What do you use to browse the shops?

browser usageImagine the internet as a large series of shop windows from all over the globe. We all need a method of browsing through them, and finding and buying information or physical goods. So, what do you use as your internet browser?

For a long time, Microsoft had the market sewn up – as it built its browser, Internet Explorer, into the Windows OS – and so everyone used it without giving it much thought. If it works, then why change? Well, people did change – and they did it because they felt that IE wasn’t doing a good enough job of displaying the web to you, the customer, in an accurate and intuitive way. So various other browsers have been developed, and the majority run quite happily on the Windows platform.

I have tried various browsers over the years, mainly on my Windows based machines – and now more recently on my Android based devices – and find each browser to have its own set of positives and negatives. The picture above shows a rough breakdown of internet browsers in use at the moment, mainly for desktop machines running Windows.

So what do we look for?

So what do we look for in an Internet Browser? Are they all the same? Should we be bothered?

It is a personal decision, and you should use which ever one you feel most comfortable with, but be aware of the following areas: –

  • Rendering of web content. Some browsers display web content much faster than others, and for you the end user that saves time and frustration waiting for web pages to load.
  • Security features. Each browser claims a set of security features that allow for secure connections and more secure shopping etc. Check them out and make sure you are happy with what they are offering and how they are handling it.
  • Cookie handling. Browsers each handle cookies, which are small text based files that store some details of your path through the Internet. Most cookies are time saving and harmless, but some are Malware – and can cause popup windows etc. Check what settings each browser allows you to change to get the level of security that suit you and your business.
  • Some browsers allow you to save a list of your open tabs and create a snapshot of where you have been – this is then available when you leave your desktop machine and go mobile. Chrome for example lets me see the tabs I was looking at when I was seated at my desk – and this all leads to an easier work environment.
  • The look and feel. Again, this is a personal choice, some of it is down to the look and feel of the browser. You may find some are easier than others to use and navigate around. They all constantly update themselves, and so just as you think you have sussed the settings and where to find stuff they can change it all. But, hey, that’s computers and applications for you.

Why not let us know what browser you use, and why you use that one. Give us your experiences of browsers you have tried and why you moved on to others.

We look forward to reading your posts.

Hack in the box!

security laptopOn average 30,000 websites are hacked every day*, 200,000 new malicious programs/viruses are detected every day**.  Google recently reported that they detect 9,500 websites/day infected with malware used for drive-by download attacks, where the victim only has to browse the site to become infected, and 4,000 of these sites are legitimate company websites. Small business have been a target for cyber criminals for a few years now, because they are an easier target due to their lack of budget and expertise. Is your network as secure as it can be from hackers? Are you sure? Or are you helping cyber criminals distribute malicious programs to your customers, friends and family, even if you’re computers are just acting as a base of operations for attacking and infecting others.

* Sophos Labs Report ** Kaspersky Labs Report

It is estimated that cybercrime costs the world’s economy between $1 – 3 trillion per year.

Many businesses around the world have been struggling financially for a number of years, but sadly the underground hacking economy seems to be alive and well. In July of 2013, the FBI charged two Russians for hacking into US Financial Institutions that resulted in the theft of millions of dollars from more than 800,000 victim bank accounts. One of the hackers and several other undiscovered criminals, were also charged with the stealing and selling of at least 160 million credit and debit card numbers, resulting in losses of hundreds of millions of dollars. According to the indictment, these losses included $300 million in losses for just three of the corporate victims not to mention the immeasurable losses to the identity theft victims, due to the costs associated with stolen identities and fraudulent charges.

