Securing your tablet and smartphone

Think for a moment about how much of your life is on a tablet or smartphone. Personal information such as texts, emails, apps, photos, passwords, financial information, as well as work related information.

As time and technology move forward, tablets and smartphones become an item we cannot seem to live without. These devices have become a necessity in the workplace, especially for those people who travel frequently – you can even translate signage abroad or do videoconferencing. They’re convenient, easier to carry, have built-in cameras, thousands of handy apps, and even offer GPS technology. There’s no doubting the convenience these devices offer – but, here are a few things to be aware of whether you use these devices for personal use, work, or both.

Now, with all this great technology comes the risk should your device(s) be stolen or lost. Losing your smartphone can be very stressful, and costly. With this in mind, there are some relatively easy steps you should take to secure your devices so that the door is not left wide open for a hacker or thief to steal your valuable information.

  1. Set a passcode/password. A passcode is a basic multi-digit code. Without a passcode, anyone who has your device in hand can access everything. Many of the newer devices also offer an option to use a longer alphanumeric password. Immediately after you have set your passcode or password, you should turn on the auto-lock function and set it to as short a time frame as possible. Usually 2 – 5 minutes is recommended. It will save a little bit of battery life, and by shortening the window, it’s much less likely that someone will stumble upon it while it’s still powered on.
  2. Be App-Savvy. Installing apps from Amazon Appstore, Microsoft’s Windows Store, Apple iTunes, or Google Play is much safer. Bad Apps can be loaded with Malware which can infect your device and steal your information. Be leery of third party app stores as they often host malicious apps, and are usually disguised as more “popular” real apps.
  3. Read the app permissions instead of blindly accepting the terms and conditions. Is there a reason a game wants access to your camera, microphone, and contacts?
  4. Update the Software. Updates to your mobile OS and any apps on your tablet or smartphone often include security fixes and should be downloaded as soon as they are available.
  5. Beware of Public Wi-Fi. Always use caution when browsing the Web on a public Wi-Fi. Since your traffic is public, it can be captured.
  6. Don’t be Gullible. Immediately delete suspicious text messages from people you don’t know, don’t click on any embedded web links or call any unknown phone numbers. Scammers and spammers are increasingly targeting smartphone users, be it through text messages, emails or even phone calls pretending to be someone they’re not. This could lead to them locking your device and extorting money from you to unlock it (“ransomware”).
  7. Enable Remote Location and Wiping. Preventing someone else from gathering your sensitive data is the most important task you have. One piece of good news is that the percentage of smartphone theft has decreased over the past few years thanks to the increased number of “kill switches” that make it harder to wipe and resell them. If your device is lost or stolen, tracking apps can tell you the location of your device. These types of apps can also let you wipe your sensitive or business data remotely. A remote wipe is similar to a factory reset; it erases all the data on a smartphone or tablet.
  8. Consider Antivirus. For those of you who are Android users, it’s highly recommended to protect your mobile data with security software. Not only do these apps protect your device from viruses and other malware, but it will lock down your privacy settings, scan apps and files for threats, and some solutions can snap a photo of someone attempting to log into your stolen phone via the front-facing camera, and send the image to you.
  9. Data Backups. Backing up data on your smartphone or tablet is relatively simple and it is something that should be done in the event the device is stolen, lost, or simply stops working. By using automatic online backups stored in the cloud or backing up data by syncing your device to your PC or office network are good options to help secure your device.

Regardless of which smartphone you use, it’s critical to prevent your personal (and professional) information from falling into the wrong hands. Even if your device isn’t lost or stolen, your data could still be accessible by a remote thief if not properly protected. No system or protective measure is completely foolproof, but the steps outlined above will make your device much safer.

Bryley Basics: Apps that send an “I’m busy” text from an Android phone

You can’t always be there to respond when you receive a text, but you might want to send an automated “I have received your text” message; much like an “out of office” email response. You can even setup a schedule that provides a response that switches on when your calendar shows a current meeting and switches off after the meeting ends.

Two Android applications, each of them $2.99, accomplish this task:

Both apps are available at GooglePlay.

Please see Sharon Machlis’ How to automatically send an ‘I’m busy!’ text from your Android phone from the 1/6/2016 edition of ComputerWorld.

