual mentorship program that helps millions of entrepreneurs start and grow businesses.
1. Upload Product Images

The LinkedIn corporate pages allow you to upload images and product descriptions. This becomes searchable content and makes your page look a lot better. For example, we include screenshots of our software product with descriptions of what each screenshot is for on our page. Images always make the page easier and more interesting to look at.
- Dave Nevogt, Hubstaff.com

2. Showcase Your Personality

LinkedIn followers are very different from those on other social networks in that you know why they’re there â€" they’re considering working for you one day. That means you can showcase the best things about your company, especially the personality of your culture and team. Don’t shy away from being clear â€" they need to love it as much as you do!
- Derek Flanzraich, Greatist

3. Edit Your Company Description

LinkedIn brand pages are very SEO friendly. Google previews up to 156 characters of your page’s text in its meta description. Edit your company page description so it leads with powerful, keyword-rich sentences. LinkedIn users can also search for companies by keyword, so include words that describe your business, expertise and industry focus.
- Brett Farmiloe, Digital Marketing Company

4. Add Keywords

Add the keywords you want your company to rank for to your LinkedIn company page. This will help people find your profile and will also help your company rank better with search engines. Also, connect your employees’ profiles to your LinkedIn page so there’s more activity and connections leading their contacts to the page.
- Joe Apfelbaum, Ajax Union

5. Highlight How Cool Your Company Culture Is

Highlight how much employees love working at your company and how much you love the work they do for you. Show the outside world that your company’s values extend beyond providing a terrific product and include having a terrific in-house culture, as well.
- Brooke Bergman, Allied Business Network Inc.

6. Use Video

You need to stand out among the crowd. Not many companies are doing video or visual content. Showcase this on there, and it’ll attract a lot of people.
- John Rampton, Adogy

7. Have Others Share Your Story

I really think having others tell our story for us is much more valuable than us telling our story. Having employees, interns, clients and partner organizations share their experiences working with us provides a unique frame of reference that we can’t achieve.
- Chris Cancialosi, GothamCulture

8. Feature Employees

Showcase your company culture by using status updates to feature employees who went above and beyond and awards the company has received. After, review engagement metrics, and sponsor your best posts.
- Adam Root, Hiplogiq

9. Support It With Content

LinkedIn thrives on quality content. When people aren’t reading personal profiles, they’re often reading the best articles that are being shared on the site. Having a strong company network that engages with your quality content is going to drive people to your brand page (which will be quality, as well).
- Michael Seiman, CPXi

10. Keep It Appropriately Updated

So many businesses are bad at keeping the page updated with new announcements or content, and any new visitor is going to think it’s dead and not happening and then move on. Keep the page active, even if you don’t see a ton of immediate ROI. We’re not talking a huge time investment here. However, don’t get overzealous without a good plan and just post anything just to be posting it.
- Andy Karuza, Brandbuddee

11. Post Relevant Information Often

Whether you want to grow your client base or add new employees, LinkedIn is a great place to showcase your company’s talents and unique offerings. Make the most of the tabs LinkedIn offers by listing recent updates on your company’s homepage and current job openings along with videos of employees discussing what it’s like to work at your company on the careers page.
- Björn Stansvik, MentorMate



Samsung Galaxy S5 fingerprint scanner \'easily hacked\'

Single step authentication on Galaxy leaves PayPal accounts open to abuse say German researchers.

PayPal was left fighting a rear-guard action last night after it emerged the fingerprint scanner seen on the Samsung Galaxy 5 smartphone can easily be bypassed.

Germany's Security Research Labs says the spoofing system allows access to a user's PayPal account, which is an important issue since a key feature of the scanner is one-step access to the PayPal money payment system - effectively replacing the user's ID and password with a fingerprint swipe.

Researchers from SRL seem to employ a classic James Bond-style technique to fool the fingerprint scanner, photographing a fingerprint on a smartphone screen - ironically using an iPhone - and then developing an etched PCB image. From there, they create a mould of the fingerprint, swiping it across the sensor and fooling it into thinking it was the real thing.