Underground Prices for Stolen Credentials and Hacker Services

Hacker Credentials and Services Details Price
*Visa and Master Card (US)   $4
American Express (US)   $7
Discover Card with (US)   $8
Visa and Master Card (UK, Aus & Can)   $7 -$8
American Express (UK, Aus & Can)   $12- $13
Discover Card (Aus & Can)   $12
Visa and Master Card (EU and Asia)   $15
Discover and American Express Card (EU and Asia)   $18
Credit Card with Track 1 and 2 Data (US) Track 1 and 2 Data is information which is contained in digital format on the magnetic stripe embedded in the backside of the credit card. Some payment cards store data in chips embedded on the front side. The magnetic stripe or chip holds information such as the Primary Account Number, Expiration Date, Card holder name, plus other sensitive data for authentication and authorization. $12
Credit Card with Track 1 and 2 Data (UK, Aus & Can)   $19-$20
Credit Card with Track 1 and 2 Data (EU, Asia)   $28
US Fullz Fullz is a dossier of credentials for an individual, which also include Personal Identifiable Information (PII), which can be used to commit identity theft and fraud. Fullz usually include: Full name, address, phone numbers, email addresses (with passwords), date of birth, SSN or Employee ID Number (EIN), one or more of: bank account information (account & routing numbers, account type), online banking credentials (varying degrees of completeness), or credit card information (including full track2 data and any associated PINs). $25
Fullz (UK, Australia, Canada, EU, Asia)   $30-$40
VBV(US) Verified by Visa works to confirm an online shopper’s identity in real time by requiring an additional password or other data to help ensure that no one but the cardholder can use their Visa card online. $10
VBV (UK, Aus, Can, EU, Asia)   $17-$25
DOB (US) Date of Birth $11
DOB(UK, Aus, Can, EU, Asia)   $15-$25
Bank Acct. with $70,000-$150,000 Bank account number and online credentials (username/password). Price depends on banking institution. $300 and less
Infected Computers 1,000 $20
Infected Computers 5,000 $90
Infected Computers 10,000 $160
Infected Computers 15,000 $250
Remote Access Trojan(RAT)   $50-$250
Add-On Services to RATs Includes set up of C2 Server, adding FUD to RAT, infecting victim $20-$50
Sweet Orange Exploit Kit Leasing Fees   $450 a week/$1800 a month
Hacking Website; stealing data Price depends on reputation of hacker $100-$300
DDoS Attacks Distributed Denial of Service (DDoS) Attacks– throwing so much traffic at a website, it takes it offline Per hour-$3-$5
Per Day-$90-$100
Per Week-$400-$600
Doxing When a hacker is hired to get all the information they can about a target victim, via social engineering and/or infecting them with an information-stealing trojan. $25-$100

*Note: All Credit Cards sold with CVV Codes

As always, there is no shortage of stolen credit cards, personal identities, known as Fullz, for sale. However, the hackers have come to realize that merely having a credit card number and corresponding CVV code is not always enough to meet the security protocols of some retailers. Hackers are also selling cardholders’ Date of Birth and other personal information. Having this additional information would allow a hacker to answer additional security questions or produce a fake identification, to go along with a duplicate credit card. VBV (Verified by Visa) data is also being sold.

It has been found that credit cards and personal identities for non-US residents continue to sell for more money than the credit cards and identities for US residents. An example of the pricing discovered for stolen credit cards, Track 1 and 2 Data of Credit Cards, Fullz, Date of Birth and VBVs for cardholders is listed in the table above.

Online Bank Accounts for Sale: Name Your Bank and Country Preference

Just as with stolen credit cards, there are hundreds of online banking credentials for sale. It has found that one can purchase the username and password for an online bank account with a balance between $70,000 and $150,000 for $300 and less, depending on which banking institution the account is located. Also one can specify the login information for an account within a specific bank and country.

Malware Infected Computers for Sale

There are thousands of compromised computers (bots) for sale by bot salesmen. The price per computer typically decreases when they are bought in bulk. The costs for infected computers (bots):

  • 1,000 bots = $20
  • 5,000 bots= $90
  • 10,000 bots = $160
  • 15,000 bots = $250

Infected computers in Asia tend to sell for less. It is thought that infected computers in Europe & U.S. are more valuable than those in Asia, because they have a faster and more reliable Internet connection.

