More Businesses Will Soon Be Using Voice Assistants

“Hey Cortana, remind me to contact Bill at Acme to set up that sales meeting.”

More business people are relying on their voice assistants and AI chatbots to help them save time and effort, according to market research firm Spiceworks. After surveying more than 500 technology professionals throughout North America and Europe, they found that 40% of large businesses and 15% of smaller ones will now be using voice-assist technology to improve their business efficiencies.

Voice Search

Right now, Microsoft Cortana is the most commonly used AI assistant for businesses, at 49 percent – and 14% of businesses are using AI chatbots, with their Microsoft collaboration tools like Slack and Teams. This is probably because it’s so accessible and is integrated into Windows 10. Apple’s Siri isn’t far behind at 47 percent – it’s integrated into iOS and macOS.

Some of the tasks respondents use voice assist for include:

  • Voice-to-text dictation
  • Employee calendar management
  • Customer service purposes
  • Helpdesk management tasks
  • Sales and marketing

New Players in the Business Voice-Assist Marketplace.

Integrating voice assistants in the enterprise market is unleashing new use cases for the technology. In November 2017, Amazon launched their Alexa for Business platform, which lets businesses to create their own Alexa skills.

IBM recently launched their Watson Assistant for businesses. They plan to license it to enterprises so they can build customized, interactive tasks into their own products and services. The Watson Assistant is more focused on customization and privacy than are Google and Amazon. This might give IBM a competitive edge in the business marketplace.

Watson allows for better-tailored voice interactions and eliminates the need for a universal wake-up word like “Hey Siri” or “Alexa.” Plus, you can train the assistant using your own datasets. This makes it easier to set actions and commands.

The Watson Assistant also gives each user control over their personal data. It doesn’t pool users’ information and allows each person to control which Watson-powered devices and applications can access their data via the IBM cloud. The technology then learns and remembers each user’s preferences.

IBM is introducing their Watson Assistant to hotels, hospitals, banks, offices, restaurants, connected cars, and more. They’ve partnered Harmon where they’re using the Watson Assistant in a Maserati concept car. The Munich airport is also using IBM’s Watson Assistant to power a robot that provides directions to travelers. And Chameleon Technologies is using it to control temperatures in homes based on residents’ daily schedules.

What Voice Assist Will Demand from Your IT Professionals.

As voice assist becomes increasingly mainstream in the workplace, IT departments will face many challenges. As it stands now, the various forms of voice assist, machine learning and artificial intelligence operate on multiple platforms, operating systems, apps, and hardware. This will make it difficult to harness their potential without considerable investment in resources and expertise.

Not only will IT professionals need to have a complete grasp of its functionality and how to integrate it with networks and legacy systems, but they must also define and implement strategies for using it, and provide training and education for an entire pool of users in the enterprise.

As voice assist becomes more interactive and “personal,” IT professionals will need to combine their technical skills along with strategic and interpersonal capabilities to achieve greater success.

Adoption of the technology is moving slowly but is predicted to pick up as the power of voice achieves a new level yet to be discovered. Those businesses that stay informed and ready for and prepared for change will be better positioned to take advantage of its benefits. Some of these benefits include increased productivity and sales, more and better innovations, improved collaboration, and the ability to increase global market share.

Deep Learning

Voice assistant providers are improving recognition capabilities through the power of deep learning, a form of artificial intelligence (similar to facial-recognition technology). Deep learning goes a step farther than machine learning that is based on algorithms and historical data.

It will be able to predict a pattern of speech based on previous content without training by compiling vast amounts of data from the Internet. Voice assistants will be capable of taking meeting notes with much more accuracy. And, they’ll be able to identify different voices in a room to transcribe who said what.

Deep learning will be better at translating foreign languages. Imagine how this could fuel the growth of a global business, and the ability for more seamless collaboration. Right now, voice assist is a bit “robotic,” but eventually it will be more conversational in tone and respond more accurately due to deep learning.

But, Don’t Fire Your Administrative Assistant Just Yet.

Those who aren’t using them say it’s because they don’t see a use for them, that the cost is holding them back, and they worry about security issues. They also worry about technology distracting their employees and that it could negatively affect productivity.

Although voice assistants and chatbots are helpful in the workplace, the technology still needs improvement. 59% said that it can misunderstand requests and 30% said that it is inaccurate when executing commands. And, 29% said that it can’t distinguish their voice from others.

Other than using them for simple tasks, voice assist has yet to become widely used in the workplace. If you have a lot of employees in one area, the technology won’t work for you. It has difficulty deciphering commands with there are simultaneous conversations taking place. But, as the technology improves, more will be willing to use it.

Is your business ready to meet the demands that voice assistants and future technology advancements will surely bring? If your small or mid-sized business is struggling to manage your existing IT systems, or you can’t keep up with IT security concerns, it’s time to consider partnering with a Technology Solutions Provider. In this way, you’ll be prepared for what’s coming next in the world of voice-assist, and other technologies that can help you better compete in your marketplace, improve productivity and ultimately your profitability.

What To Do When Your Privacy Is Violated And Your Details Are Public

Your relationship with the Internet started out so well! Long before you realized it, sites like Facebook and Google were tracking your every move and keeping records on you to you use against you. Fight back!

online privacy

It may have started with an American Online disc promising 40 hours of free time, or it may have started with your university email account and use was limited to time spent in the school library. Perhaps it was with odd-duck Juno, connecting to download new email messages and then only dialing back in to re-connect for a quick send-and-receive, and no real time spent “online”. Or it may have started after “AOL” was unlimited and free, and you weren’t among those who had to create a brand-new email address every time you needed to score more free time from a new disc – seriously, those things were everywhere!

No matter how it started, we’re all in the same boat today. Well, unless you’re still connecting from a university library computer anonymously and your home life is spent in a cabin in the mountains somewhere living the life unplugged. Side note: There’s a reason people pay to travel to the most remote locations in the world – unplugged – for a back-to-the-basics experience, sometimes all the way to staying in a tent in a sleeping bag and fishing or foraging for food. It’s ironic how we’ll consider paying for this as a vacation, given the access we have to modern amenities like running water, indoor plumbing, air conditioning, and maybe a Keurig.

Are we on information overload? Are we overwhelmed with data and addicted to being busy? Well, yes to both – but that’s not the real reason we revert to rustic living. It’s the feeling of control over everything in your immediate world and being in charge of your destiny. It’s knowing the unknown doesn’t live in some dark room halfway around the globe, waiting to steal your credit card information or plant malware on your laptop through one innocent but careless action on your part. We’re going to skip the part about possible bears or wild animals on that extreme camping expedition analogy we’re making here.

Back in the real world, where Google and Facebook exist, we now know that those are just two of the major organizations who use the information gathered from us online to benefit them. Yes, the fine print we accept without reading vaguely indicates the information they collect will be used to cater our online experiences to our preferences, etc., but no matter how you look at it, the primary benefactor in that data collection isn’t us. Google collects the data to serve us advertisements, deliver sponsored search results which are really ads that charge the advertiser a premium to show their search result at the top – from which, again, Google benefits. We’re not saying this is a bad thing – oh, no! But at the same time, we need to be incredibly cautious about what information we do share. After all, knowledge is power. We already know Google is in an extremely powerful position, being the exception and the rule, depending on the circumstances.

