<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title></title>
	<atom:link href="https://blog.opensure.net/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.opensure.net/</link>
	<description>Green + ethical UK managed hosting service</description>
	<lastBuildDate>Fri, 02 Jun 2017 17:38:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Human error behind security breaches</title>
		<link>https://blog.opensure.net/human-error-behind-security-breaches/</link>
		
		<dc:creator><![CDATA[heather]]></dc:creator>
		<pubDate>Fri, 02 Jun 2017 13:16:06 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://blog.opensure.net/?p=2622</guid>

					<description><![CDATA[<p>Human error behind security breaches Human error is behind the vast majority of IT security breaches. A breach is a breach, whether through ignorance, a simple mistake or malice. A significant percentage of companies feel exposed to an inside threat &#8230; <a class="more-link" href="https://blog.opensure.net/human-error-behind-security-breaches/">Continue reading <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://blog.opensure.net/human-error-behind-security-breaches/">Human error behind security breaches</a> appeared first on <a href="https://blog.opensure.net">OpenSure Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Human error behind security breaches</h1>
<p>Human error is behind the vast majority of IT security breaches. A breach is a breach, whether through ignorance, a simple mistake or malice. <a href="https://haystax.com/blog/ebook/insider-attacks-industry-survey/">A significant percentage of companies feel exposed to an inside threat</a> so what can they do to protect themselves?</p>
<h2>Train your staff</h2>
<p>Recently we heard about a company laptop that was riddled with malware. The employee who used it never thought twice about the security credentials of the sites he visited. He never checked emails and attachments before opening them. We advised on cleansing and protecting the laptop, then gave a vital piece of security advice for this situation: change your habits, or the same thing will happen all over again.</p>
<p>This was quite an extreme case of human error. Even so, every company needs to train employees. They should learn where risks might lie, how to spot them and what to do if they think something&#8217;s risky. This remains without doubt the greatest cybersecurity danger area for companies of all sizes.</p>
<h2>Maintain your IT assets</h2>
<p>Do you find constant update notifications annoying? Do you dismisses software updates as  as a nuisance, especially if you have to reboot afterwards? You&#8217;re making one of the most serious security mistakes.</p>
<div id="attachment_2623" style="width: 160px" class="wp-caption alignleft"><img decoding="async" aria-describedby="caption-attachment-2623" class="size-thumbnail wp-image-2623" src="http://blog.opensure.net/files/2017/06/MenWithMachinesScaledlarge__14173517848-150x150.jpg" alt="human error" width="150" height="150" /><p id="caption-attachment-2623" class="wp-caption-text"><strong>Legacy systems can leave services exposed to security risks</strong></p></div>
<p><a href="https://www.welivesecurity.com/2017/05/19/ignoring-software-updates-youre-making-one-five-basic-security-mistakes/">Never put off software updates</a>. Whether you use Linux (you do, don&#8217;t you?), Mac or MS, software updates are vital for keeping software responsive. Updates protect software from new security threats and loopholes.</p>
<p>Software needs to be monitored and maintained at a system level too. Hardware needs to work at optimum and replaced if its software requirements jeopardize security. There have been several explanations for British Airways&#8217; recent problems, including a contractor switching off power, but legacy systems have also been mentioned as a possible cause.</p>
<h2>Restrict access to services</h2>
<p>If someone leaves a company their work email address should no longer be available to them (divert it to ensure clients aren&#8217;t left dangling). Remove access to any other company services. Whether that employee is friend or foe, leaving access open to ex-employees is like leaving your house keys dangling in the door when you go out. Even worse, you may not have any idea they ever set foot in the house.</p>
<p>This is simple good IT hygiene. Enhance it by implementing different levels of access to company systems, and an audit trail. Know at all times not only who has access to what, but when they last accessed it, and keep that clearance under review.</p>
<h2>Disaster recovery planning</h2>
<p>These measures will go a long way to protecting your company and avoiding day-to-day pitfalls. Your staff will feel happier that they&#8217;re working within IT structures that smooth their working day and protect them against intrusion. IT contractors will be delighted to work with a business that takes security so seriously and uses platforms and utilities that are kept up to date.</p>
<p>However, we&#8217;re busy people. We receive hundreds of emails a week and use all sorts of online utilities. Everyone understands the basics of internet hygiene just like we understand that we shouldn&#8217;t eat too much sugar, but we don&#8217;t always follow the rules. We&#8217;re too busy, too tired, too hasty and too pressurised. We don&#8217;t double check the sender of every email and attachment we receive, or pay attention to the security of a website. This is especially the case if they appear familiar at a glance. Sometimes we click on something we shouldn&#8217;t, and every so often that will have calamitous results. This is how human error creeps in.</p>
<p>Creating a disaster recovery plan is vital for any business that intends to survive a serious IT problem. It&#8217;s time very well spent. You keep operating while the situation is put to rights instead of scrambling to find information. There&#8217;s a great deal of information available on disaster recovery planning, but <a href="http://blog.opensure.net/disaster-recovery/">we&#8217;re always happy to help if you&#8217;d prefer professional input</a>. A well-drafted, tested and implemented disaster recovery plan turns an IT problem from a disaster to a nuisance.</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fblog.opensure.net%2Fhuman-error-behind-security-breaches%2F&amp;linkname=Human%20error%20behind%20security%20breaches" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fblog.opensure.net%2Fhuman-error-behind-security-breaches%2F&amp;linkname=Human%20error%20behind%20security%20breaches" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fblog.opensure.net%2Fhuman-error-behind-security-breaches%2F&#038;title=Human%20error%20behind%20security%20breaches" data-a2a-url="https://blog.opensure.net/human-error-behind-security-breaches/" data-a2a-title="Human error behind security breaches"></a></p><p>The post <a href="https://blog.opensure.net/human-error-behind-security-breaches/">Human error behind security breaches</a> appeared first on <a href="https://blog.opensure.net">OpenSure Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The BA fiasco &#8211; Lessons for small business services</title>
		<link>https://blog.opensure.net/small-business-services/</link>
		