Once scammers buy the malware-infected computers, they can do anything they want with the machines. They can harvest them for financial credentials, infect them with ransomware so as to extort money from their owners, or use them to form a spam botnet to send out malicious spam on behalf of other scammers. If you don’t think there is much money in the spam business think again. Research into one of the largest spam botnets, Cutwail, it is estimated that the Cutwail gang’s profit for providing spam services was approximately $1.7 million to $4.2 million over two years.

Malware and Exploit Kits for Sale

A variety of Remote Access Trojans (RATs) are for sale ranging from $50 to $250. Most of the RATs are sold with a program to make it Fully Undetectable (FUD) to anti-virus and anti-malware. However, there were some hackers who sold the FUD component for an additional $20. For those RAT buyers who want the seller to do all the work for them, eg: setting up the RAT’s Command and Control Server, configure the malware to be FUD and possibly infect the target, they could pay an additional $20 to $50.

Exploit Kits – One of the offerings the Sweet Orange Exploit Kit for lease charged between $450/week and $1800/month. Sweet Orange is certainly more expensive to lease than the once popular BlackHole Exploit kit. Before BlackHole’s supposed creator was arrested, the leasing rates for BlackHole were:

  • 3 months—$700
  • 6 months–$1,000
  • One year–$1,500

Hacker Services for Hire: DDoS Attacks, Hacking of Websites, Doxing

Hacking into a Website

The cost to hire a hacker to break into an organization’s website runs between $100 – $300. Generally the higher the fee, the more reputable the hacker. What is worth noting is that most hackers for hire will not hack into a government or military website.

Distributed Denial of Service (DDoS) Attacks

A DDoS is where 1000’s of computers, controlled by a RAT, are used to attack a website and bring it to a halt through sheer volume of traffic. Those customers wanting to purchase DDoS Attack Services could pay by the hour, day or week. Most hackers who provide the DDOS attacks guaranteed that the target website would be knocked offline.

The rates were as follows:

  • DDoS Attacks Per hour = $3-$5
  • DDoS Attacks Per Day = $90-$100
  • DDoS Attacks per Week = $400-600

Doxing

Doxing is when a hacker is hired to get all the information they can about a target victim. Their methods include searching public information sites, social media sites, as well as manipulating the victim via social engineering and infecting them with an information-stealing Trojan. There are a lot of Doxing services for sale on the hacker underground, A “Vouch” from customers is used to verify that the hacker providing the Doxing service is legitimate. Doxing services range from $25 to $100.

Name Brand Products, Get Them For Cheap

Another service being sold on the hacker underground is where hackers will sell popular products, below the retail price. The hackers will obtain a specified product for a buyer either by using a stolen credit card or by working a scam, where they contact the retailer’s customer service representative and pretend to have purchased the item from the vendor, and it was damaged. The customer service representative is convinced that the complaint is legitimate, and they send out a replacement to the scammer, who in turn sells the product below the retail price.

Summary

For the most part, it does not appear that the types of hacker services and stolen data for sell on the hacker underground have changed dramatically in the past several years. The only noticeable difference is the drop in price for online bank account credentials and the drop in price for Fullz or Personal Credentials. In 2011, hackers were selling US bank account credentials with balances of $7,000 for $300. Now, accounts with balances ranging from $70,000 to $150,000 go for $300 and less, depending on the banking institution where the account is located. In 2011, hackers were selling Fullz for anywhere from $40 to $60, depending on the victim’s country of residence. Fullz are now selling between $25 and only go up to $40, depending on the victim’s location. It is believed that the drop in prices further substantiates that there is an abundance of stolen bank account credentials and personal identities for sale. There is also no shortage of hackers willing to do just about anything, computer related, for money, and they are continually finding ways to monetize personal and business data.

Key Protective Security Steps

Companies should adopt a layered approach to security and consider implementing the following:

  • Firewalls around your network and Web applications
  • Intrusion Prevention Systems or Intrusion Detection Systems (IPS/IDS). These inspect inbound and outbound traffic for cyber threats and detect and/or block those threats
  • Host Intrusion Prevention Systems (IPS)
  • Advanced Malware Protection Solution
  • Vulnerability scanning
  • 24 hours a day x7 days a week x365 days a year log monitoring, and Web application and network scanning
  • Security Intelligence around the latest threats (people working on the latest threats in real-time, human intelligence)
  • Encrypted email
  • Educating your Employees on Computer Security. A key protective measure is to educate your employees to never click on links or attachments in emails, even if they know the sender. Employees should check with the sender prior to clicking on the email links or attachments. Client side attacks using email attachments and hyperlinks to malicious code on the web are the two major infection vectors.