Now that we’re learning more about the Internet and how organizations are using data to target consumers – us – and we’re learning the unfortunate side effects – for us – about the relationships these organizations have with other major organizations who are willing to pay for our information. All so they, in turn, can then target us with more advertising and messaging. We refer back to the earlier comment about information overload.

The question we face is, what can we do? How can we take back control of life in the world where we connect to the Internet every single day, whether it’s to check email, post a status to Facebook, share an image on Instagram, or use Google to search for a recipe?

We’ll tell you.

There are steps you can take to see what information Google has collected on you. We warn you, before you follow these steps, be prepared to understand Google has far more information than you realize, and it can feel like an intrusion. It may feel like the last time you went to a physical ATM – way back in the day – and were worried about that guy behind you who wasn’t at least 4 feet back, and you were worried he’d see your PIN and rob you.

For Google:

  • Log into your personal Google Account. You already have one if you’ve read this far. Chances are you’re already signed in. How to know? This is simple: go to https://www.google.com/ and look in the upper right corner. If there is the avatar you’ve chosen or an image you recognize, you’re signed in. If not, there will be a blue rectangle that says “Sign In”.
  • Once you’re logged in, visit this link: Google Maps Timeline.
    • This pulls up Google Maps and may give you a dialogue box with a brief introduction: “Explore your timeline”, with the text under this that “Only you can see your timeline”.
    • “What’s Location History?” wants to tell you that you’re about to see a personalized map of all the places you’ve been with your logged-in devices. This is where you’re promised better commute options and improved search results.
    • You’re next promised control, with the option to delete anything you prefer.
    • Clicking through will take you to a page where Google tells you what it thinks your home address and work address are. These may be blank.
    • At the bottom left, there is a blue button: “Manage Location History”.
    • This is your option to delete the data Google has collected from your usages and stored.

For Facebook:

  • Log into your personal Facebook Account.
  • Once logged in, there will be a drop-down menu in the upper right corner that just looks like a triangle pointing down. Click this to see the drop-down menu.
  • Select “Settings”.
  • In the left navigation menu, select “General”.
  • In the center panel, you’ll see a series of items – probably about a half dozen, depending on the latest iteration of Facebook. Underneath these menu items, you’ll see an option to “Download a copy of your Facebook data.”
    • Depending on your Facebook tenure and activity, this can take a very long time to download. Clicking this text will take you to a page with a green button that reads “Start My Archive”. You will probably be prompted for your password again at this point.
    • Facebook will happily email you when your archive is complete – it’s ok, they already know your email address, remember?

This is not necessarily related to all those personality quizzes some Facebook users love about “Which Harry Potter Character Are You?” or “What Color Is Your Aura?” or “What Type of Dog Breed Are You?”, and the data that is collected through this – by the way, it’s typically your email address and your list of friends. With the news of Facebook selling information on over 80 million of its users recently, there is a large movement to #DeleteFacebook, but we’re not sure jumping ship is the answer.

Updating activity on Facebook isn’t as straightforward as it is on Google, but at least now you know what is being collected from you now from both and how to handle it. As we mentioned, knowledge is power, and the more power you can take back, the more control you have over your digital destiny.

Why I No Longer Charge My Mobile Phone Overnight and Why You Shouldn’t Either

Charging Mobile Phones

I just read this warning: “Don’t overcharge your mobile phone. Make sure you unplug it from the charger after it reaches 100%. Don’t leave it charging overnight.”

Why is this?

It’s because your mobile phone charger doesn’t stop charging after your phone reaches 100% capacity. It keeps topping off the charge during the night. This is called a “trickle charge.”

Charging Mobile Phones

While you’re sleeping, and the phone is plugged in, it works to keep fully charged by compensating for the small amount of charge it loses by just being turned on. This is bad because the trickle charge causes your mobile phone to retain a higher ambient temperature than it should. This ultimately reduces the battery’s capacity.

I wondered why I couldn’t seem to keep my phone charged all day. It’s barely three-years-old, and I’m already having battery issues! Now I know why. I’ve been damaging the battery all this time by charging it at night while I sleep. I wish I had known this before!

Mobile phones contain a rechargeable lithium-ion (or Li-ion) battery that charges faster than traditional rechargeable batteries. So, when we plug our iPhone or Android into a charger, it can get fully charged in just about two hours.

By keeping our phones charged overnight we’re increasing the amount of time it spends on the charger, thereby degrading its battery capacity that much sooner.

Hatem Zeine, the founder of Ossia, a developer of wireless charging technology, tells us: “If you think about it, charging your phone while you’re sleeping results in the phone being on the charger for 3-4 months a year. So even though the manufacturers try their best to cover this scenario, this process inevitably lowers the capacity of your phone’s battery.”

Batteries decay from the moment you start using your new phone. This means they gradually lose their ability to hold a charge. By charging your phone overnight, you’re increasing the amount of time it spends with the charger. As a result, it degrades the capacity much sooner.

If you’re like me, you’re always on your phone checking text messages, emails, calling people, listening to music, watching videos, surfing the Web and more. It’s no wonder the battery runs down so quickly. However, if we’re careful about the way we recharge our phones, we can get much more life from the battery.

The people at Cadex Electronics that make lithium phone batteries say:

“Go ahead and charge to 100%. There’s no need to worry about overcharging as modern devices will terminate the charge correctly at the appropriate voltage…Modern smartphones are smart, meaning that they have built-in protection chips that will safeguard the phone from taking in more charge than what it should. Good quality chargers also have protection chips that prevent the charger from releasing more power than what’s needed. For example, when the battery reaches 100%, the protection hardware inside the phone will stop current from coming in, and the charger will turn off.”

However, they go on to say:

Li-ion does not need to be fully charged as is the case with lead acid, nor is it desirable to do so. In fact, it is better not to fully charge because a high voltage stresses the battery.”

Don’t wait until your phone battery gets to 0% to charge it. A good time to charge it is when the battery reaches 35-45%. Doing this will help to preserve the battery life. If you do this religiously, then you should be able to keep your smartphone for longer than two years.

So essentially what I’ve learned is that rechargeable batteries are doomed to failure. They are constantly decaying from the moment you first turn on your brand-new phone and eventually lose their capacity to hold a charge. How depressing!

This is why my phone keeps losing its charge more quickly the longer I have it! I’ve owned my current iPhone 7 for over two years, and I’ve experienced a significant reduction in battery capacity.

Even worse, Apple tells us that constantly charging and recharging the iPhone battery isn’t good because the capacity of Li-ion batteries diminishes slightly with each charging cycle.

Most Android phones have a feature that allows for fast charging. They also have a chip with a Power Management IC (PMIC) that tells the charger when it’s receiving the higher-voltage fast charging to prevent it from overheating. Heat is a bad thing for all mobile phones. This is why you should never leave your phone in a hot car. The same goes for freezing temperatures.

So, what do the experts advise us to do? How should we charge our smartphones?

Here’s what the people at Cadex say to do:

“Don’t wait until your phone gets close to a 0% battery charge until you recharge it. Full discharges wear out the battery sooner than do partial discharges. Wait until your phone gets down to around a 35% or 40% charge and then plug it into a charger. That will help preserve the capacity of the battery. You should also keep your phone cool, as higher temperatures accelerate the loss of battery capacity.”