SRL says it was then able to access the smartphone user's PayPal account, since the Android PayPal app allows the fingerprint authentication process to replace the ID/password single factor authentication step on the PayPal site/service.

Perhaps worse, because fingerprint verification can be subject to false negatives, the software appears to allow unlimited attempts at swiping a fingerprint, rather than the `three strikes' limitation seen on ATMs and most other security systems.

SRL says it was also able to re-use its fake fingerprint mould to authorise a series of rogue transactions.

For its part, PayPal downplayed suggestions that the hack allows unfettered access to a user's account, noting that its users can de-activate the fingerprint authentication system in the event that their smartphone goes missing. The electronic money service says it uses sophisticated fraud and risk management systems to try to prevent fraud and stressed that users are also covered by PayPal's purchase protection policy.

SRL says that one solution to the security problem for Samsung and PayPal would be to use a system of looking for intrinsic errors in the mould/latent imaging process - such as looking for air bubbles (which appear as a white dots on the image) and other blurring effects seen when a fingerprint copying process is used.

Mike McLaughlin, senior penetration tester and technical team lead with First Base Technologies, said the hack highlights the dangers of using a single factor authentication system such as that seen on the Galaxy S5 app. The real issue, he explained, is that any form of security can ultimately be beaten given enough time and effort.

"This is a single point of failure issue. It's similar to the problems that the iPhone 5s scanner had in its early days," he said, adding that using a fingerprint as a straight replacement for an ID/password combination is always going to be risky.

McLaughlin went on to say that he favours two-factor authentication (2FA) as a means of security critical data, and that he would never entrust critical systems to a single authentication system.

"If Samsung does take this on board, as I think it will, they will issue an update. The bottom line here is that no security technology can ever be viewed as 100 percent secure," he said.

Sarb Sembhi, director of consulting services with Incoming Thought, the business research and analysis house, said that the root cause of this hack may lie in the fact that few biometrics systems make use of industry standards, although he noted that Samsung has yet to make a formal comment on the issue.

"It may well be that this issue relates to a more fundamental problem with standards, if they apply here. I think that Samsung will be able to sort this situation out," he said, adding that using fingerprint scanning as a single form of security is a bold move, especially against the backdrop that smartphones can be used to collate user data for Internet-based services.

Andrew Mason, technical director of security and compliance specialist at RandomStorm said that the main flaw in this scenario is the lack of a lock-out mechanism after a few failed attempts at the finger swipe stage.

“With any authentication system, if you don't limit the number of access attempts that can be made, it is just a matter of mathematics and time before a hacker can get in," he said.

"PayPal has already commented that fraudulent transactions would be covered within its purchase protection policy. Given the effort that the researchers went to, to create the etched PCB mould and then the spoof fingerprint - and the amounts that they'd be able to steal using this method - it's likely to remain as a proof of concept," he added.

Andy Davies, Head of Research with security consultancy Pentura, said that any single-factor authentication method - whether it is a password or fingerprint scan - can be abused if the attacker has sufficient means and motive.

"If that single password is captured or cloned by an attacker, it's essentially game over," he said, adding that it is important to utilise two-factor authentication, as the more information we need to provide to prove our identities, the harder it is for attackers to steal or clone credentials, which better protects personal information.



MSWin 8.1 users must update or lose security patches

Organisations run the risk of being left defenceless against attackers unless they upgrade from MS Win 8.1

Amidst all the fuss surrounding Windows XP going end-of-life for most users on the 8th of April, Microsoft has quietly buried the news that,  if users of Windows 8.1 fail to update their operating system from May of this year onwards, other security updates will not be applied.

This apparently draconian move is designed to stop Win 8.1 users getting `left behind' but is already causing a stir in developer circles, since it effectively makes the update process mandatory if companies and end users want their computers to remain secure.