The good news for SME’s is that there are some products out there that are open source and free that can cover a lot of the above. Configured correctly will help to protect the network from malicious hackers, at least make them want to bypass you and attack an easier target.

Individuals Should Implement the Following Security Steps

  • Computer users should use a computer dedicated only to doing their online banking and bill pay. That computer or virtualized desktop should not be used to send and receive emails or surf the web, since Web exploits and malicious email are two of the key malware infection vectors.
  • Avoid clicking on links or attachments within emails from untrusted sources. Even if you recognize the sender, you should confirm that the sender has sent the specific email to them before clicking on any links or attachments.
  • Reconcile your banking statements on a regular basis with online banking and/or credit card activity to identify potential anomalous transactions that may indicate account takeover.
  • Make sure your anti-virus is current and can protect against the latest exploits. Also, make sure that your anti-virus vendor has signatures for detecting the latest Trojans and that you have the most up- to-date anti-virus protections installed.
  • Do not use “trial versions” of anti-virus products as your source of protection. Trial versions of anti-virus products are good for testing products, but do not continue to use the trial version as your protection for your home or work PC. The danger is that the trial version does not receive any updates, so any new Trojan or virus that is introduced after the trial version was released will have total access to your PC.
  • Make sure you have your security protections in place. Patch management is key. It is critical that as soon as they become available you install updates for your applications and for your computer’s operating system.
  • Be cautious about installing software (especially software that is too good to be true – e.g., download accelerators, spyware removal tools), and be conscience about pop-ups from websites asking users to download/execute/or run otherwise privileged operations. Often this free software and these pop-ups have malware embedded.

Make sure your company is not an easy target for the cyber criminals by having a penetration test by a trained and experienced Certified Ethical Hacker.

Penetration testing is the process of evaluating both your physical and digital security systems and finding all areas that are insecure and that need attention. The main goal of penetration testing is not only to find security vulnerabilities, but to attempt to exploit them as well, which can decrease the chances of data loss or allowing unauthorised persons access to secured data. Common problems discovered by penetration testing include software bugs, design flaws and configuration errors. Once these have been identified, they need to be quickly repaired in order to ensure that safety isn’t compromised for longer than necessary. Testing is vital for any business, no matter how large or small, as data has become the most important currency available to organisations and hackers.

Penetration testing should be performed by an experienced tester from outside the organisation or the service provider whom has configured the solution, website, network, etc. It is all too easy to ignore or turn a blind eye to a known issue, or to have the attitude of ‘Nobody could possibly find that flaw!’ or ‘Who would want to hack us? We’re not interesting enough!’ As this involves the security of the business, no half-measures can be taken. Security breaches happen every minute of every day, and unless you have a dedicated team for penetration testing, it may be wise to consider outsourcing the procedure. Having an in-house team is ideal, but there are many businesses that find good reasons to outsource the testing and security of their information systems.

Thanks to our Guest blogger this month
Wynn Jones ECSA/LPT CEH CHFI CVE CCA MCSE
http://www.praetoriansecurity.co.uk

 

Has the Cloud changed the business weather?

Old Car PhoneI have always promoted the ways in which technology can help us, and how its advancement is changing the game in many different areas – from remote surgery via a net connection, to the way we communicate and interact. Some would say that this is great, and these changes are for the better – at least better than the sluggish old ways we used to do things. Others are more sceptical, and suggest some of what is happening is taking away from human interaction, often to the degree that we just can’t interact effectively face to face anymore.

With the above in mind, I must confess that I do a lot more typing than writing, and as a result my writing skills are just not what they used to be. Saying that, some would say my typing skills also leave a lot to be desired.

