I’m a big advocate of cloud data security. Cloud service providers are, in general, better at security than their customers. So your data is safer in the cloud than it is on your local machine or network.
However, it doesn’t feel that way, does it? Yesterday a colleague showed me a cool plug-in for Google Sheets that creates simple GANTT charts using spreadsheet data. When I installed the plug-in, it prompted me for the permissions it needed to function. Take a look at the list on the right (click to enlarge).
Know who you are on Google
View your email address
View and manage spreadsheets that this application has been installed in.
View and manage the files in your Google Drive
View and manage data associated with the application
Allow this application to run when you are not present
Connect to an external service
Numbers 1 to 3 are not a big deal to me. I’m happy to have this plug-in work on the files where I use it. Number 4 is scary: this plug-in can look at ALL my google drive files. Number 6 and 7 make it even scarier: this thing can run whenever it wants and connect to an external service.
This plug-in appears fine today. But tomorrow, an evil developer could change their software without telling anyone. The software could start to scan any of my Google Drive documents and send that data to an external service.
I’m going to do more research on these permissions and see if my concerns are real or just cloud paranoia. Stay tuned.
My filter for startup ideas typically revolves around the Pragmatic Marketing dogma. There are 3 critical hurdles a new idea needs to clear.
The problem I’m going to solve is pervasive in an industry. Lots of people have the problem and can quickly realize it as a problem if approached with my solution.
The problem is urgent. Solving it provides immediate benefit. Waiting to solve it is a real threat to the customer’s business.
The customer is willing to pay. This is where my buddy and I fell down last time. We created a great productivity tool and everyone agreed on the benefits, but it had a “should be a free app” feel.
ContactBlast missed on #2: solving the problem of contracting efficiency wasn’t urgent. The benefit would be realized over the long term, but that meant a longer sales cycles and greater commitment from customers.
Using the Pragmatic filters can sound discouraging for entrepreneurs, but I find it the opposite. The filters keep me refining my ideas until they meet all 3 conditions, and that can save a huge amount of time, money and energy.
I’ve been working with Salesforce.com since 2005 and I’ve made a few eyebrow raising comparisons over the years…
Salesforce is like Microsoft Access on the web. It lets IT Admins create applications that scale.
Salesforce is the least powerful, most expensive on-demand platform in the world.
Here is the crazy part. I meant it all as a compliment! Salesforce figured out early on that regular business people, not software engineers, are the ones who know their business best. Giving non-developers the ability to customize or even create applications is worth a lot to a profitable company. Hence Salesforce costs more in every dimension (per user, per GB, etc.) than other platforms.
Wait, not every dimension. I’m betting that total cost of ownership (TCO) is lower on most Salesforce.com apps. If you’ve got a problem that fits the Salesforce UI paradigm, then it definitely saves money over Amazon or Google App Engine.
The most recent example is Salesforce rolling out Lightning (Aura framework) capabilities with a super secure container configuration called LockerService. This is great news because it prevents less skilled developers from accidentally creating security holes.
So when comparing TCO for on-demand platforms, make sure you are taking into account security, implementation, and support costs. You’ll be surprised how cost effective Access for the Web can be.
Here is a really good list of steps to help keep you safe from Ransomeware. The article is long, but stick with it and read all the headings – there are some good ideas you can easily implement. There are also some suggestions that are hard to stomach, but knowledge is power.
Personally, I use Time Capsule (network backup solution) for my Mac and it is a bummer to think that Ransomeware could find this network device and encrypt my backups too. I’ve taken to making a monthly snapshot on a USB drive for worst case recovery.
The US FDIC has recently come under fire for a series of insider data leakages. Getting hacked by your own employees is the elephant in the room for every organization. We harden our organizations from outside attacks, but insiders need efficient access to data in order to do their jobs.
One of the big changes happening at FDIC is disabling removable storage like USB keys and drives. I’ll be curious to see how this works from both an efficiency and effectiveness standpoint.
In most of my dealings (with smaller companies), the thought of clamping down on removable media is impractical. Anyone who has millennials in their workforce know that restrictive technology policies are anathema to these energetic workers. Check out this excerpt from Fortune magazine.
The companies that top Great Place to Work’s first-ever ranking of the 100 Best Workplaces for Millennials stand out for their ability to engage this generation, recognize their talents and give them a significant role where they can make a difference. At these companies, pay, profit sharing, and promotion decisions are executed fairly; everyone gets a shot at special recognition; and workers have a say in decisions that affect them. These workplaces exhibit strong, open, two-way communication; a high tolerance for risk-taking; high levels of cooperation and support among employees; and reduced roadblocks to innovation, such as internal politics.
The best solutions I’ve found for insider threats are training and strong corporate culture. Make sure your employees know the policies and that your culture promotes the benefits of protecting all that information they are entrusted to access. Protecting your organization from insider leaks with technology is super difficult — and it won’t prevent a determined insider from getting data out.
My favorite finding from ReversingLabs is that the most exploited bug in 2015 was the same as in 2014 — it was discovered in 2011 and patched in 2012 and again in 2015. CVE-2010-2568 is an old Windows shell bug with .pif files. Patch this now!
Not sure exactly what it says about ReversingLabs’ clients that they have all this data and yet can’t deploy this patch.
It should have been a great night for Laremy Tunsil, the offensive lineman from Ole Miss. He was drafted #13 by the Miami Dolphins in the 2016 NFL Draft.
Unfortunately, his Twitter and Instagram accounts where “hacked”. Looks to me like somebody got access to his iPhone. Three possible lessons from an information security perspective:
Make sure you have a passcode or biometric security on your phone. Nobody should know your code; not your best friend, not your girlfriend, not your kids, maybe your spouse.
Strong, unique passwords and two factor authentication can prevent somebody who discovers one password (like Twitter), from logging into other accounts (like Instagram). Of course this doesn’t matter if a mean person has your unlocked phone.
Never post anything to social media unless you’d be happy to see it on the front page of the NY Daily News.
There are lots of other lessons to be gleaned from this incident. I’ll leave that to the sports writers. However, I hope the media shines a spotlight on the system and not just a kid who accidentally disclosed the realities of high stakes college athletics.
Cyber criminals have so many tools that we need an additional layer of protection. If Facebook can have hackers lurking inside their network for months, what makes you so sure your network is safe?
I’m advising all my clients and companies to enable 2-Factor Authentication on all systems. This and strong unique passwords gives me piece of mind that a compromise of my username and password does not expose me to cascading risks in other systems.