Another tip: Take off your phone’s case before you charge it so it won’t overheat.

Well, I guess this is the reason why I never seem to keep a phone longer than two years. This, coupled with the fact that Apple keeps coming out with cool new phones entices me to replace my old one. I know–This can be an expensive proposition. Maybe this is what the phone companies planned for all along–To keep us buying new phones! And with the pay-by-the-month plans that providers now offer, they make it even easier to swap out our not-so-old phones for a new one.

But for those of you who want to keep your phones for longer than two years, charge your phone during the day after it reaches 35 to 40 percent and unplug it when it reaches 100%. This might get you more longevity from your Li-ion battery so you can hang onto your phone for another year or so.

Why Do 4 Out Of 10 Companies Still Use Ransomware Friendly Anti-Virus?

If The Marketplace Distrusts and Has Moved Away From Legacy Anti-Virus and Switched To Next-Generation Endpoint Protection To Escape Ransomware Infection, Why Are You Keeping It?

Ransomware

All the way back in 2006, the word was getting out that Anti-Virus software must retire and make way for the Cloud, Next-Generation Endpoint Protection. AV served its purpose when systems were simpler. And hacking was a college prank, not a malicious attack for financial gain.

Ransomware, Malware, and non-Malware exploits were infants. Legacy AV could carry the load. But in this day and time, they’ve grown-up, and 53% of US organizations are blaming their tired, outdated Anti-Virus, as the cause for not preventing a Ransomware attack. Could your Legacy Anti-Virus be one of them?

It Takes A Cool Million to Plunk Down and Recover, From a Ransomware Attack.

$900.000 a year, is the average cost an individual company spends, on the Ransomware attack, paying the ransom monies, time used to respond, and productive labor time lost. In the US alone, the lost work time equals 44-man hours, responding to an attack, from attack to complete recovery.

44-man hours! That’s a little over a week’s work for one employee. The cost translates into paying that person’s salary, to do a job, you did not hire them to do. Is this good or wrong time management?

Do you know the percentages your Partners and Supply Chain suffered from your infestation?

Research recently provided by SentinelOne shows your affliction has a vast, direct and negative impact, on your Partners and third-party vendors. What happened to your company, magnified their loss and downtime, both in productivity and revenue, it’s the proverbial “domino-effect.”

Let’s look at those numbers SentinelOne provided:

  • 46% Downtime – Your Partners and third-party vendors suffered;
  • 35% Loss of productivity – Your Partners and third-party vendors suffered;
  • 20% Loss of revenue – Your Partners and third-party vendors suffered.

So, who’s to blame?

Worthless legacy antivirus software? Careless employees? Decision makers? Yes. All three have a hand in it. And we’ll explain how.

Let’s start with the legacy antivirus software.

According to Business Wire, a Berkshire Hathaway Company, Legacy vendors have failed to build solutions for new vectors – specifically, many legacy AVs still lack basic anti-exploit capabilities.” The key word here is “Exploit.” Exploiting is what a Ransomware programming-pirate knows and uses against you and your system.

Legacy anti-virus solutions are not able to keep up. Innovation is inadequate. The volume of attacks from:

  • DDoS Attacks
  • Malware Attacks
  • Ransomware Exploits
  • Viruses

Can not be charted. Hundreds of thousands of new strains appear daily. The best legacy anti-virus can’t keep up. It is overwhelmed. And here’s why.

AV infection solving depends on long-established signature-based identification methods to search for digital threats. What it struggles to overcome in today’s world, is the new strains. They are Signature-less and Fileless. The dangers go unchallenged and give a cyber-thief an easy way to access any unprotected enterprise networks.

The second culprit is the carelessness of employees.

According to Ponemon Institute’s 2017 State of SMB Cybersecurity report, sponsored by Keeper Security, The number one most significant cyber threat to your business is your employees. The cause of a breach was a whopping 54% from negligent employees.

But what makes them negligent? For starters device convenience. 50% of your data is accessible from a mobile phone. Not just a company-issued device. It could be a spouse or friend’s phone. A company, of any size, is a target. If your employee has 3 bars in the middle of the Sahara desert, your data can be accessed.

Secondly, your security and policies have gaps making it difficult to enforce your employees to follow proper protocols. According to the research, password policies lacked strict enforcement, 68% of the time. And 58% had no or unclear direction into password practices.

The third and final enabler.

I hate to be the one that says it, but the business owner or decision maker(s) prevent their protection from a Ransomware attack. They hang on to old beliefs. “It won’t happen to us.” Or “It costs too much to swap our legacy antivirus for endpoint solutions.”

45% in this group will pay the ransom, to get their files unlocked and returned, rather than the 55% that credit Cloud, Next Generation Endpoint protection. But those who spent to get their files back were targeted again and again and were attacked 73% of the time. The cyber-criminal sees that business as a bank atm. When they need some cash, it’s paid up or lose your files.

According to {company} Ransomware Specialists, “Cybercriminals will continually perfect their ransomware attacks. They will bypass your Legacy Anti-Virus. They will trick non-trained employees into infecting their organization. They will make you pay their ransom demands or sell your data to the highest bidder.”

Of the 70% who swapped from Legacy Anti-Virus over to Next Generation Endpoint protection, 96% are confident they will prevent future attacks.

To learn more about Next Generation Endpoint Protection and have 96% confidence you will prevent future Ransomware attacks give {company} a call at {phone} or email us {email} to speak to one of our Ransomware Prevention Specialists.

Data Breaches and Credit-Card Fraud Can Destroy Your Small Business

Most business owners are cognizant of the prevalence of fraud in the digital world today. According to Experian’s Global Fraud and Identity Report 2018, almost three-quarters of businesses believe fraud is a growing concern, and nearly two-thirds reported fraudulent losses over the past year.

Credit Card Fraud

What is Fraud?

Fraud occurs when an individuals’ payment information is used without their authorization. When hackers breach your network and access your customers’ or clients’ sensitive cardholder information, they have many opportunities to commit fraud numerous times. Anytime someone falsifies an identity and “tricks” a system into thinking the person making a purchase is someone other than who they actually are, this is considered to be fraud.

Fraud is Pervasive in Today’s Digital World

This is because the majority of business and consumer data remains vulnerable. As the value of digital information grows, so does the hacker’s motivation to develop methods to avoid detection from the latest technologies.

The existing account setup process requires consumers to provide extensive amounts of personal information along with passwords and secret questions. And data breaches provide this information to cybercriminals. When this data is stolen, it’s often used for fraudulent activities.

Fraud is a moving target just like the hackers. New tactics are evolving where criminals combine real and fake information to create new identities.

Most business owners just don’t have a handle on this – and they lack confidence in their ability to protect their customers and their companies from fraud.

One of the reasons for this is that their initiatives are mostly reactionary rather than proactive as many continue to use legacy cybersecurity technology rather than investing in new, more sophisticated data protection solutions. As a result, every month that goes by increases their vulnerability and exposure to data breaches and fraud.