Anyway, I digress; I titled this article, “Has the cloud changed the business weather?”

This was a direct hit at what the Internet (or as it’s often called, the cloud) is doing to the way we do business. Let’s look back at the history of how it was done; again I will speak from the experience I gained over my working life.

In times gone by

In past lives I have used written reports, sending them back to my direct line manager. Then we got the marvel that was carbon paper copies, which meant I could keep a copy myself.

A fax was installed in my home office and I could fax info straight to main HQ and get it actioned. No more waiting on the snail mail to deliver. This was a revolution.

I was then made the proud owner of a pager. It would bleep to signify that I had to go to a phone and call the office. The next version had a small LCD screen where I could read a streaming text message instead of phoning in. Where was technology taking us?

OK, you have probably guessed by now that I am not a newcomer to the work environment. In fact I have been through a good number of changes to the way things are done.

The next development was a phone mounted in my company car. This was a large brick like device in the cabin, connected to a larger box that was taking up most of my boot space. The aerial was attached to the roof of the car, and off I went. However, my sales area included the highlands of Scotland, and the signal at that time was really very poor, so generally I was uncontactable unless I found a landline.

The car phone I was given after that was the first that could be considered truly mobile, and could be removed from the car and taken, yes taken with you, anywhere. WOW! This was just amazing. I could text and phone from anywhere and no longer needed to be tethered to my car.

I was then simply given a mobile phone, and along with that my first mobile computer. It had details of all the products I used to sell on it, and had the ability to allow searches and pricing on the spot in front of a client…

How could this be I hear you cry? Well that was technology for you, and it was driving sweeping changes to what we were able to do in business.

Obviously things have moved on greatly since these bygone days, and companies have had to accept technology moves one. They also have to deal with the way it has influenced what they do, and landscape of their proposed market places.

Access to the Internet started very slow, I still remember connecting via a dial up modem (33.6k which by today’s standards is the slowest thing ever) but it was new and exciting at the time. Then ADSL has superseded that, and now ADSL is on the wane due to Fibre broadband being rolled out nationwide.

With this advancement, and mobile broadband reaching similar speeds, it finally means that the cloud has come of age. The idea of ‘Always there Internet’ has truly arrived.

What we can do now in the cloud, and through the cloud, is an order of magnitude more impressive than my first work experiences of technology.

Where will it all go?

The question now, I suppose, is where will it all go? But what I want to ask you is where will you take it?

Will you adopt the latest technology and keep pushing what you can do beyond what you do now? Beyond what others are doing? The cloud is truly changing the weather in the business world in ways that a younger me could only dream of.

We can collaborate worldwide as if we were in the same office. We can have instant access to real-time information that allows us to make informed decisions faster than ever before.

We can access information at any time and any place, which means we don’t have to be tied to an office desk. Mobile Internet usage (or cloud usage if you like) has increased year on year to around 68 to 70% of all Internet traffic. Technology has improved beyond a large bulky desktop computer or chunky laptop, the information is now actually in the palm of your hand.

Our mobiles (and remember I started with a brick in my car) have now turned into smart phones. We can do all sorts of tasks using them, and that includes good quality business work.

Conclusion

I am still excited about where technology can take us, and would like to think I’m still a people person. It will never make me a recluse, so that I do not interact, but it can make my life and business world  easier. It can change the weather on the business front, and for me this has meant more sunshine and less rain, even though there will still be clouds.

What are your thoughts on adopting new technology for you or your business?

Do I use Protection?

passwords

Password protection of course.

In this post, we are looking at passwords – and what people do or don’t do with them. It was inspired by a recent report online about the most common passwords of 2013. It scares me when I see what is being used. Strong passwords are one of those things we know we need, and should be using, but tend to put little to no effort into. Then we tend to be the first to shout ‘my details were taken’ when things go wrong.

So what are the rules then? Different camps will give you different instructions, and some will claim a password is strong when in fact it isn’t.