		<dc:creator><![CDATA[heather]]></dc:creator>
		<pubDate>Tue, 30 May 2017 12:22:32 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://blog.opensure.net/?p=2617</guid>

					<description><![CDATA[<p>Small business services &#8211; lessons from the BA IT fiasco You probably don&#8217;t have hundreds of thousands of customers, it&#8217;s unlikely your chief exec is grilled on the BBC and when your company gets it wrong Twitter might not creak &#8230; <a class="more-link" href="https://blog.opensure.net/small-business-services/">Continue reading <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://blog.opensure.net/small-business-services/">The BA fiasco &#8211; Lessons for small business services</a> appeared first on <a href="https://blog.opensure.net">OpenSure Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Small business services &#8211; lessons from the BA IT fiasco</h1>
<p><img decoding="async" class="alignleft size-thumbnail wp-image-2336" src="https://www.opensure.net/files/2017/05/BA-150x150.jpg" alt="small business services" width="150" height="150" />You probably don&#8217;t have hundreds of thousands of customers, it&#8217;s unlikely your chief exec is grilled on the BBC and when your company gets it wrong <a href="https://twitter.com/OpenSure">Twitter</a> might not creak under the weight of invective, but that doesn&#8217;t mean that a serious IT failure such as that suffered recently by British Airways can&#8217;t cost your company a fortune in money and reputation. Ensure your small business services are robust and well-protected and that you understand best practice. Here we detail the questions to ask your hosting company and the staff managing your IT services day-to-day.</p>
<h2>Ask your DC about power failure procedures</h2>
<p>BA has put out a barely credible reason for the outage: a power surge at a data centre followed by a failure of the back-up power system. Data centres are designed to withstand power surges and have strong back-up power systems. Problems can still occur, but it beggars belief that a company handling the volume of data, time-critical services and financial transactions that British Airways sees on a daily basis wouldn&#8217;t have cast iron measures in place to protect its power supply and back-up power generation. It&#8217;s astonishing to consider that BA would leave itself exposed in this way.</p>
<p>For the small company, the lesson here is to ask your hosting company about how it handles a power failure &#8211; the classic digger-through-a-vital-cable scenario. Ask it to explain to you &#8211; in language you understand &#8211; until you&#8217;re happy that short of asteroid strike, your services will stay up.</p>
<h2>Communication</h2>
<p>But let&#8217;s say that a power surge and failed back-up power service has indeed knocked your website, email and other utilities offline. Small business services are potentially more vulnerable to this than a huge global company as they won&#8217;t be sitting on the same dedicated services as a large company. British Airways was heavily criticised for not communicating with its customers; Alex Cruz, British Airways&#8217; chief executive, explained this away by saying the messaging services were also affected by the outage. A company with the resources of BA has all its eggs in one basket? Staggering. A basic strategic error. Of course BA has data protection to consider when it contacts customers and has to use secure and encrypted channels for this, so I&#8217;m not convinced about the suggestion I heard to fire up a GMail account and email everyone. A security breach would have been the last thing BA needed on top of the outage, but again, a company with the infrastructure of BA surely could use services sitting in another data centre to communicate with customers. All data held should be backed up and held in multiple locations, so all customers should have been contactable.</p>
<p>Consider how you communicate with your customers: do you have contact data backed up? Do you have an alternative channel to communicate with your clients if your services go down? Back ups are very important but unfortunately their value is often underestimated until things go wrong and that data becomes critical.</p>
<p>Virtually every company uses some form of social media these days, and while it may not be the right channel for communicating sensitive information, make sure your clients know how to make contact with you in the event of a problem. Put your social media contact buttons or URLs in your email footer and on any paper invoices or other communications you may send out. Not knowing what&#8217;s going on ups the ante for your cllients very quickly and makes everything 10 times harder to deal with. If you can let your clients know that you&#8217;re aware of the probem and that you&#8217;ve set in train your recovery plan, you&#8217;ll make the aftermath less heated. Once everything is back to normal, get in touch with your clients to give them an update. Remember that other companies may view you as you view other small business services and expect a similiar response from you as you do from your hosting company.</p>
<h2>Reliable IT staff</h2>
<p>Whatever the truth of it, accusations have been aimed at British Airways that it made redundant its best (and therefore expensive) on-site IT staff and that the delay in restoring services was in part attributable to having to use remote contractors. Small business services are especially vulnerable in this situation as they rarely employ in-house IT staff and are entirely reliant on the procedures and expertise of the hosted platforms they sit on, so ask your hosting company what its emergency plan is. What&#8217;s your SLA &#8211; everything restored in four hours? Within 24 hours? What resources does it have access to? How much redundancy is in place? Redundancy is effectively &#8216;spare&#8217; services and capacity that step in automatically to keep everything working when the main service is having problems. Ideally neither you nor your customers should notice that anything happened. Ask your hosting company too whether you&#8217;re charged separately for this type of support and what compensation is offered.</p>
<h2>Doing the day job</h2>
<p>BA is an airline: it flies passengers all over the world. This is and should be its priority, not dealing with IT problems and their very public fall-out. What would happen to your business if you had to spend three days dealing with IT problems instead of doing your real job? Would you lose money, miss opportunities, upset valued clients, have to cancel appointments, spend time and money reassuring and perhaps compensating people? These things have lasting consequences. To minimise the likelihood of a problem, the time it lasts and the fall-out you have to deal with, create a disaster recovery plan. <a href="http://blog.opensure.net/disaster-recovery/">We wrote an article about this</a> a while ago and the advice stands. Sometimes things go wrong, but in the words of that article, <strong>plan to reduce it from a disaster to a nuisance</strong>.</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fblog.opensure.net%2Fsmall-business-services%2F&amp;linkname=The%20BA%20fiasco%20%E2%80%93%20Lessons%20for%20small%20business%20services" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fblog.opensure.net%2Fsmall-business-services%2F&amp;linkname=The%20BA%20fiasco%20%E2%80%93%20Lessons%20for%20small%20business%20services" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fblog.opensure.net%2Fsmall-business-services%2F&#038;title=The%20BA%20fiasco%20%E2%80%93%20Lessons%20for%20small%20business%20services" data-a2a-url="https://blog.opensure.net/small-business-services/" data-a2a-title="The BA fiasco – Lessons for small business services"></a></p><p>The post <a href="https://blog.opensure.net/small-business-services/">The BA fiasco &#8211; Lessons for small business services</a> appeared first on <a href="https://blog.opensure.net">OpenSure Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Vatican library uses open source to avoid vendor lock-in</title>
		<link>https://blog.opensure.net/vatican-library-uses-open-source/</link>
		