In its TechNet security advisory of last Saturday, Microsoft says:

"Since Microsoft wants to ensure that customers benefit from the best support and servicing experience and to coordinate and simplify servicing across both Windows Server 2012 R2, Windows 8.1 RT and Windows 8.1, this update will be considered a new servicing/support baseline. What this means is those users who have elected to install updates manually will have 30 days to install Windows 8.1 Update on Windows 8.1 devices; after this 30-day window - and beginning with the May Patch Tuesday, Windows 8.1 user's devices without the update installed will no longer receive security updates."

"This means that Windows 8.1 users - starting patch Tuesday in May 2014 and beyond - will require this update to be installed.  If the Windows 8.1 Update is not installed, those newer updates will be considered not applicable,” it adds.

Graham Cluley, an independent security analyst, told SCMagazineUK.com that he is not particularly surprised to see Microsoft moving towards mandatory security updates.

The software giant, he explained, does not want a repeat of Windows XP and to find itself having to support ageing decades-old operating systems in the future.

"Unless you have turned off automatic updates in your settings, Windows 8.1 Update will probably already have downloaded and installed itself onto your devices. But if you don't like the changes Microsoft is making in Windows 8.1 Update - which could well be the case for some users resistant to change - there is no option to skip the update and still receive the most basic security patches," he said.

This means, says Cluley, that Microsoft has only given its users one month - until the next round of security patches in May - to update their Windows 8.1 devices.

"It's worth underlining that Windows 8 users will still receive security patches - as will users of Windows 7 and Vista - but Windows 8.1 users have to submit to Microsoft's pressure and install Windows 8.1 Update if they want to keep their systems secure," he explained.

The security analyst went on to say that, whether users like Microsoft's high-pressure tactics or not, they are swimming against the tide if they want to skip the Windows 8.1 Update.

"You cannot afford to miss out on receiving your Windows security updates, so you'll just have to adjust to the new world order - and hopefully find Microsoft's changes to the way Windows 8.1 works a positive step," he concluded.

Tim Keanini, CTO of Lancope, agreed with Cluley's observations, noting that, we - as an industry - have seen how the threat has stepped up its game and this is what it looks like when defenders do the same. 

"It is a bold move but it is also leadership to get people to behave in a more secure manner," he said, adding that being able to stay current and run the latest software is critical these days and by not doing so, you put everyone at risk because we are all connected. 

"No one likes this, everyone will complain, but it is the right thing to do. Stay current and apply updates, it's what you must do on every computing platform including your tablets and phones," he explained.

According to Laurie Mercer, senior consultant with Context Information Security, if organisations wish to apply Windows patches manually, they need to make sure their patch management strategies are capable of a 30-day turnaround on new software patches.

"If they do not update within 30 days, new security patches will not be applied to their Windows 8.1 installations - and organisations run the risk of being left defenceless against attackers,” he warned.



Microsoft’s First Digital Assistant, Cortana, Is Here

Sometime ago buzz began about a new digital assistant that would be available with the unveiling of Windows Phone 8.1.

Now, Microsoft’s first assistant, Cortana, is here. Microsoft has made the new Windows Phone 8.1 available to developers which means your carrier will have the phone available very soon.

The name Cortana apparently comes from a holographic character in Microsoft’s video game franchise, Halo.

Whatever the inspiration, the Cortana assistant acts much like Apple’s digital assistant Siri and Google Now. It’s designed to be your personal assistant keeping track of things that are important to you and searching for information on your Windows Phone. Cortana will be able to set your alarms and even reserve a table at a restaurant. She will remind you of meetings in your calendar and even tell you how long it will take you to travel to your next business meeting.

Cortana works inside just about every other app on Windows Phone 8.1, too. Tapping on a magnifying glass inside the app you’re running allows you to multitask. So, if you’re listening to music while on the road, you can tap to activate Cortana to also set a reminder or alarm, schedule a meeting, or run a Bing search.

Here’s a look at how Cortana works, from Windows Phone Central:

Outside of Cortana, Windows Phone 8.1 features new live tiles that you can customize with a unique skin. The Verge also notes that the update improves support for dual SIM cards, calendar views, and app updates.