Let’s look at the most common methods:

  1. Use Different passwords everywhere.
    Why should we have to do this when it is so easy to use our pets name at every password prompt? Well it’s simple really. If someone guesses your pets name, and believe me they will, then they have access to every site you use. A study by an online company, called BitDefender, showed that 75% of people will use the same password for their email and Facebook. If that is then also your PayPal password, and it’s discovered, say goodbye to some funds and your friends.
  2. Remember the Underwear Meme
    Seemingly the saying goes like this: Passwords are like underwear. You should change them often, maybe not every day of course. Don’t share them. Don’t leave them out for others to see. (No Post Its). They should also be mysterious and a secret to others. So make them something that they can’t guess.
  3. Avoid Common Passwords
    If the word can be found in a dictionary, it is not a strong password. If you use numbers and letter as they appear on the keyboard, it’s not a strong password. Relatives names and pets names, NO. Even if you follow them with a number. Birthdays and anniversaries are just as bad sadly. Hackers will try all these things first. They actually run programs to check all these kinds of passwords, and for the love of all that’s techie, if you use “password” as your password, please just sign off the Internet right now. SplashData has been listing the 25 worst passwords for some years now, and “password” has always topped the list as the most common password. This year it was deposed by the long-time second worst password: “123456.” No, really!

So what are you tips I hear you cry!

Don’t cry, here is some advice.

Strong Password Solutions

How to Build Strength

To create a strong password, it is suggested you should use a string of text that mixes numbers, letters that are both lowercase and uppercase, and special characters. It should be eight characters, but preferably many more. A lot more. The characters should be random, and not include words, flow alphabetically, or be from your keyboard layout.

So how do you make such a password?

1) Spell a word backwards. (Example: Turn “New York” into “kroywen.”)

2) Use l33t speak: Substitute numbers for certain letters. (Example: Turn “kroywen” into “kr0yw3n.”)

3) Randomly throw in some capital letters. (Example: Turn “kr0yw3n” into “Kr0yw3n.”)

4) Don’t forget the special character. (Example: Turn “Kr0yw3n” into “Kr0yw3^.”)

You don’t have to go for the obvious and use “0” for “o,” or “@” for “a,” or “3” for “e,” either. As long as your replacement makes sense to you, that’s all that matters. A “^” for an “n” makes sense to me.

The suggested best form today seems to be creating a sentence and type it in, including spaces. It takes algorithms much longer to crack something like that than it does just for straight words – even if you have changed the letters for symbols and numbers. (Example: “I love yellow trousers”). This believe it or not is quite secure, and has the added advantage of being easier to remember. Of course, I could also swap numbers for letters and include symbols as well.

Well I hope you got the point and the Protection is definitely needed.

To finish, here is last year’s list of the 25 most commonly used passwords. I expect to hear the cries of despair as you recognise yours. It also shows their change in rank from the year before, and includes some newcomers for this year as well.

1. 123456 (Up 1)

2. password (Down 1)

3. 12345678 (Unchanged)

4. qwerty (Up 1)

5. abc123 (Down 1)

6. 123456789 (New)

7. 111111 ( Up 2)

8. 1234567 (Up 5)

9. iloveyou (Up 2)

10. adobe123 (New)

11. 123123 (Up 5)

12. admin (New)

13. 1234567890 (New)

14. letmein (Down 7)

15. photoshop (New)

16. 1234 (New)

17. monkey (Down 11)

18. shadow (Unchanged)

19. sunshine (Down 5)

20. 12345 (New)

21. password1 (up 4)

22. princess (New)

23. azerty (New)

24. trustno1 (Down12)

25. 000000 (New)

Let us know what you think, and how you cope with remembering all the various passwords you use.

Ho! Ho! Ho! The Christmas Gadget List……

Christmas gift list

Happy Christmas from us All

It’s that time of the year again when people are eying up their Christmas want lists and gadgets are almost likely to be up there near the very top for many of us.

From a new mobile to a tablet computer there are an array of gadgets that can keep us drooling and wanting the next best thing. So who are doing the most obvious pushing this Christmas Time? Who will Santa be wooed over by when he is choosing your and my presents this year.