Fraud is an ever-present and growing risk

For businesses in e-commerce, managing the risk of fraud is a delicate balancing act between providing an ease of use for customers vs. fraud protection. They struggle with mitigating fraud and providing a positive customer experience. Unfortunately, the customer experience wins out in most cases, and businesses are willing to risk fraudulent losses over losing customers to their competition. Ironically, they are setting their businesses up for reputational damage where they will end up losing customers anyway, fail to gain new ones, and possibly face financial penalties and litigation costs.

The 2017 Cost of Data Breach Study from the Ponemon Institute, sponsored by IBM, puts the global average cost at $3.6 million, or $141 per data record. That’s a reduction in the average cost in 2016, but the average size of data breaches has increased. It’s also worth noting that the average cost of a data breach in the United States is much higher at $7.3 million.

More than 50 percent of businesses say they still rely on passwords as their top form of authentication.1 And business leaders know that using passwords isn’t the most secure option. But customers are used to them, and business owners want to please them. They also complain that they lack the financial resources to adopt more advanced authentication methods when this would save them legal fees and penalties if/when their customers’ accounts are breached–not to mention their reputation and the future existence of their business. This, of course, is very shortsighted.

How data breaches and fraud are connected

Data breaches and fraud don’t usually occur at the same time and place. Cybercriminals won’t steal a customer’s information and turn around and use it for a purchase from the same business. So. it’s not easy for a business to detect when a breach occurs.

Data breaches are typically detected by using specific security tools that monitor all payment activity. Merchants should follow PCI/DSS Standards to identify and prevent breaches and remain compliant. PCI-DSS audits will help you find vulnerabilities in your system and reveal inadequacies that must be eradicated.

A successful case of fraud spreads like cancer

If a hacker can get one password, they may have the keys to other password-protected accounts. The more online accounts people open, the greater their risk. And most people have quite a few. If the hacker can figure out the password to someone’s email account, they may also have the key to their credit card and banking accounts as well.

You must remain vigilant to prevent data breaches and fraud.

What to do if you suspect fraud

A key indicator of evidence of fraud is in chargebacks where a customer disputes a charge on their credit card, and where you aren’t paid for the service or product. If your chargeback rate increases above a 1% margin, this is a good indication that you’re experiencing fraud.

In this case, you should hire a third-party auditor like an IT Managed Services Provider (MSP) to help bring you back into compliance and stop the thieves. They will detect where the problem(s) exist and if what they find indicates a data breach. PCI-DSS compliance requirements mandate that you do this to stop the fraudulent activity.

Of course, you should contact the card processor as well. They will connect you to the card providers who can often identify the point of access or detect a suspicious pattern of activity.

What You Can Do to Reduce Fraud and Data Breaches.

Use EMV Technology.

EMV (Europay Mastercard Visa) is the global standard to authenticate payment cards. EMV technology can help you protect your business from fraud. It ensures the card is legitimate and that the person using the card is the authorized user.

EMV chips are microprocessors that store and protect cardholder data. They use a unique cryptogram that’s validated by the card issuer. This makes it more difficult for hackers to break the code and steal card information to commit fraud.

Today, if you don’t use an EMV-capable terminal, and the transaction turns out to be fraudulent, you can be held financially liable for that transaction.

EMV has been used in the United Kingdom since 2004, and card-present fraud has gone down by 80% as a result. By comparison, without EMV in the U.S., fraud increased during this time by nearly 70%.

Protect Data in Transit by Using Encryption.

When credit card data is stolen, it’s considered a data breach. Considering the number of card payments your business processes in a month, hackers may view you as the “Pot of Gold at the end of a Rainbow.” In other words, your business is a prime target.

You can help stop the hackers from accessing data in transit by using end-to-end encryption (E2E) and point-to-point encryption (P2PE).

The advantages of end-to-end encryption are:

  • That you don’t need a separate key for the decryption of the data.
  • You have flexibility in deciding what data to encrypt.
  • You can choose specific configurations for more functionality.
  • The file size is small, and the processing time is minimal.

Point-to-point encryption encrypts transmitted data as it goes through a designated “tunnel.” This is used most often for credit card information that’s encrypted from the point-of-sale (POS) to the credit card processor.

With encryption, if a breach does occur, and data is stolen, it will be useless to cybercriminals in its encrypted state.

Protect Data at Rest by Using Tokenization.

Tokenization breaks up a sequence of data into pieces such as words, keywords, symbols, phrases, and elements called tokens. Tokens can be words, phrases or even whole sentences. In other words, tokenization keeps cybercriminals from using data by replacing it with meaningless characters. Tokenization is helpful for businesses that store sensitive card data for re-billing. It’s also one of the most effective and affordable ways for businesses to protect their customers’ confidential card data.

Combining encryption and tokenization is one of the best ways to protect your business from the devastating effects of a data breach.

Secure Your IT Environment

  • Ask your IT Managed Services Provider (MSP) to set up a next-generation firewall, anti-spam, and anti-virus solutions.
  • Ensure your POS and router are on different networks and separate from other systems that access the Internet.
  • Don’t use your business POS for surfing the Web. This can expose it to viruses and result in vulnerabilities that can be breached.
  • Assign separate login credentials for each user.
  • Forbid sharing of login credentials and enforce this.
  • Keep your user list up to date and disable accounts that are no longer needed.
  • Only provide remote access for users with a clearly identified need.
  • Don’t leave remote access software turned on when unattended.
  • Keep all software and anti-virus, anti-spam programs up-to-date.
  • Regularly run and review scans for malware.
  • Regularly have your MSP run vulnerability scans.
  • Ask your MSP to train your staff on the latest security threats and what to do if they come across one.
  • Train your staff how to detect unauthorized skimming devices that could be installed on POS or credit-card terminals.

Have Your MSP Train Your Employees on Cybersecurity Awareness.

Teach your employees about password security and make sure you enforce this behavior:

  • Don’t use words from the dictionary.
  • Don’t use names of family members.
  • Don’t reuse passwords from your other accounts.
  • Don’t write down your passwords or put them where others can see them.
  • Consider using a Password Manager (e.g., LastPass or 1Password).
  • Use password complexity (e.g., P@ssword1).
  • Create a unique password for work separate from your personal use.
  • Change passwords at least quarterly.
  • Use passwords with 9+ characters.
    • A criminal can crack a 5-character password in 16 minutes.
    • It takes five hours to crack a six-character password.
    • Three days for a 7-character password.
    • Four months for eight characters.
    • 26 years for nine characters.
    • centuries for 10+ characters.
  • Turn on Two-Factor Authentication if it’s available.

Teach employees about ransomware and phishing threats. These appear to be from an official like the IRS or FBI. If a screen pops up that says you’ll be fined if you don’t follow their instructions, don’t! If you do, the criminal will encrypt all your data and prevent you and your employees from accessing it. Teach them to:

Beware of messages that:

  • Try to solicit your curiosity or trust.
  • Contain a link that you must “check out now.”
  • Contain a downloadable file like a photo, music, document or pdf file.

Don’t believe messages that contain an urgent call to action:

  • With an immediate need to address a problem that requires you to verify information.
  • Urgently asks for your help.
  • Asks you to donate to a charitable cause.
  • Indicates you are a “Winner” in a lottery or other contest, or that you’ve inherited money from a deceased relative.

