The basic ideas or facts

Facebook Data Breach: 3 Things to Do Now

facebook-app-results-matter-cloud-services-source-pixabay-lobo-studio-hamburg

The security breach was announced on September 28 by Facebook and affected at least 50 million users. The attackers exploited bugs in the platforms “View As” privacy feature, which occurred in July 2017, when Facebook introduced a new video uploader.

The uploader feature appearing as active in the “View As” feature and created an access token, which was not supposed to happen. Access tokens provide a key to keep users logged into their accounts and to provide access to other platforms. This is a convenience to reduce the need to enter login credentials.

What to do now? Reconsider the use of the Facebook login feature. Using the login feature of platforms or reusing the same password across various is not work the risk taken for the small amount of convenience.

Check your privacy settings and credential recovery options on Facebook and your other platforms. Ensure you know how they are configured and update them. Facebook had a security update post in their developer’s blog suggesting user visit the “Security and Login” tab on the sites settings menu to review platforms connected through Facebook.

Change your password to something hard to guess and unique.  This breach apparently did not get passwords but access tokens instead. It will do no harm to update your password on Facebook and your other platforms.

Enable 2FA (two-factor authentication) using a third party app like Google Authenticator or Authy, both of which are free. Two-factor authentication requires you do something to verify identify beyond supply a password. There is the option to receive an e-mail or text message but using an app may reduce the risk from the 2FA messages being intercepted.

Turning on notifications for every login to your accounts across platforms could seem like over kill, in the beginning. It does settle down once you establish the pattern of where and when you login. Knowing that helps to keep you informed.

Sources

  • https://www.darkreading.com/threat-intelligence/when-facebook-gets-hacked-everyone-gets-hacked/d/d-id/1332953
  • https://www.fastcompany.com/90245345/facebook-data-breach-4-simple-steps-to-stay-safer-right-now
  • https://www.fastcompany.com/90219499/att-gets-sued-over-two-factor-security-flaws-and-23m-cryptocurrency-theft
  • Image: Pixabay, LoboStudioHamburg

The Importance of a Basic Backup Strategy

Are you prepared with a basic backup?

It doesn’t always take someone malicious to hack your computer system, but regardless of the reason, if a business is shut down for any matter of time, revenue is lost. The first step in running any business is ensuring there are basic backup plans in place.

Picture this; a freak September snowstorm sends the city into panic. Tree branches are breaking from the weight of the snow, and one just happens to fall on the power line closest to your downtown office. The power goes out and your building is plunged into dark.

Power goes out, operations stop. All your files are now gone and without any way of getting them back, you’re starting at the bottom again.

When breaches occur, for any reason, operations and finance are the first things to be affected, and the network outages caused usually have long-lasting impact. Most businesses cannot come back from even three days spent at a standstill.

So what can you do?

By following the 3-2-1 rule, when it comes to a basic backup strategy, your company will be laughing during the next storm.

Your backup plan should be thought of like this; there should be 3 total copies of data, 2 of which are local, but on different mediums, and at least 1 copy that is offsite.

The local copy is what users rely on for primary access.

  • One of the easiest ways to create a backup is to store copies on any network attached storage, an external hard drive, or a USB drive.

Backup local copy to a local avenue.

  • Gives user immediate, instant access to whatever data needed, despite if it’s been deleted, overwritten, or lost.

Store a copy of all files securely offsite.

  • This helps in the aforementioned disaster. Regardless if something happens to the physical place of business, all data is still safe and secure.
  • There are many cloud-based solutions, which store information on remote servers which are accessed through the Internet.

Regardless of how you are backing up your data, the first step in protecting your business is having that backup plan. Every minute your team is without access will cost more than just revenue.

Take a look at how much it would cost your business if your systems were unavailable.  Try our online calculator yourself or give us a call 403-455-5969. The results might surprise you.

 

 

 

 

Privacy Settings Keeping Users Safe

Knowing your privacy settings is key to protecting yourself and your information.

Knowing your privacy settings is key to protecting yourself and your information.

      “Click yes to submit your information.”

This is a common sentence read on most social media platforms, regardless of how often you sign in. It can be scary to users, not understanding just exactly how privacy settings work.

People have, in a sense, all but signed their life away to these online platforms. For all those who don’t seem to care about the privacy settings, there are many more who do.

You often hear of a data breach and wonder if you should be cancelling your credit cards, or worrying about a stolen identity. With so much news circling through the media it can be overwhelming. Especially if you don’t understand what to do to keep yourself safe.

Platforms like Facebook, or even Google to some extent, aren’t nefarious in nature. The goal isn’t to convince you to sign up and sign over all your private information. The site algorithms are designed to make a user friendly feed that gives you exactly what you want, be it fitness ideas, food recipes, or simply an add for that perfect car you’ve been searching for online.

By signing up for these platforms, you are giving the providers permission to use your personal data in any way they see fit. This doesn’t mean you have to stop using Facebook. Personally, it is a great tool to use for business outreach, communication with family and friends, and many other more mundane research; but it is a tool that should be used with caution.

Here are a few tips, for those who enjoy the use of social media, to keeping your personal and private life just a bit more secure:

  1. Restrict your personal information – any personal information online can be used. It’s public and anyone will see it as such. A birthday or birthplace can be used to access accounts, or that post saying you’re away traveling could be a perfect in for thieves looking to score.
  2. Control what strangers see – the more available information for those not in your friends list, the more vulnerable you become. Simply restricting your settings can be a sigh of relief.
    You can do this by going to Settings and Privacy and go to “Who can see my stuff?”
    As you play around with your settings you can always preview your profile to get a good idea of just exactly what it is you’re sharing.
  3. Control what friends see and do on your page – Strangers are one thing, but you can control what happens between you and your friends as well. When posting and reposting, there are options to show the public, only those on your friends list, close friends, etc. This gives you complete control on who can comment, share, or interact with your information. All this can be done on each individual status alone, or through Settings and Privacy as well.
  4. Disable Location Tracking and be careful of interaction with third party apps – Every interaction with any app that links through Facebook is just another way that your information is being constantly collected. Once again, through Settings and Privacy, you can check off which apps you are okay with, and which ones you want to disable.

Facebook is constantly updating it’s features, and how it interacts with you. It’s important to not only monitor the things you share, and those who get to see it, but also that the settings you’ve put in place haven’t been disabled. Familiarizing yourself with all privacy settings allows you to understand, to a greater extent, what is being put out into the interweb. It allows you to control it also.