Phones

The IPhone 5S is still high in the popularity stakes with its clean looks and fingerprint recognition. Will an Apple at Christmas be your thing. At around £549 to buy.
HTC One is the competitor and again sturdy design with HTC’s proven record of phone technology. Fabulous sound through two front facing speakers. Made from a solid piece of aluminium. At around £479 to buy.

Cameras

The cannon EOS 700d might be the present you are seeking from Father Christmas, get the professional shots you have always wanted. 18 Megapixel sensor and great build quality; this puppy will set you around £750 to buy.
Samsung have their NX300 out as well to compete and being Samsung the name is there as far as technology is concerned. It has a 20.3 Megapixel sensor and talks to all other Samsung devices. It will take around £600 out of your Christmas savings account.

Apple again

Apple MacBook Air is still popular, the 2013 edition. Only a small upgrade to previous versions but still maybe on your Christmas list if you are and avid Apple follower. Apple never does anything by half so this baby will cost you around £849 to buy.

TV’s

A large new TV, which would be a great Christmas present. Samsung again with their Samsung UE46F8000ST, 35mm thick with e tiny 5mm surround bezel has to be a great pick. Image quality is meant to be one of the best from an LED TV. And it includes all the gesture recognition that is coming in. Basically a computer on board containing Quad cores……This screen will steal around £1800 from your savings.
Panasonic have their TX-P60ZT65, which is rumoured to be the best HD TV out there with extremely fine picture detail. Smart with Internet options and also acts as a media streamer. However the elves will raid your bank account to the tune of around £3650.

To finish our Teaser list…..

How about a JL Built-in Wine Cooler, this small cabinet fits in the smallest of spaces in a kitchen and chills the wine, 7 bottles, and is very quiet with a noise count of only 36dB. Doesn’t frost up either it seem? This will cost your around £180, so not such a sting on those savings this time.

Well, have a great Christmas and a fabulous new year and let me know below what your gadget for Christmas would-be this year.

IT Tech Point

Is It Clouding my Judgement………?

cloud storage

As I was sitting at my office window and gazing at the sky, which unfortunately is more times grey than blue, I started to think about the shapes of clouds out there and obviously then being a geek my mind was drawn to cloud computing and all things to do with it.

I have trodden the boards of the IT stage for a number of years now, and it’s always fresh as new development is always on the horizon. The use of the term cloud has always seemed to have been thought up as a throwaway term by some marketing executive or journalist at some point, and has then just stuck with us. In practice – it is simply the Internet to most people, which has been around for many years. Of course, for some of us, the connection has been not too reliable, and it has occasionally been almost impossible to connect to over the years. But basically it all boils down to areas of storage on the Internet where data and websites live and we can all marvel at their content.

It is amazing how it has changed the world’s habits over the short time it has been around. We work there, shop there, talk there, and then we spend a disproportionate amount of our free time there.

Of course things have developed over the years, and we are now able to connect much more easily. In fact when our Internet connection goes down we are sometimes at a loss, all we have and do is attached to it. That feeling of your right arm being cut off … second only to those times when you misplace your phone…

However, I digress, what about this cloud thing. Well I suppose the natural extension to the Internet and surfing web pages is the fact we can put most, if not all, of our lives up on the Internet. It’s then stored on servers sited all around the world, thankfully not in an actual cloud. Although a friend of mine recently told me that his elderly mother had reasoned that this is why the weather is deteriorating, we are putting far too much stuff up in the clouds … an interesting thought.

Cloud storage has become a big thing, and also of course cloud based applications. Both allow mobile devices to carry out what seems to be very complex work, when in fact they are merely displaying it and the work is being done elsewhere.

Companies are now letting us sign up for free online storage space. When we upload data to it,  it can be seen from any handheld connected device we have; we can also share it with others more easily. This all sounds good, and in the opinion of many it is the way ahead. Sceptics have worries about security, who has access and who actually owns your data? What happens if the the server is down and you can’t access your data? All these are reasonable questions and need to be answered, and the cloud is not necessarily the best option for everyone. It may even only be a supplementary solution for some people and companies.

