Nexus Remote Service Keeps Your Docs in the Cloud

Nexus Remote ServiceDropbox, Box, Microsoft SkyDrive, SugarSync, and Google Drive have been getting all the consumer cloud storage love as of late. The services are uber-popular, but may not be the best option for the enterprise due to the simple fact sensitive documents/files stop being sensitive once they are downloaded onto personal mobile devices. Nexus by ionGrid is a solution that lets users access and modify files from an iPad while they file stay protected by company IT policy.

Nexus is composed of two parts: the server portion and the mobile app for iPad. Nexus Server gives the Nexus app access to any SharePoint documents or Windows file shares. The app acts as a portal to these files, giving the user full access to files via a data connection. According to ionGrid, “The combination of the client and server software gives you access to your work files, even when you’re out on the road, and the best quality, pixel perfect rendering of documents that you can find.”  Read More

The risks involved in giving apps permissions to login with your Facebook or Twitter accounts

Even when you get your privacy settings just right (assuming that’s even possible!) your personal info and data is still at risk every time you give an app permission, or sign in to an application using Facebook, Twitter, or any other social media service. In my latest on HLN, I look into the risks you take when associating your social media accounts with 3rd party applications.

$39 Billion dollars stolen online in 2011

So much of the information we put online is in a dangerous position—hackers are looking to break into email accounts more than ever to get at your sensitive data. In my recent appearance on CNN, I talk about choosing a hack-free password and also give some tips on how you can find out if you’ve been hacked already. With over $39 BILLION dollars stolen from online fraud and scams in 2011, staying safe is now more important than ever. Worried already? I talk about this on CNN, but it’s worth repeating: you can use websites like pwndlist today to see if your data is already online.

And choose a good password! I can’t say this enough, but if you can’t remember strong passwords and use different, strong passwords for every important account you have (email, banking, etc.) then you need to look into a password management system. I’m not going to do your homework for you, but services like Keepass and 1password can securely manage a database of all of your passwords. But don’t take my word for it—do your own research and if you’re struggling to remember all these crazy passwords, then a password management system might be right for you.

What’s Good? Mobile Device Management Tools with Military-Grade Security

In case you’ve been under a rock, modern mobilty is all about being productive everywhere.  As we also know, one of the greatest concerns in any business is security.  It’s obvious that these two forces work against each other in some ways.  Empowering your staff to be productive while on the go means the increased potential of exposing your company secrets.

For a long time, RIM’s Blackberry had a stranglehold on this market segment.  If you wanted secure email on the go, Blackberry was the answer.  However, the Canadian mobile maker has lagged behind the tech curve, and it looks like the market is finally catching up with them.  Increasingly, employees want to use their personal device for mobile productivity, but using personal devices for work presents a security risk for the business.  So, how can employees stay secure without having to carry a bunch of devices around with them, doing tasks based on which device can get the job done?

Enter Good for Enterprise.  Good for Enterprise is a suite of mobile device management tools with military-grade security for data loss prevention. Their collaboration features for iOS, Android, and Windows phone enable productivity without keeping your IT team up at night. Read More

Mario Armstrong talks Personal Security in the Digital Age

Here at SXSW, I just met with with Frank Abagnale Jr., the real-life check forger turned FBI security expert played by Leonardo DiCaprio in “Catch Me If You Can.” Frank warned me and CNN’s Ali Velshi, “I have nothing against those social media sites… [but] don’t give away pertinent information that you know people can take to become you.”

Then Ali turned to me and asked, “What’s the balance here… Because we want free stuff on the Internet, so we know we gotta give some information about us. There’s companies that use it, sell it to advertisers.” I took a moment to break things down and explain how you make a compromise with your personal information whenever you get something for free online. Check the video below to learn more about these little digital footprints we leave behind when we’re on the web:

You wouldn’t give a stranger the keys to your cashbox, why give them the keys to your Twitter? Choose strong passwords and change them often

So maybe you’re doing a few things right. Maybe you’re choosing long passwords, maybe you avoid using your kid’s names in your passwords, maybe you’ve never used a birthdate either! That’s great, but that’s only one piece to choosing a good password. How often do you change it? A strong password is only good until someone else gets ahold of it. And then, how do you memorize all these crazy passwords? In my latest video on HLNtv, I try and provide some easy-to-follow answers to these questions so that you can make sure you’re completely protected.

Some Tips for Staying Safe with your Digital Wallet

Mobile wallets are a hot topic right now, and the #1 question people keep asking is if they’re safe. The short answer, YES they are safe!

