Recent Endorsements

You've left us really enthused about the whole digital dimension and we're looking forward to developing our plan with your support.
Simon Beardow - Deputy Director, British Council, Vietnam

Showing posts with label Small business. Show all posts
Showing posts with label Small business. Show all posts

Saturday, 22 December 2012

Are You Feeling Cyber Secure?

What would you do if your network's defences were breached and your  precious user accounts, financial and customer data were pillaged?

Not only would your intellectual property be jeopardised but the chances are that just one such breach could put you on the road to ruin. Overstated? Not really when you consider how much your business now depends on the Net.

A  National Cyber Security Alliance and Symantec survey conducted in September of 2012 discovered that  77% of 1,015 small businesses (less than 250 employees) thought they were safe from cyber attacks.   In this they were somewhat deluded, as 83% of them had no cybersecurity plan, although their online business operations were increasingly using social media and the Cloud. (see infographic below)

Raphael Ouzan, founder of BillGuard in New York says:

When it comes to cybersecurity protection, the biggest problem that small and medium-sized business owners often fail to address also happens to be the most critical: Awareness.
A lack of awareness by employees is the root cause of most of data leaks and other security incidents, and no matter how secure your data centre may be or how strongly communications are encrypted, the weakest link will always be the human beings interacting with the network."

Symantec offered seven tips that companies could and should adopt to make things more difficult for hackers and cyber-criminals:
  1. Determine what it is that you need to protect.  Undertaking a security audit will pinpoint where you information is currently stored and used.  You can then beef up your defences as required.
  2. Enforce strong password policies.  If you are serious about data protection then make sure your passwords are at least eight characters in length and contain combinations of letters, numbers and symbols. e.g. read!671DC. And do differentiate your passwords; don't use the same one for social media and online financial transactions for example.
  3. Don't wait for a security disaster to occur. Plan in advance with a comprehensive Preparedness Plan which should:
     - provide information on the identification of possible scenarios
     - tell you which are your critical resource that need protection
     - identify what is the appropriate security that needs to be put in place
     - establish the regular routine of archiving of business-critical files using a suitable backup solution
     - timetable the frequent testing you need to ensure your disaster response is satisfactory.
  4. Encrypt highly sensitive information on desktops, laptops, mobiles and removable media to protect your confidential information from unauthorized access.
  5. Educate your staff by providing training and a develop Internet usage and data security guidelines and policies. These should include clear guidelines for the sharing of information with any of the team that work remotely and details what you are prepare to share with your partners.
    Using Wi-Fi connections  in public cafes with phone or tablets can be particularly risky so they need to be made aware of the exact name of their network and login steps.
    Clearly spell out what staff should do if they discover malware or suspect their data has been accessed by unauthorised third parties.  The same applies if they inadvertently leave their laptop or data device on public transport (and yes it does happen!). What course of action should they take? Who in your organisation should they immediately contact?
  6. Makes sure that the security solution you have chosen is modern and up to date. The pick of the anti-virus crop do more than just look for viruses and spam; they scan files regularly for unusual changes in file size, malware programs and suspicious email attachments.
  7. Make it daily practice to update your security solution (anti-virus software).  The best ones quickly respond to new viruses, worms, Trojan horses and other malware with new updates.
All of the above requires investment in time and also financially, but prudent risk management makes the above a necessity.

The founder of Flippa.com, Matt Mickiewicz, explains to the Washington Post's J.D. Harrison:

"Everything we do is online, so cybersecurity, and its inherent association with trust, is a high priority. It’s also a core competency of our team, so we tend to do the bulk of it ourselves. We use tools such as risk matrices, plotting likelihood against impact, to determine how much we invest in this space. Our resources are immediately assigned to anything with high likelihood and high impact."


So Most Expensive is Best?

Buying the most expensive antivirus product around may turn out to be a waste of money. A report, called Assessing the Effectiveness of Anti-Virus Solutions and carried out for he security firm Imperva by the University of Tel Aviv, suggests that poor detection means that free programs offer better value for business.

82 new malware files were tested through the VirusTotal system which checks files against around 40 different antivirus products; the initial detection rate was a big fat zero!

Imperva’s researchers concluded that two free antivirus products, Avast and Emisoft, were the “most optimal” of the ones they reviewed. McAfee also passed muster.

Imperva’s CTO, Amichai Shulman is quoted as saying “We cannot continue to invest billions of dollars into anti-virus solutions that provide the illusion of security, especially when freeware solutions outperform paid subscriptions.”

One product that looks promising is ZeroVulnerabilityLabs which addresses the security challenge from a different angle. You can try out their free program which they claim stops malware from exploiting a wide range of software vulnerabilities, whether they are known ones or not.

This free utility is part of a layered approach (users still need antivirus and other security mechanisms) to fight against the plague of exploit kits which are infecting thousands of users every day.

Enhanced by Zemanta

Sunday, 11 March 2012

Is the New Timeline Timely?

At the end of this month those of us with Facebook business pages will be moved into 'timeline mode' whether we want it or not.

If you are like me, you will have seized the nettle and made the transfer already.  I say 'nettle' because it is a prickly decision and rankles some.

Jay Baer believes that small businesses are disadvantaged by the design shift; in fact he sees it as a betrayal. While I don't necessarily agree with his entire argument he has made several good points:

  • SME's lack the creative design abilities and resources to come up with a convincing cover design
  • Banning any use of promotional language in the header graphic is a big negative. While Facebook is trying to push its platform philosophy of 'creating emotional connections' , this requires time that most small businesses can't give to such a task
  • The old Landing Tab has disappeared in the new layout. This used to be a defacto landing page  / microsite for small businesses.  
I find the new tabbing arrangement on the Timeline very limiting as only four are visible at any one time and one of those, photos, is locked in position. Facebook is an important business tool and having to rely on a drop down tab means that important content is often buried.