Bryley Basics: Android app-rating site PrivacyGrade

PrivacyGrade, developed by a team of researchers from Carnegie Mellon University, rates Android-based applications for privacy and security. Apps for Android devices are rated based on “the gap between people’s expectations of an app’s behavior and the app’s actual behavior”. If an app’s privacy does not meet expectations, it will score poorly.

For example: Google Maps uses location data, as would be expected by most users. However, a game like Fruit Ninja also uses location data, which is unexpected, and which gives Fruit Ninja a lower score.

For details, please visit www.PrivacyGrade.org.

Bryley Basics: Encrypt your iPhone

iPhones, versions 3GS and later, offer hardware encryption; it is activated through the data-protection feature by enabling a passcode:

  • Tap Settings > General > Passcode.
  • Follow the prompts to create a passcode.
  • After the passcode is set, scroll down to the bottom of the screen and verify that “Data protection is enabled” is visible.

Note: Your encryption protection is only as good as the passcode; try to make this difficult to guess and keep it hidden.

You should also encrypt your backup for added security.  Check the “encrypt local backup” in iTunes if you back up to your computer.  If you back up to iCloud it is automatically encrypted, but be sure you have a really good iCloud passcode.

Google’s ChromeBook – A realistic alternative to a Windows Ultrabook?

Google introduced its Chromebook in 2009; sales have increased and it can be considered a low-cost alternative to the pricier, Microsoft Windows-based Ultrabook, but Chromebooks have significant limitations.  Some also say that a Chromebook can replace a tablet, but comparison1 suggests otherwise.

Chromebooks run Chrome OS, Google’s Linux-based operating system integrated with Google’s Chrome web browser.  (Chrome was recently ranked the number one Internet browser used in the US with 31.8% of sampled traffic, followed closely by Microsoft’s Internet Explorer at 30.9%; reported by ADI, a marketing research branch of Adobe Systems.2)  As such, they are designed to be used primarily when connected to the Internet and are closely linked to Google’s Cloud-based services like Google Drive, Google Apps, etc.

Reasons to buy3 include:

  • User interface – Intuitive; easy to use and simple to navigate
  • Offline – Works best online, but supports some offline activity
  • Platform agnostic – Can access all Cloud-based data
  • Fast boot-up – Access the Internet within 8 seconds
  • Security – Google Rewards for bug notification
  • Apps – Growing application options
  • Price – Starts at just under $200

Primary disadvantages of a Chromebook:

  • Thin client that gets its best features only via an Internet connection
  • Offline mode requires setup and has severely reduced functionality
  • Fewer compatible apps and games than Windows-based devices
  • Limited connections to printers, scanners, and mobile devices
  • Low-end processor not built for intensive use

My take:  A Chromebook is a good, low-cost option under these circumstances:

  • You do not use processor-intensive applications (i.e.: games),
  • You use Google Apps for content creation and review,
  • Your data is completely based in the Cloud,
  • You do not connect to other devices, and
  • You always have access to the Internet.

Note:  Google dominates the search industry and makes its money through Google AdWords and other advertising programs.  The core emphasis of all of their efforts is to drive consumers to their advertisers.

Visit http://www.eweek.com/pc-hardware/slideshows/chrome-os-features-to-look-for-in-current-chromebook-crop.html?kc=EWKNLEDP06112014A&dni=132495452&rni=25374491 for an informative overview by Don Reisinger of eWeek.  And, visit Microsoft’s take on Chromebooks at http://www.scroogled.com.

REFERENCES

1Please see http://blog.laptopmag.com/chromebook-vs-tablet for the article “Chromebook vs. Tablet:  Which should you buy?” by Cherlynn Low of LAPTOP.

2Visit http://redmondmag.com/articles/2014/06/06/chrome-surpasses-ie.aspx for details on browser rankings from Kurt Mackie of Redmond Magazine.

3Visit http://blog.laptopmag.com/chromebook-buying-advice to review the article “Should I buy a Chromebook?” by Dann Berg of LAPTOP.

Who is winning the smartphone war?

Apple’s iOS phones get a lot of press, but Google’s Android phones own the market while Microsoft’s Windows Phones are showing signs of life.

Android owned over 70% of the world-wide smartphone market in 2012 while Apple iOS held just 21%.  According to IDC, a market-research firm in Framingham, MA, Android-based phones accounted for over 80% of the smartphone market world-wide as of Q3-2013, while market share of iOS-based phones declined.  (Visit http://www.idc.com for IDC’s report on the smartphone market as of Q3-2013.)