Be on the lookout for messages that:

  • Respond to a question you never asked.
  • Create distrust.
  • Try to start a conflict.

Watch for flags like:

  • Misspellings
  • Typos

Ask Your MSP to Help You with PCI Compliance.

PCI Compliance is not a one-time event but should be a continual process to ensure your IT systems are appropriately transmitting and storing sensitive data. It mandates that network and business practices are secure.

Failing to maintain compliance with the Payment Card Industry Data Security Standards (PCI DSS) can ruin your small business if you get hit with a data breach.

It’s not always easy to do this on your own. Your MSP can help by:

  • Performing scans of your network to identify and eliminate vulnerabilities that can lead to data breaches.
  • Monitoring network activity and blocking malicious activity before it can lock down or steal your data.
  • Providing you the tools and resources to promote compliance.
  • Implement data-breach protection solutions.
  • Help you sign up for a breach assistance/cyber insurance program that provides for reimbursement of certain card brand fees that are charged if data is compromised. Some cover the costs of a data breach, which can be upwards of $100,000 or more.

Protect Your Business from Data Breaches, Fraud, and the Resulting Consequences

When you take all of this seriously, you’re not just protecting your customer’s confidential information; you’re also protecting your business from fraud.

Most companies that experience a data breach will see a rise in cost to retain existing customers. And, they will also see an increased cost to acquire new customers. When you add these increases in cost to the loss of revenue from customers that choose take their business to your competitors, you’ll soon see how your damaged reputation dramatically affects your company’s bottom line.

You don’t have to face this alone.

The right IT Managed Services Provider can be your best ally against security threats. From helping you with integrated and compliant POS systems to implementing technologies like encryption and tokenization, and providing compliance and breach assistance, the right IT Partner is worth every cent when it comes to helping you secure your business against the devastating effects of credit-card fraud and data breaches.

The Future We’ve All Been Eagerly Anticipating Is Here – Are You Ready?

5G Wireless NetworksThe standard of next-generation telecommunication is no longer the future, but the present. You’re probably not using it, even though you should be, and you may have to wait.

When casual conversations bring up speed, it’s inevitable we hear the clichés about “faster than the speed of sound” or “faster than the speed of light”. Sometimes, if participants are up on pop culture, even “faster than Usain Bolt” is tossed around.

  • Which travels faster, light or sound? Light travels at about 300,000 kilometers per second, and the speed of sound is usually around 300 meters per second.

What is the fascination with speed? Faster cars, faster jets, faster roller coasters…we are compelled to increase speed and speed capacity – you may even have the speeding ticket to prove it! We’re an impatient bunch – or is it a competitive drive that fuels us further in our quest for the next fastest “thing”?

When conversations turn to tech talk, the topic of speed is generally relative to a generation. No, we don’t mean Baby Boomers versus Millennials. The speed at which data travels wirelessly, whether it’s over an organization’s wireless network or a major wireless provider’s network, puts consumers entirely at the mercy of current technology and our data connection. Have you ever been on a Google Hangout and had your connection interrupted? It’s frustrating, possibly embarrassing, and potentially costly if the Hangout was a sales pitch.

There are currently five generations of wireless communications standards:

  • 1G: The first generation of wireless cellular networks and technology was analog and considered the telecommunications standard since the 1980s.
  • 2G: Wireless data networks go digital! This is the generation that data entered into our wireless world, with the introduction of the text message. There are sub-2G generations, but these didn’t have a noticeable impact on our daily wireless use.
  • 3G: The third generation focused on telecommunication networks that supported faster data transfer speeds, regardless of the type of communication: voice calls, video calls, mobile or fixed wireless Internet. This was the generation that introduced the smartphone. This generation also had sub-generations with advancements to support faster speeds and better performance as a preparation of infrastructure toward 4G technologies.
  • 4G: Fourth-generation technology increased data speeds again and established thresholds for speed to qualify.
  • 5G: The future of wireless technology, implemented in December 2017 and anticipated to be available globally by 2020.

Note that last part: anticipated to be globally available by 2020. Currently, maybe five countries are using it based on wireless providers. Most of the larger providers are testing 5G implantation, including Verizon and AT&T in 2018. The complication is that the U.S. infrastructure doesn’t yet support 5G wireless technology, so even with the “Big Box” mobile service providers testing the technology, consumers won’t get the benefit – yet. But what’s crucial to keep in mind about the future is that 5G is more than faster data speed. The next generation of wireless technology seeks to enable new and incredible insights that drive efficiencies. In other words: faster and smarter! How is wireless technology smart? Glad you asked!

Given the explosion – not literally – of “smart” devices in the market, the Internet of Things reinforced the need for the new generation of wireless. In fact, beyond just wireless, 5G incorporates technologies like computing and the cloud for everything to be smart, and everything to connect – even smart vehicles! Technology is supposed to simplify our lives by finding ways to make things easier. Connectivity and integration further this notion, and underscores the direction of the future is with the Internet of Things.

  • What is the Internet of Things (IoT)? The IoT is the network of connected devices that have internal components enabling connectivity, like electronic sensors and software, which allow for the exchange of data.

The wireless economy and data standards are experiencing a massive evolution. Consumer appetite is skyrocketing, and the next generation will support an overhaul of the service model that allows wireless service providers to reduce costs to accommodate data needs while simultaneously driving revenue with new services. Adversely, the current generation actually incurs greater costs for data in cases like autonomous vehicles compared to the costs of its fuel. 5G will fundamentally change this service model.

All this talk of evolution doesn’t mean the existing model will disappear. In fact, the next generation – 5G – incorporates many wireless technologies, and improves upon those we already use (4G). 5G is going to change the way we interact, work, and live in general. As full-scale monetization is recognized – the cost to produce smart goods decreases for manufacturers, and the cost to support increasing data needs decreases for service providers, thus passing these reductions on to consumers – we can expect to see ever greater numbers of smart goods. For example, hospitals are migrating to electronic health records in greater numbers due to the simplicity of the centralized patient records and access to complete history at-a-glance, but the ease of submitting prescriptions to external pharmacies has also been increasing with major metropolitan hospital systems. From cars to hospitals, the 5G model will not only support but become critical to data needs in this evolution.

The transition to 5G will require the U.S. infrastructure to transform to cloud-based architectures with a virtualized core, and it’s expected that companies will spend over $300 billion by 2025 to upgrade and become compatible with 5G demands, including new data centers, new network transformation gear, and new modems/IPs.

There aren’t currently any mobile devices supporting 5G capabilities, but we can expect an upcoming surge of announcements with new products flooding the market once 5G is more widely adopted. Hopefully, the United States isn’t late to that particular game!

Excited for the future generation of wireless telecommunications, Qualcomm debuted the first 5G modem in 2016, and in 2017 European leaders established a baseline for next-generation standards. It’s safe to say the world is not just open to 5G, but embracing the changes in technology this next generation is ushering in.

Your Small Business Needs a vCIO to Manage These 10 Technology Priorities for 2018

If you’re the owner or CEO of a small business, then you’re probably already functioning as the Chief Information Officer (CIO) as well. Most small businesses can’t justify paying for both. This means you have to take time from your priorities to manage your technology, ensure that it’s secure and decide what IT solutions to use. It’s not as easy to do this as it was in years past, simply because of the fast-evolving nature of technology, and the increasing incidence of hacking and data breaches.

vCIO

But, did you know that you can “hire” a Virtual CIO (vCIO) at a fraction of the cost of hiring a CIO?