There are some enhancements that Jae finds disturbing that I believe are advantageous in the new Timeline mode. 

The ability to pin and star content moving it to the top of the page provides for extra prominence.With an increased page dimension from 520 to 810 pixels, presentation is less cramped. For those of us using third party application such as Shortstack, this means tweaking the page dimensions; a simple enough exercise.

A big plus is the ability for Facebook users to send a direct message from the Page.

Facebook recommends that the profile image (180 X 180 pixels) be a company logo or similar.   This is not bad advice given that a recent study by Ohio State University found that in the majority of cases a Facebook profile picture tells viewers all they need to know to form an impression of you. 

Milestones allow a company to share their developing story with their community; how you were founded, what you have achieved, awards gained etc.

Dave Fleet has simple five step method for companies to follow:
  1. Review company marketing/communication materials and history
  2. Plot out the story you want to tell and the milestones for it
  3. Identify appropriate engagements to feature
  4. Identify approach to contentious issues
  5. Determine appropriate cover image
It is also interesting to compare the Google+ Landing page with that of Facebook's Timeline.  In the example below the company has used animation in its header, something that is not possible with Facebook's Cover image.
See the animation example on this business page
If you haven't already changed over to the Facebook Timeline, Mashable has a simply slideshow to show you how to log in and click to get things underway.

Enhanced by Zemanta

Sunday, 23 January 2011

Make Me An Offer

A Groupon by any other name still smells as sweet.  Now one of the Web's biggest players is taking on the market leader and with its huge resources it should be an interesting battle.

With new CEO Larry Page at the helm we should see more passion and slightly less arrogance from Google and even more inspired innovation.

When Google's recent $6 billion bid for Groupon spluttered to a halt folks wondered what would be next.  Well now we know.

According to a report in Mashable Google Offers is the new kid on the discount coupon block.  Google's own fact sheet send to businesses claims that " Google Offers is a new product to help potential customers and clientele find great deals in their area through a daily email”
Google Offers Fact Sheet



The daily deal competitve lanscape is becoming increasingly crowded and it will be interesting to see what impact Google's announcement has on Groupon's recently announced $15billion IPO?

Google has also responded to Mashable when asked for confirmation about their Offers trial:

“Google is communicating with small businesses to enlist their support and participation in a test of a pre-paid offers/vouchers program. This initiative is part of an ongoing effort at Google to make new products, such as the recent Offer Ads beta, that connect businesses with customers in new ways. We do not have more details to share at this time, but will keep you posted.”

And so shall we.
Enhanced by Zemanta

Monday, 17 January 2011

A Digital Dark Age?

Data Loss, Inc.Exhibitions of delicate papyrus and early script on animal skins continue to draw huge crowds to museums.

While the aesthetic quality of the artifacts is part of the appeal, their ability open a window to the past through the 'data' they contain is their primary attraction.

What will the museum masses of the future make of our digital age? If some commentators are to be believed they may have nothing to view.

The video below is thought provoking. What happens to all of the knowledge stored with data technologies that will become rapidly obsolete?

It is certainly at risk of being lost and once lost is, in many cases, gone forever.




It is also not simply a matter of backing up as the device or system used could fail with data loss crippling an enterprise.

According to Online Storage Reviews, loss statistics for the last year show that nearly 43 percent of people, who use computers, laptops and other systems, had experienced critical data loss due to one reason or other.

Sometimes, it’s virus infections and at other times, it’s a completely human failure to keep a check on critical data

Is the answer in the Cloud? Online storage solutions certainly minimise the risk and companies such as Box have 73% of the Fortune 500 using their services to share, collaborate and manage content. Box's revenue has tripled since 2009.

Deploying such a back up need not be expensive. Sites such as 4shared.com offer free alternatives which is an option for non sensitive data. Box.net has a free option (which is used on this blog - see below).

Simply backing up your business data on a portable hard drive or laptop is unlikely to be sufficient. Winter cold and freezing temperatures can freeze your data, virtually.

ComputerSight says that feeling uncomfortable out in the cold is not a human prerogative; electronic devices like computers, laptops, notebooks, and external hard disk drives share our predilection for warmer weather. Their way of showing this to you might prove terminal to your data.

Despite the risk of catastrophic data failure one in two small to medium businesses, according to a report by Semantic, have no recovery plan in the event of a network outage, data loss, or other IT disaster.

Information Storage and Management: Storing, Managing, and Protecting Digital Information57% of small businesses (firms with five to ninety nine workers) have no disaster recovery plan and the situation is worse than it was a year previously when 47% had no programme for such an eventuality.

"Of the firms without a disaster recovery plan, 41% said it had never occurred to them. 36% said they intend to implement one within the next six months. More than half (52%) said they don't think computer systems are critical to business - that translates roughly to one in four of all of the businesses polled."

In an age of ever violent natural disasters (Hurricane Katrina, the Queensland floods, the Christchurch earthquake - to name but three recent examples) companies are derelict in their duties if they do not adopt a rigorous data audit and develop a comprehensive recovery plan.


It is not a question of if data loss will happen, but when it will happen.  The U.S. Department of Labor estimates that 43 percent of U.S. companies experiencing disasters never re-open, and 29 percent close within two years.  If your business was to lose all of its files would you survive?

The Cloud also currently offers the best solution available to overcome the bugbear of obsolete technologies and hardware.
Enhanced by Zemanta

TheDigitalConsultant Shop



Blog Archive