Items fueling Android’s dominance over iOS include:

  • More hardware options (from small, sleek phones to mid-sized Phablets)
  • Carrier access (Verizon, AT&T, etc.)
  • Open-source operating system
  • Price

See why eWeek says that Google’s Android is a smarter choice than Apple’s iOS at http://www.eweek.com/mobile/slideshows/android-is-a-smarter-mobile-os-choice-than-ios-10-reasons-why/?kc=EWWHNEMNL03182013STR1.

Microsoft’s Windows Phone accounted for 3% of the worldwide smartphone market in 2012 and edged up to just under 5% as of Q3-2013.  Market share of Windows Phone is projected to grow to 7% by 2018 (according to IDC).  Jeffrey Schwartz of Redmond Magazine reports that most of this is corporate IT rather than consumer-based.  (See Jeffrey Schwartz’s article at http://redmondmag.com/blogs/the-schwartz-report/2014/02/enterprise-demand-for-windows-phone.aspx.)

98% of mobile-device malware attacking Android (DROID) phones

Worldwide, a significant portion of the population owns and uses a smartphone;  mobile users search Google over 5.9 Billion times daily while over 6 Billion hours of YouTube are watched each month on mobile devices.  (Statistics taken from a presentation by Intel Corporation at the MOBILE World Congress 2014.)

Since most smartphones are based on Google’s Android operating system, these are the primary targets of malicious attacks.  Kaspersky Labs, a prominent anti-virus software manufacturer, reports that 98% of malware targeted at mobile devices attacks Google’s Android (DROID), which confirms “both the popularity of this mobile OS and the vulnerability of its architecture”.

Suggestions for DROID (and other smartphone) owners to suppress malware:

  • Keep your mobile phone updated with the latest patches
  • Deploy an anti-malware application

Visit http://blogs.computerworld.com/mobile-security/23577/98-mobile-malware-targets-android-platform for the entire article by Darlene Storm at ComputerWorld.

Fitness regime for your IT equipment: Keep it clean, cool, and empowered

IT (Information Technology) equipment is somewhat temperamental; it requires reasonable temperatures; stable, uninterrupted power; and some air flow to operate efficiently.  Cleanliness is important.  Here’s how to keep it toned.

IT equipment should be kept in a clean, neat, and (preferably) dust-adverse/static-resistant area; walls with painted surfaces, tiled or coated floors without carpeting, etc.  Fire-suppression equipment is a plus, but cannot be water-based.

Access should be restricted; a separate, locked room is ideal, but a closet with sufficient space and air flow can work for smaller sites.

Dust is the enemy of fans and electrical components; a reduced-dust environment and regular cleaning of equipment fans can lengthen the life of most items.  (Note: cleanings should be performed when equipment is powered-down, which is not always desirable or feasible.)

The area should have dedicated electrical circuits with sufficient amperage to match the power requirements of the equipment.  We also recommend an Uninterruptible Power Supply (UPS) for all critical items (and require them for equipment that we cover under our Comprehensive Support Program); the UPS provides emergency power when the input-power source is unavailable, but it also helps to regulate fluctuations in power, both spikes/surges (voltage overload) and brown-outs (reduction in voltage) that can damage sensitive equipment.

Cooling and humidity control are very important; most equipment runs optimally within a narrow range of temperature (64° to 81° Fahrenheit) and a maximum range of relative humidity of 60%.  HP, in an effort to be “greener”, lists current specifications on its DL360 server that provide a wider range of 50° to 90°F with 10% to 90% humidity (non-condensing).  However, cooler temperatures do make things last longer.  (The DL360 will actually throttle-back the CPU when the air-inlet sensors detect temperatures over 85°F.)

The area should have continuous air flow (to provide new, cool air while removing heated air that is exiting the equipment) and remain uncluttered to facilitate this air flow.  A dedicated A/C unit combined with a closed door is optimal; locating all equipment within a rack enclosure (with blanking panels over open areas) can enhance air flow.

TechAdvisory has 9 tips at http://techtimes.techadvisory.org/2011/11/9-steps-you-must-know-to-prevent-a-server-crash/.

CryptoLocker Case Study

The following event depicts a real-life malware attack that infected a New England manufacturing firm. The company has chosen to share its story anonymously to help other businesses avoid a similar fate.