“On one hand, Windows Phone 8.1 is a push toward the future, full of new things and new ways to do old things. But it’s also simply Microsoft’s biggest effort yet to bring its mobile platform closer in line with iOS and Android, to make it seem less alien to those who might switch.”

There is actually a way to get access to the updated mobile operating system. But be aware, this process will void the warranty on your device until your carrier releases the operating system update, according to The Verge in a different post.

If you’re not an app developer and are too anxious to wait for your mobile carrier to release the update, here’s how you can get Windows Phone 8.1 now.

First, go to the Windows Phone App Studio and sign in with your Microsoft account. The next step is to create a project. If you already have Windows Phone 8, you can download a free preview app. When you sign in to the app, your phone will detect the Windows Phone 8.1 update.

Image: Xbox



Communication gap indentified between IT and management

Bad news is filtered out of communicaiton to the C-suite and 63 percent of IT staff only start talking after a breach has taken place.

Research from the Ponemon Institute claims to show that IT staff from more than half of businesses (51 percent) filter out any negative facts before reporting security risks to their C-level (CEO, CFO etc) bosses.

According to the independent report - entitled `Security Metrics to Manage Change: Which Matter, Which Can Be Measured,' sponsored by FireMon - 71 percent of respondents to the survey said that communication occurs at too low a level - or only when a security incident has already occurred (63 percent).

The report took in responses from 597 people working in the IT, IT security, compliance and risk management divisions of major companies.

The survey found that a security posture perception gap places organisations at risk - with just 13 percent of respondents rating the security posture of their organisation as very strong. Against this, 33 percent of respondents said that their CEO and board believe their organisation has a very strong security posture.

The Ponemon report concludes that this gap reveals the problems the security function has when it comes to accurately communicating the true state of security.

It was with this in mind that we caught up with Jody Brazil, CTO of FireMon, whose idea the report was - and we asked him what the key takeouts from the analysis were for him.

The real crux of the issue, he said, is the cost challenge in most large organisations, as most major businesses do not want to pay the real cost of `security insurance' in the shape of effective security defences.

Then there is the disconnect between different people in a typical organisation, he added, noting that the technical team often does not have the language to talk to other disciplines in the company. It is, he explained, a tough challenge.

Phil Turtle, a Master Practitioner in NLP (Neuro Linguistic Programming - defined as a language-based and behavioural approach to management) said that most people intuitively filter out any negative issues before relaying any information to their C-level managers, due to the `culture of fear' that exists in most businesses.

"Coupled with the fact that IT people are not very good at communicating to C-Level management what needs to be done, and it's clear that there is a communication gulf in play here," he said.

"The real issue here is that IT professionals only rarely have the skills needed to explain their information in a format suitable for C-Level managers to understand the nature of the problem. This means that the C-Level professional does not really understand the nature of the security problem," he added.

Professor John Walker of the Nottingham-Trent University School of Science and Technology agreed that the communications gulf challenge exists, saying he has seen it at many different companies where he has worked as a security consultant.

"It comes down the fact that people tend to be more worried about their bonuses than actively communicating the scale of the problem to their managers. The solution needs to come from the board itself, and foster a better understanding the challenges the IT security department faces on a day-to-day basis," he said.

Kevin Bailey, head of market strategy with Clearswift, said that the need to provide the reality of an organisation's security risk profile has to be consistent and in real-time.

"Companies do not expect the resolution to a malware or APT attack to be dealt with as a tick box exercise once other tasks are completed or wait for their finance teams to tell them that they have made a loss during the financial year the day before they post their fiscal results, so why should their security risk be left as 'other business' on senior management agenda items?" he said.

Bailey - a former IDC Research Director - went on to say that organisations need to revisit their investment strategies when allocating budgets, to ensure that they appreciate the tools that can provide early visibility - and resolution - to potential concerns that could severely damage the financial and reputational aspects of the company.

"Think about an organisation which has closed its eyes to social media and continued to rely on email to reach its market - by the time it acknowledged its mistake, the competition had already swarmed the prospect base, creating the need to invest heavily to catch up," he said.