My personal experience has involved using it for storing various documents and information that I may want whilst out and about. There is nothing worse than being somewhere and remembering that the file you want is on your storage at home or office. In the past I used to email myself things, and when out and about if I could access my email account I could retrieve the data. Then came pen drives and I could carry vast amounts of data around in my pocket on something no bigger than a postage stamp. Think of the security risk with that, there have already been a few red faces from such items being left unattended.

With regard to the best cloud storage solution out there, that varies depending on who you speak to. In a lot of cases people have simply stuck with the first one they tried.

I can really only talk about Google Drive and the use of Google Drive and Google Apps. I have used them for some time and found them to be exactly what I need, allowing me to access data from my PC at the office, my Laptop at home and my phone and tablet as I travel. All are working on the same document held in the cloud so there are no duplicates or multiple versions. Google Drive also lets you share documents and I have worked with documents in situations where they were getting updated by a number of people simultaneously. The usability of the Google Apps side I always feel could be much improved, but then I am a Microsoft Office trainer and always use that as a measuring stick I am afraid.

Other offerings out there are many and more are arriving every day, such as Microsoft’s Sky Drive, Dropbox, Justcloud, Live drive, Apples Icloud and many more.

Which is best for you? Well it is difficult to choose, some people choose because of the space they are given, others because they thought they would give it a try and have just stayed there. I chose because I had tried Google Apps and found them an interesting start to online applications. Then I wanted to share files and found that Google would allow me to edit files as well as share them. I then started to get into Android, Google’s mobile operating system, and my account simply and seamlessly joined together and everything worked everywhere. What else did I need?

I hope this explains the move from the hard drive in your machine to the cloud. The use of it will only increase, driven by the 4G network expanding and access to the Internet becoming faster and more available. You may have to jump to a cloud at one point, so check it out – there is loads of information about it out there … where?

In the cloud of course…

Ian Thomson
Consultant at
IT Turning Point

Online or Offline

training and consultancy

Well the debate has heightened again about the use of Online to purchase goods and services. With the closure last month of Jessops, Blockbuster, Comet and HMV where do we stand with regard to keeping a healthy shopping and retail sector and the use of the Internet.

Initially when the Internet came around the speeds were too slow, major companies did not adopt the Internet quickly so choices were limited to what you could purchase. The security element was also a major concern.

However nowadays this has all been overcome and the Internet has flourished into a massive repository of all things. There is very little you cannot find somewhere on the Internet and usually cheaper than in the high street stores. There of course is still the area of security with a customer leak of details almost monthly from somewhere. The sellers are not all major companies and this can lead to failed promises and customers being let down and finally there is the aspect of dealing with someone who is not there face to face.

When we purchase from a shop and have problems we can usually juts go right back there and see someone face to face who will take ownership of the issue and get it resolved. (With some exceptions and horror stories of course). I can relate to the online scenario  having had a problem with a TV I purchased and the manufacturer wanted nothing to do with the faulty unit and the retailer online I had dealt with said there was nothing wrong with it. I was frustrated and felt I had nowhere to go.

So what is the reason we are going over to online so much. Well as you can probably imagine there are various reasons and here are a few I am sure you can identify with: –

  • Convenience of being able to shop from your own home at any time.
  • More and more traffic on the Internet nowadays is via mobile devices and it makes it so convenient to shop.
  • Things can usually be purchased and delivered cheaper than in the local store.
  • The Internet has become of age and is more acceptable to this generation.
  • Media is moving mostly to digital, films, music, etc.
  • And more.

This list is not exhaustible, but it is our fear that we will lose so much by going this way completely. I am a self-confessed GEEK and love where technology is going and the flexibility of the way we can do things. But, I am also sometimes of the opinion that it would be good to go and see and feel some products before we purchase them and also to chat to someone who knows something about them. I also believe in the local market and the local business owners making a living.

What are your thoughts and opinions? Is this move a good thing or a bad thing?

How can business adapt to this and keep them afloat and busy?

Ian Thomson
Founder/Senior Trainer/Consultant
IT Turning Point