The unsuspecting sales rep certainly reacted in a way anyone would expect. He received an email with a voicemail attachment that looked like it came from the company CEO. When the CEO calls, reps jump to attention, and at this particular manufacturing firm based in New England, the business relies on a communication system that sends voicemails as email attachments. So the sales rep had no reason to suspect anything was wrong.

As it turns out, something was very wrong.

Click the link below to read the full article.

Bryley — CryptoLocker Remediation — 2013

The (near-term) future of computer technology – Microsoft versus Google

The crystal ball is still foggy, but here are my thoughts on Microsoft versus Google and (what I believe is) the battle for world domination.  (Microsoft sales are around $77B, primarily from Windows software (25%), business software (32%), and server software (25%); Google is about $55B with approximately 87% of its revenue from advertising.)

Notice, I did not include Apple:  The big play is between Microsoft and Google and it is occurring across multiple lines:

  • Google (search) versus Bing
  • Microsoft Office versus Google Apps
  • Google Android versus Microsoft Windows

Google (search) versus Bing

In the search-engine market, there is no comparison with Google (#1) capturing an average of 67% of monthly queries in the US while Bing (#2) captures only 17%.  In search, queries equate to advertising revenue, the heart of Google’s success.  (Search is currently not a significant part of Microsoft’s sales.)

Google’s familiar, plain-white background seems functional, but also trendy with the occasional changes to the GOOGLE moniker.  Bing’s full-screen, image-based background usually displays beautiful vistas or current events; the scrollable “Popular Now” bar across the bottom adds an items-of-interest aspect.

Bing (aka Microsoft) suggests comparing the two.

Winner (by a wide margin) is Google; Bing is interesting, but it will take some major work to break Google’s dominance in this area.

Microsoft Office versus Google Apps

When it comes to productivity applications; Microsoft Office 2013 owns the market at 92% while the newer Office 365, Microsoft’s Cloud-based answer to Google Apps, exceeds $1B per year.  (For details, please see the April 19, 2013Forbes article athttp://www.forbes.com/sites/greatspeculations/2013/04/19/microsoft-shakes-off-pc-slump-as-office-and-servers-sales-swell/.)

Microsoft continues to focus on Office 365; pricing now starts at $96 per year, new features have been added, and partners can sell this service directly to users.

Although Microsoft productivity applications dominate on the desktop, Google Apps is a serious contender to Office 2013 and Office 365 with an estimated 33% to 50% share of Cloud-based productivity apps.  The primary difference: Google Apps was Cloud-based from the start; it doesn’t have all of the features of Microsoft Office, but is relevant on more platforms, is free to consumers, and costs just $50 per

year for users of Google Apps for Business.

So, Google Apps plays well in a heterogeneous, consumer/small-business world.  Also, Google has moved its popular Postini anti-spam service into Google Apps, a move that has angered and confused many of its (former) Postini clients, but one that makes sense from the perspective of beefing up Google Apps for Business to battle against Office 365.

For details, please see the 4/23/2013 article by Kurt Mackie of Redmond Magazineat http://redmondmag.com/articles/2013/04/23/gains-for-google-in-cloud-office.aspx?sc_lang=en.  To compare Office 365 to Google Apps, please visit http://www.youtube.com/watch?v=gBtYFM6Zy0o

Winner (by a strong, but potentially diminishing margin) is Microsoft; Microsoft dominates the desktop, but mobile users are changing the landscape.

Google Android versus Microsoft Windows

In terms of projected sales of mobile devices, Google’s Android (DROID) owns the market at 79% while Microsoft Windows is at just 3.3%.  However, if you include desktop computers, a declining market, Windows is still prevalent across organizations throughout the world.

Google introduced Android in 2007; it is a Linux-based, open-source operating system designed for touchscreen devices.  Its strength is its robustness and ease-of-use, which led to a brisk rate of adoption by users and application developers.

Windows 8 was introduced in October of 2012.  It was designed to be compatible with its predecessors (Windows XP and Windows 7) while introducing a touch-enabled, tile-based, user interface that has been more frustrating than enabling.  To date, it has failed to meet even modest expectations.  (Windows 8.1, a free, significant upgrade to Windows 8, will release on October 17th with the hope of changing this trend.)

Currently a draw if you include both mobile devices and desktop computers:  Microsoft owns the desktop while Google owns mobile devices; Windows 8.1 provides hope, but might be too little too late to penetrate the mobility market.

If nothing else, expect prices to decrease as the competition heats up.