What is a vCIO?

A virtual CIO is a technology service provider who serves as your CIO. They help you develop an IT Strategic Plan, with up-to-date resources to ensure security, productivity, and efficiency. Rather than hiring your vCIO, you pay for the service on an on-demand basis.

This frees you from the daily worry about technology and whether it will run as it should. It also frees up your limited internal resources and allows your employees to concentrate on their core responsibilities.

A vCIO Will:

  • Gain an understanding of both your business and your technology infrastructure and make sure your IT is aligned with your business goals.
  • Help you with IT budgeting and cost control strategies to achieve your priorities and avoid unnecessary costs.
  • Analyze any inefficiencies in your existing IT infrastructure and centralize/consolidate resources and operations to promote considerable financial savings.
  • Advise on Organizational IT Design and replace outmoded processes so you can pursue market opportunities and overcome business challenges through updated, value-based technologies.
  • Effectively incorporate technology into your operational processes and ensure security at all times.
  • Develop and IT Strategic Plans that aligns with your budget.
  • Learn about your competition, and what new IT solutions they are using.
  • Interface with your managers and users to ensure that you meet your IT goals.
  • Identify and evaluate the impacts of your technology decisions.
  • Conduct ongoing evaluations to assess your IT needs and provide service performance metrics.
  • Manage technology needs for specific projects, whether they are new ones or ongoing.
  • Deliver monthly updates to your management, provide Quarterly IT Summaries that reveal the condition of each component of your network, and prepare other reports as required.
  • Provide procurement assistance to ensure you get the best prices on hardware and software.

Your Virtual CIO Will Help Your Achieve These 10 Technology Priorities for 2018.

 Cybersecurity

Security is an essential factor for any organization, and small businesses like yours are the biggest target for hackers today. Risk assessment, data protection, training awareness, and third-party security practices are necessary to ensure maximum security and protection. Continuous diagnostic monitoring is required to view your network, identify risks, quantify attacks and/or breaches, and mitigate them. Digital forensic tools are especially important for companies that require regulatory compliance and incident management. Identity and access management is a security practice that enables only authorized individuals to access resources to comply with security and compliance requirements. These are crucial elements for any business. Your vCIO will manage all these and other cybersecurity requirements for your business.

Disaster Recovery and Business Continuity

Disaster recovery and business continuity refer to your organization’s ability to recover data after a disaster occurs and when IT services are shut down or compromised. Both practices involve the process of backing up data and preparing policies and procedures to implement in the event of a disaster. Your vCIO will confirm your business can stay up and running no matter the IT disaster, manmade or natural.

Mobile Workforce Technologies and Solutions

With the BYOD (bring your own device) trend, organizations are using mobile devices more than ever. Your business is competing in a mobile, technology-driven economy, and you must rely on your mobile workforce to ensure customer satisfaction and product/service innovation. The right mobility solutions ensure secure and simple access to data, tools, and applications from any location. Your vCIO will help you consider applications, support, ownership, security, and communication issues and policies that will ensure your mobile workforce is always productive, and your data is secure.

Cloud Computing, Software as a Service (SaaS) and Virtualization

Software as a Service utilizes a cloud-computing infrastructure to deliver a single application to your employees no matter their location. This is opposed to relying on the traditional one application per desktop. Cloud services are available to your employees via the Internet from a cloud provider’s servers and used instead of your company’s own on-premises servers. Virtualization refers to the creation of virtual servers, desktops, storage devices, applications, and computer network resources. You can virtualize your entire IT infrastructure or just specific aspects of it. Cloud services and virtualization provide easy, quick, scalable access to resources, applications, and services, and simplifies your overall IT infrastructure to promote efficiency.

Enterprise Resource Planning (ERP)

Enterprise Resource Planning involves the use of business management software that combines a variety of integrated applications to store and manage data for all aspects of your business operations. It includes product planning, manufacturing, marketing, inventory management, shipping, invoicing, accounts receivables and payables, and more. Software as a Service Enterprise Resource Planning (SaaS ERP) supports remote hosting of business IT services. It’s also known as Cloud Enterprise Resource Planning (Cloud ERP).

Strategic IT Planning

Strategic IT planning focuses on your organization’s specific needs and how to best use technology to meet them. IT is a strategic capability to be used and integrated into planning and projections with consideration of future IT innovations and business growth. Your vCIO will work with you to determine how technology will help you achieve your business priorities and prepare guidelines and policies that support your vision with the right IT solutions.

Networking: Data and Voice Communications

Data communications refer to the electronic transmission of information for storage and processing, while voice communications refer to systems such as mobile devices and VoIP systems. Your vCIO will help you implement the best communication solutions to keep your organization connected and up and running.

Legacy Application Modernization/Renovation

Legacy application modernization is the process of refactoring, re-purposing, or consolidating legacy software programs to align with a company’s current needs. This enables you to benefit from the advantages of new development without the risk and cost of replacing legacy systems.

Business Intelligence and Analytics for Big Data

Business intelligence, or BI, is a term that refers to a variety of software applications used to analyze an organization’s raw and big data (massive amounts of data). Business analytics is the process of exploring and investigating an organization’s data with emphasis on statistical analysis. This is becoming more important for even small businesses today. They are relying on software solutions like Microsoft Power BI (Business Intelligence) to transform data and create interactive reports to help them analyze data to reach their goals.

Shared Services

Many parts of an organization use the same services and resources. Shared services involve the consolidation of business services and resources used by multiple parts of an organization. For example, with service portfolio management, organizations can define and manage services and resources. By incorporating automation, virtualization, advanced analytics, and other digital technologies into your operations, you can streamline processes. These technologies also may enable you to make better decisions and improve the quality of customer interactions.

By taking advantage of the services a virtual CIO provides, you’ll enjoy all the benefits of a CIO without the added costs. Your vCIO will protect your important data, help you get the most from your technology budget, provide customized reports and recommendations, and ensure you meet the technology challenges of 2018 and beyond.

Is Your Backdoor Open? You’ll “WannaCry” When the Hackers Get In

Dangerous cyberattacks have been released by a group of hackers known as The Shadow Brokers. These exploits will lock up your data for good – no ransom, no return.

encryption backdoor

But this isn’t all they do – they’ll also leave behind a parasite that lets them “hang out” inside your computer, infect others, and re-enter through a backdoor.

What’s really scary is that these attacks are getting past traditional next-generation security measures. In 99 percent of the cases, security researchers found that these threats bypassed security tools.

EternalBlue (the worst-ever recorded ransomware strike): In February 2018 EternalBlue was ported to all Windows operating systems. By exploiting a vulnerability in Microsoft’s Server Message Block (SMB) protocol, EternalBlue allowed the dangerous ransomware virus WannaCry to propagate and infect 230,000 computers.

EternalChampion and EternalRomance are two other exploits that were also reported at the same time EternalBlue was.