"This is no different to becoming pro-actively aware of their security risk profile, if they don't do it now, the costs in financial and resources will become too steep to maintain the balance between company growth and company security," he explained.



GCHQ selects new director general

Robert Hannigan is to replace Sir Ian Lobban as the director general of the UK's GCHQ.

Foreign Secretary William Hague announced the news on Tuesday on the government website, with the announcement detailing that Hannigan will take the reigns when Lobban moves on from his current role in the autumn.

Hannigan has been the director general for defence and intelligence at the Foreign and Commonwealth Office since 2010, and has previously held roles as head of security, intelligence and resilience at the Cabinet Office, as well as a similar role at the Northern Ireland Office. Poignantly, he was also responsible for the UK's first Cyber Security Strategy - which cost in the region of £650 million.

Sir Kim Darroch, National Security Adviser, oversaw the recruitment process, which was also open to crown and civil servants.

“I am delighted that Robert Hannigan has been appointed as the next Director of GCHQ,” said Hague. 

“GCHQ's world-class work is vital to the safety and security of the United Kingdom. As well as his impressive personal qualities, Robert brings to the job a wealth of relevant experience in the fields of national security, counter-terrorism and international relations. 

"I'd also like to thank Sir Iain Lobban for his consistently strong and professional leadership as Director of GCHQ since 2008.”

Hannigan commented that it was a “privilege” to be asked to lead the GCHQ. 

In addition to facing continued allegations of excessive government surveillance following leaks by former CIA contractor Edward Snowden, the GCHQ has been in the press for some good news of its own. Most recently, it announced that it is teaming up with select universities to  accredit cyber security degrees.



How Do You Optimize Your Facebook And Twitter Accounts?

Whether you need to promote your brand, share event pictures, connect with your clients or create a buzz, social media marketing is a necessity and not an option any more.

An optimized social media profile shows your strong social media presence. But how do you elevate your social media profile to establish a strong connection with your fans?

Let’s explore two of the most popular social media platforms and how you can optimize them.

Facebook Optimization

Your Facebook Profile Demands a Vanity URL

Select a unique username for your business page through www.facebook/username. This will be used for your unique Facebook URL.  However, once the name is chosen, it cannot be modified later, so be sure to check for errors.

Add a Professional Touch to Your Profile Image

Your profile image should only consist of your name and logo of the company. This helps to build brand awareness every time your business updates, comments and shares content on Facebook.

Be Creative With Your Cover Photo

Think of roadside billboards. Your cover photo should follow the same path. It should be eye catching and express your brand clearly:

  • Highlight your team.
  • Feature a promotion.
  • Share a holiday message.
  • Use collage images to showcase your products and services.
  • Use fan photos shared with you of people enjoying your products, services, promotions, etc.

Use Apps

There are many Facebook applications that can help you promote links to your site, your articles and online retail space. Here are few commonly used ones:

  • SlideShare
  • Networked blogs
  • Static FBML (Facebook HTML)
  • Reviews

Update Your Business Status With Keywords and Visuals

Facebook pages are indexed by search engines. This means that public updates from your Facebook business page often show up in Google’s real time search results. So, next time you update something on your page, keep important keywords in mind.

And nothing is more boring than a page full of text so be sure to add images and videos.  Research shows that updates with images are clicked 54% more than text-only updates and 22% more with video updates.

Twitter Optimization

Be Smart With Your Twitter Handle

What comes after the ‘@’ symbol is important. It should convey something to followers. For instance, an effective Twitter handle is your company name. However, keep in mind that your handle can only be 15 characters. So get creative if you have a lengthy name for your company.

Get Creative With Your Profile Image and Background

Your profile picture is attached to all tweets so keep it consistent with your business logo because it is the face of your brand. Twitter is all about what you have to say, so it should look like its coming directly from you and nowhere else. Be creative with how you present yourself. An engaging profile image should possess the following characteristics:

  • Different from your competition.
  • Visually engaging and professional.