But how do I know that you’ll be safe? Because your credit cards are credit cards, no matter if they’re in your real wallet or your digital wallet. With MasterCard handling the transactions, you’ve got the same protections if someone gets ahold of your smartphone and starts making fraudulent purchases as you do with your ‘real’ credit card. You can report a card as being stolen the same way you do now—just because it’s stored inside a digital wallet doesn’t mean it’s any less safe! Read More

Kensington SecureBack cases are great for shared iPads

Increasingly, businesses are finding that iPads and other tablets are the best solution for their needs.  Unfortunately, one of the best things about the iPad can be one of the worst things; basically, its extreme mobility.  Although this really helps workers on the go, it also helps less-than-honest people score free iPads for themselves.  So, the question becomes: how can we maintain mobile productivity while thwarting would-be thieves? Read More

Square’s CEO responds to VeriFone’s Security Claims

Yesterday, I reported on VeriFone’s claims that Square’s free credit card reader’s inability to encrypt credit card information is a serious security issue that needed to be dealt with. It’s only fair that I also report Square’s response to those claims.

In a letter from Square’s CEO, Jack Dorsey, posted on the company’s website, he noted that the information encrypted on the black strip on the back of any credit card is similar to the information located on the front of the card in the sense that anybody who you has your credit card, has all the information needed to steal and use your card, regardless of the type of technology used.

Any technology—an encrypted card reader, phone camera, or plain old pen and paper—can be used to “skim” or copy numbers from a credit card. The waiter you hand your credit card to at a restaurant, for example, could easily steal your card details if he wanted to—no technology required. If you provide your credit card to someone who intends to steal from you, they already have everything they need: the information on the front of your card.

He also points out that if in fact your credit card information is stolen, banks will go through the customary practice of reversing any fraudulent charges. In other words, regardless of HOW your credit card information is illegally obtained (from a Square credit card reader, a VeriFone credit card processing machine, or any other POS device), the same rules apply to rectify the situation.

I think the issue with VeriFone is in the lengths they went to out Square’s alleged security issues. The fake Square skimming app, and the video tutorial went beyond informative and instead explained how to steal credit card information using a Square credit card reader. If there is a genuine security issue, more private and secure methods involving ALL parties could have been taken.

In the end, all of this brings up a valid point – with the accessibility, ease of use, and coolness that technology brings, you still have to be careful with who you entrust your information with…financial or otherwise. The same technology that makes our lives easier is the same technology that can become a hassle.

“Pray for the best, but expect the worst”

VeriFone Publicly Calls out Square Security Hole

Square is the popular start-up company that allows iPhone and Android users to process credit card transactions using their phone and a free credit card reader dongle that plugs into the phone’s headphone jack.

VeriFone, a leader in credit card transaction technology has a similar product (PayWare Mobile app), but Square’s minimalistic approach to its transactions (no merchant account needed, no credit check, AND a free credit card reader) has proved to be some serious competition for Verifone. I’m not sure if Verifone is generally concerned with the financial security of the consumers, or this is an outright attempt to squash the competition, but VeriFone’s CEO has just released an Open Letter, demonstration video, AND a free fake Square app that allegedly identifies and demonstrates a serious hole in Square’s ability to encrypt credit card information when swiping it through the free credit card reader.

http://www.youtube.com/watch?v=ObGQxSuORy0&feature=player_embedded

Whatever the reasoning, VeriFone is serious about this latest development and has called out Square and notified its credit card processing partners (Visa, MasterCard, American Express, and JP Morgan Chase). The Fake Square App released by Verifone can be downloaded by ANYONE to test this flaw for themselves.

To back VeriFone, if this is true, the possibilities for ANYONE with the Square reader, a decent card skimming application, and your trust can have your credit card information within a matter of seconds. THAT’S A PROBLEM, and could mean curtains for Square, let alone any legal implications if this particular issue goes mainstream.

To back Square, if VeriFone REALLY cared about the consumer’s credit card security, and not its revenue, would it have just given would-be crooks the keys, complete with an instruction manual and tutorial video to steal our credit card information? Additionally, card skimming is not a new trick and companies like VeriFone have been fighting for years, so it’s not solely a Square issue. In the end, it all boils down to customer common sense as it relates to who you hand over your credit card to.

/Rant off

Nonetheless, the implications are serious enough that it needs to be addressed, and so far, mums the word from Square. Hopefully the company’s representatives will respond and restore its customer’s sense of trust and security and continue to offer its products and services to individuals and small businesses who want accept credit card payments, while offering competition to larger credit card processing companies. Competition is always good for the consumer.

[via: Engadget]