And then there’s EternalRocks, also known as MicroBotMassiveNet, which is a computer worm that infects Microsoft Windows. It uses seven exploits that were developed by the NSA and unknowingly leaked to hackers. As a comparison for you, the WannaCry ransomware program only uses two NSA exploits. Experts tell us that EternalRocks is much more dangerous.

EternalRocks installs the Tor anonymous network to conceal Internet activity. Your server then downloads EternalRocks to your computers. To avoid detection, it calls itself WannaCry. But unlike WannaCry there’s no kill switch.

EternalBlue and these other exploits use a backdoor implant tool to infect your systems. Plus, EternalRocks is self-replicating worm and leaves the back door open via DoublePulsar so that other hackers can load malware on your computer.

Backdoors leave you exposed to a multitude of cyber threats.

A backdoor is a port or malicious application that provides access to a server or network. It provides hackers with unauthorized remote access to your network by exploiting security procedures and authentication. Backdoors can be used for cybercriminals to gain remote access to your computers.

Backdoors work in the background and are hidden. They are much like other malware viruses and, therefore, difficult to detect.

A backdoor is one of the most dangerous types of computer parasites. It gives a criminal the ability to perform any possible actions on your computer.

The attacker can:

  • Spy on what you do,
  • Take over your files a user,
  • Install additional software or malicious threats,
  • Control your organizations’ entire PC system,
  • Implement keystroke logging and screenshot captures,
  • Infect files,
  • Encrypt your data, and
  • Attack other hosts on your network.

Plus, the parasite can work automatically on its own and do what the hacker wants.

A backdoor not only allows the hacker to access your computer and network, but it also lets them come back and enter your system again and again.

Backdoors are complicated for system administrators to deal with. In most of the cases, it’s very difficult to find out who is controlling the parasite. In fact, all backdoors are really hard to detect.

Before they can find out how hard it will be to block the hacker’s access, system administrators have to figure out the methods hackers will use. There are so many exploits now that makes this a very difficult, if not impossible task.

Plus, some of these backdoors can’t be detected because of the way they’re designed.

Even if your admin changes passwords when an attack is discovered, backdoor utilities can be programmed to give the hacker repeat access to your system.

They do this via computers on your IT system that don’t log on to the network very often. Because it appears that no one is using the machine, your system administrator doesn’t detect that a hacker is actually using it.

There’s another kind of backdoor utility that lets the hacker return to the network within a short period of time. This way they don’t have to find a vulnerability to exploit in order to gain access. But if your system administrator does detect them, they’ll just take the time to look for another vulnerability. As you can see, this can be a constant battle.

Password cracking is the most-used method of backdoor hacking to breach network security.

The hacker locates your accounts that use weak passwords. These are accounts that aren’t used often. The hacker creates an access point by changing the password. When the system administrator searches for the fragile accounts, the ones that have weak passwords, the passwords have already been changed won’t be visible.

Backdoors can degrade your Internet connection speed and system performance. They prevent you from removing them by hiding in files. Plus, there are no uninstall features to delete them.

There are 5 ways backdoor threats can get in:

  1. You can accidentally install them on your computers. Sometimes they come attached to phishing emails or file-sharing programs. They look safe and can trick you into opening and executing them.
  2. They get installed by viruses like spyware or Trojans without your knowledge. Then they infect each profile for those who use that compromised computer.
  3. They can be manually installed by malicious insiders who are authorized to install software on your computers. Then the backdoors can spread by exploiting remote systems with security vulnerabilities.
  4. Some backdoors come with applications, including legitimate ones. Once the hacker gains access to a computer and access to the software installed on it, they have the authorization to take control and infect the software.
  5. Backdoors can infect a computer by exploiting software vulnerabilities. They work just like computer worms and automatically spread without you knowing it. You won’t be alerted by warnings, setup wizards or dialog boxes when this happens.

What can you do to protect your business from backdoor threats?

Backdoor parasites are extremely dangerous and must be removed from the system. It’s essential that you contact your Technology Solutions Provider so they can do the following:

  1. Block external access to all Server Message Block ports on the public internet.
  2. Patch all Server Message Block vulnerabilities.
  3. Block access to C&C servers (ubgdgno5eswkhmpy.onion) and
  4. Install a DoublePulsar detection script.
  5. Make sure to use an up-to-date analytics tool to monitor for insider threats.
  6. Monitor your system for any newly added scheduled tasks.

 Contact our cybersecurity experts. We can “shut your backdoors.”

New NIST Guide Enables Digital Forensics Investigators

NIST has recently released a quick start guide that outlines the procedures used to place test data on a mobile device by forensics experts during an investigation. In many criminal cases, the authorities can gain valuable information by examining smartphones, computers, and tablets belonging to those involved. The NIST guide provides important directions, guidance, and techniques for setting up a device for use with mobile forensic tools.

Meetings

 

Criminal Investigations and Legal Trials

Recovering data from digital devices has become an important part of many criminal investigations. The information found on a phone can prove helpful in providing clues as to the whereabouts and activities of suspects. This data is often used during trials and should be as accurate as possible since a legal verdict could be determined based upon what is found on the suspect’s computer, cell phone and/or tablet.

Even the best forensic investigators admit that data extraction from mobile devices can be tedious. This is due to the many differences in the types of data and formats used from one device to the next. Testing can be performed by anyone in the law enforcement community, but the official Federated Testing software must be utilized.

Tools for Law Enforcement

For years, law enforcement and forensic experts have used the data found on mobile phones and computers during the course of their investigations. As this science has moved forward and evolved, it has become necessary to create guidelines for populating mobile test devices. This eliminates much of the guesswork and helps a forensics team to be consistent with their testing procedures. This, in turn, helps to guarantee more reliable results. Consistency and reliability are key aspects of the type of data that can be used during a legal trial.

The two basic strategies for populating a mobile phone, computer or tablet with testing tools are:

  • Place test data on a new or sanitized device
  • Place test data on a user device and adjust as needed

Mobile forensic tools are primarily used with Federated Testing, but can be used with other test methods. By undergoing these forensics tool tests, investigators can ensure greater accuracy and easy sharing of their results with others in the forensics community.

Contents of the NIST Guide

The NIST Guide begins by describing the primary types of data found on a mobile device or computer, including, but not limited to:

  • Text messages
  • Photos
  • Emails
  • Social media posts and information
  • Call logs
  • Contact lists

A mobile device may contain hundreds of data elements that could be helpful to investigators. In many cases, it’s best to narrow down the search to data that seems to be most relevant to the specific case. This can prevent investigators from wasting valuable time on unimportant information. As the case progresses, investigators may determine that other data could also be helpful to uncover. Testing can be performed as necessary on those.

Divided Sections

The NIST document is separated into sections and appendices that describe the various methods of populating and documenting data found on a mobile device including the SIM/UICC. These are outlined below:

  • Section 2: Document Device Data
  • Section 3: Personal Information Management (PIM) Data: Contacts, Calendar & Memos
  • Section 4: Stand-alone Data Files
  • Section 5: Call Logs
  • Section 6: Text Messages
  • Section 7: MMS Messages
  • Section 8: Location Data
  • Section 9: Browser/Email Data
  • Section 10: Social Media Data 214
  • Section 11: Other Applications of Interest
  • Section 12: SIM/UICC Card

How to Begin

The guide provides step-by-step instructions for populating and documenting a device. The guide recommends performing these steps for each mobile device tested.