An engaging image for your Twitter profile can make you stand out in a sea of thousands of tweets. Moreover, if you are successful with your universal value proposition and targeted value proposition, there are chances that lots of visitors will become your consistent followers because they identify with your overall value proposition.

Similarly, your background image can make a big difference in the conversion rate. Incorporating a compelling background image increases the amount of time visitors spend on your profile. Your Twitter background image should communicate and highlight your value proposition. Try some of the following ideas:

  • Use custom call-to-action that converses directly with Twitter users.
  • Share contact information including your phone number, social networks and blog.
  • Offer promotions.
  • Add testimonials.
  • Crowd source photos from followers that use or show off your products.

Pay Attention to the Color of Your Header Image

Your header image should not overshadow your profile image. Keep it dark and muted. If your image is too bright, your profile may not be readable.

Develop a Great Bio

Every business is unique and so are its requirements. It is important to be interesting and engaging. Your bio should be a unique 160 character summary of your company’s mission. This reflects who you are, why people should follow you and the benefit of following you.  Make sure to display:

  • What your business does.
  • Your brand’s character.
  • Who they are talking with.

Add Your Location and Link

This is the easiest thing to do and hopefully takes the least amount of time. If you do not want to add a specific location, pick a geographical location. Advanced search on Twitter allows users to search by location. Adding your location is a great way to connect with your local community.

Also add a link to your website. Chances are that the 160 character summary doesn’t explain everything you want to convey to someone who is genuinely interested in your company. Ideally, that is what your website does.

Tablet Photo via Shutterstock



BigCommerce Increases Reach Into Small Business Commerce

BigCommerce is known for the big brands that are using it to get eCommerce sites up and running quickly. Clients include Gibson Guitar, YETI Coolers and many others.

But the company says that BigCommerce isn’t exclusively for major national brands. Small businesses can and should be taking advantage of what the eCommerce platform can offer.

In an interview with Small Business Trends, BigCommerce CPO Westley Stringfellow said:

“The reality is BigCommerce is built for business, large or small. Our vision is to power small business. Our role is to amplify the merchant.”

If your business is in the market for an eCommerce platform, BigCommerce appears to be a powerful option to consider. Having your own store online can help you to build your brand and break free from other services like eBay or Amazon.

Stringfellow says:

“It’s very clear that as we grow, merchants want to have their own presence. They want to grow their brand. It’s hard to do that on eBay.”

BigCommerce users have access to dozens of store design templates, many of them free, as well as hundreds of apps to help you manage your store. Many of these apps are also free.

Stores on BigCommerce range between about $25 per month to about $150 monthly. More expensive tiers allow you more storage, up to 30 GB of space, and more product listings. The basic plan (known as Bronze on BigCommerce) allows you to list 100 products at one time.

No matter what plan you choose through BigCommerce, there are no transaction fees tacked on to any of your sales. BigCommerce is relatively easy to use and can get your eCommerce presence online in less than an hour.

Once you’ve chosen one of the templates, you’ll be able to integrate different apps with your new store. That includes apps like eBay and Amazon. When you use these apps, you can sync your inventory with products you have listed on those sites.

Other apps allow you to integrate accounting software and even several apps that let you interact with visitors to your site in real time. BigCommerce is also integrated with more than 60 payment providers, including PayPal, Stripe, and others.

Stringfellow tells us that about 30 apps have a one-click install feature. He says:

“Our platform is made to simplify the tech used on the Internet. You don’t have to worry about setting up or managing your website. What’s important to business is not managing the complexity of a website but managing the business they create from the website.”

bigcommerce

Small businesses are finding their experience with BigCommerce enjoyable, too. Adam Teague, a founder of The Two Guys Bowtie Company, said in an email to Small Business Trends:

“There are so many great built in features like the ability to segment customers into wholesale and retail customers, to be able to quickly and easily update content, and the ability to effectively communicate to the customer where their order is at in the order fulfillment process. I have used several other eCommerce platforms in the past and we have found BigCommerce to be the best fit for our business.”

Images: BigCommerce Video Still, The Two Guys Bowtie Company