Begin by choosing the most relevant data types that seem pertinent to your inquiry or investigation. If this data does not result in the information hoped for, testers can always go back and perform these steps on other types of data found on the form.

Appendix A-Acronyms

Appendix A explains all acronyms used in these testing procedures. It is necessary to assign an acronym to each item to reduce the amount of writing or typing. These can be confusing since some are so similar. Therefore, it is recommended that testers keep Appendix A handy to make sure they’re using the right terms when filling out their paperwork.

Appendix B-Mobile Device Documentation

Next, fill out the template found in Appendix B for each device to be tested. This template will ask common questions about the type of equipment including the name of the subscriber, device make, and model, IMEI for the phone and other identifying info. The IMEI can be found by going to Settings, then choosing About and scrolling down to where the IMEI is shown. Enter the number with no spaces or dashes on the form found in Appendix B. In this area, there are many other identifying numbers required on the form.

Appendix C-Mobile Device Data Example

This example form has been filled out for one “Stevie Ray Vaughn”. Though it is somewhat humorous, it shows the types of data to be placed in each portion of the form. His full name, address, email address and birth date are shown. If a photo of the phone’s owner is available, that should also be included. Calendar data can be important because it shows the daily routine, meetings, and people that a suspect might be associated with. It can help investigators create a timeline for the last few days of a person’s life.

Appendix C is quite lengthy due to the fact that SMS and EMS messages are recorded here along with call logs. Many people exchange dozens of text messages with friends each day. Include information about who sent the message and its contents. Make separate entries for unread messages and voicemails. Deleted messages and calls should also be recorded.

Federated Testing Project

The Federated Testing project at NIST is an extension of the Computer Forensics Tool Testing (CFTT) Program. This program has been successful in helping laboratories and forensic experts accurately uncover important information from mobile devices and computers. It enables consistent reporting and sharing of results across various labs and law enforcement agencies found across the United States.

Using Yoast SEO to Write Effective Meta Descriptions

The term, “meta description” may seem foreign to some but we all see these descriptions each time we search for something online. The meta description can contain up to 320 characters and should be an interesting summary of what your website is all about. It shows up in the search results as those first few words/lines that explain the essence of your website or post.

Yoast SEO Descriptions

How Meta Descriptions Work

Each time we type a search term in the browser, a number of results will come up. For each one, there’s a 320 character description of the site or page. People usually decide which site to click on based on what these meta descriptions say. That means it has to be snappy and fresh. The wording needs to grab your attention. It has to sound enticing. Think of it as a short, but powerful sales pitch. Potential customers are far more likely to visit a site that sounds unique, interesting or entertaining than one that sounds boring.

Though search engines make it clear that there’s no direct advantage from writing good meta descriptions, there is a very strong indirect benefit. If you’ve written a good meta description, then this will improve your click-through-rate (CTR). As visitors click-through to your site, the search engine uses that information as a way of determining that your site was aptly and well described. This will improve your position in the search results.

It is important to point out here that Google will not always show your unique meta description. Sometimes they generate their own description of your business based on factors like the search term and type of business it is. This is where keywords come into play. Most business owners now understand at least the basics of keywords and how they work. If your content is well-optimized, then it should reflect that by serving as a great meta description.

Google changes the way their search engine works at times and this can certainly throw a wrench in all your good plans. However, that should not stop business owners from doing sound keyword research and creating unique content with those keywords. It goes without saying that keyword stuffing is bad and should be avoided at all costs. Always observe the current standards for keyword density in a page of text, which usually runs around 2 to 2.5 percent.

Yoast Free or Premium?

Yoast offers a free and a premium SEO service. With the free service, you get one keyword for each page of content. The premium service allows five keywords for each page. The premium service also does a readability check using the Flesch Kincaid test which measures the grade level of your writing. Since the world wide web is filled with people from all backgrounds and educations, Flesch Kincaid usually recommends writing copy that would be easy reading for a third to fifth grader.

Use short concise sentences. Avoid big words that are not readily understood unless you are writing technical information for a specific audience, like IT experts. Try to use action verbs instead of passive verbs. Use subheadings and catchy taglines. Whatever you can do to make your site more attractive, unique and fun, will help. You can count on getting more traffic and higher conversion rates.

How to Use Yoast SEO to Write Meta Descriptions

If you don’t write a unique meta description, Yoast will produce one. Usually, it simply takes the first three lines of content on your page or post and uses that. If you’d like to edit that, then click on the “edit snippet” button. This opens the snippet editor. There are fields there to edit the SEO title, slug and meta description. As you type, your new meta description will show up. You can make changes until you feel it’s just right. The snippet editor has an orange bar at the bottom that will become green once you’ve typed enough information.

Many site owners use the first few lines of content on their page or post as the meta description. If your site has good, professionally written content on it, then there’s nothing wrong with that. However, if you feel you could improve the text, then, by all means, do so. If you can get the hang of this and really write powerful meta descriptions, it can greatly improve your click-through rates.

How to Write a Superb Meta Description

Once you’ve decided that this is something worthwhile that could improve your bottom line, it’s important to put your best foot forward. In order to write effective meta descriptions, you may need the help of a good copywriter. Copywriting is all about utilizing words to persuade searchers to click on your page. With only 320 characters or about two to three lines of text, it’s important to make every word count. Below are two writing examples to show you the difference between professionally written text and that of an amateur.

Good Meta Description:

Apple

https://www.apple.com/

Discover the innovative world of Apple and shop everything iPhone, iPad, Apple Watch, Mac, and AppleTV, plus explore accessories, entertainment, and expert device support.

The above meta description from Apple does contain some good keywords but it doesn’t feel awkward or forced. It’s informative. It’s also important to note that this meta description was written using the older rules where 155 characters were the rule. Today, we’re seeing longer snippets that contain more information to help searchers decide what to click on.

Bad Meta Description:

Mary’s Bakery

https://www.marysbakery.com/

Get some good donuts and cakes at Mary’s Bakery located in downtown Minneapolis. We cater and deliver. Our baked goods are tasty and made with quality ingredients.

Though the above meta description does contain some valuable information, it’s boring. The shop owner wastes valuable space here to tell consumers where they’re located. This is something that many searchers will not care about in their initial search. Use this space to talk about delicious pastries, cakes, and donuts. Talk about your award-winning cupcakes with buttercream icing. This is how you get people to visit your site and look around.

Caution!

Be sure that your meta description accurately describes your page or post. Yes, the wording can be flowery, powerful, strangely attractive, etc. But it should also be truthful. If you make promises you can’t keep, then searchers will quickly hit the “back” button. This can cause your site to fall in the search listings.

As mentioned above, avoid keyword stuffing. Just about all web visitors today understand what keyword stuffing is and most don’t like it. The reason? Keyword stuffing makes a section of text read awkwardly. It is typically not well-written content and it doesn’t make sense to your human visitors. Remember to write your meta description for humans, not for search engines.

Instead, focus on writing interesting descriptions and unique content for your human visitors. In the end, search engines will not be purchasing your products and services. Humans will, so cater to their needs, wants, desires, whims—and you’ll be rewarded with higher click-through rates and stronger sales.