		<dc:creator><![CDATA[heather]]></dc:creator>
		<pubDate>Tue, 16 Jun 2015 11:47:57 +0000</pubDate>
				<category><![CDATA[Open Source]]></category>
		<guid isPermaLink="false">http://blog.opensure.net/?p=2608</guid>

					<description><![CDATA[<p>Who knew Vatican library uses open source? Vatican library uses open source, according to this article: Vatican library: open source for long-term preservation The article looks at the way Vatican library uses open source and open standards for long-term preservation &#8230; <a class="more-link" href="https://blog.opensure.net/vatican-library-uses-open-source/">Continue reading <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://blog.opensure.net/vatican-library-uses-open-source/">Vatican library uses open source to avoid vendor lock-in</a> appeared first on <a href="https://blog.opensure.net">OpenSure Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Who knew Vatican library uses open source?</h1>
<p>Vatican library uses open source, according to this article:</p>
<h2><a href="https://joinup.ec.europa.eu/community/osor/news/vatican-library-open-source-long-term-preservation" target="_blank" rel="noopener noreferrer">Vatican library: open source for long-term preservation</a></h2>
<p>The article looks at the way Vatican library uses open source and open standards for long-term preservation of electronic documents. Head of IT at the Vatican Library, Luciano Ammenti, identified another key benefit: avoiding vendor lock-in.</p>
<p>Both of these points are interesting and we&#8217;ll take a closer look, but this line from the article really leapt out:</p>
<p style="padding-left: 30px"><em>The Vatican library does not have a policy prescribing open source and open standards, says Ammenti. “The reality is that in our data centre we use a lot of open source software, sharing our experiences with other scientific communities. It is a privilege to use their open source solutions.”</em></p>
<h2>The best solutions are open source</h2>
<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-2626" src="http://blog.opensure.net/files/2015/06/osi_symbol-150x150.png" alt="Vatican library uses open source" width="150" height="150" />In other words, the set up at the Biblioteca Apostolica Vaticana (to give it its proper name) hasn&#8217;t been prescribed or imposed by a higher authority, rather it simply provides the best solution and day-to-day it helps the Library achieve its aims. The Vatican library uses open source just because <a href="http://blog.opensure.net/quality-agility-open-source-of-course/">nothing else performs as well</a>, not out of adherence to higher principles. That&#8217;s a very powerful endorsement of open source, and further reading of the article reveals that the IT department at the Vatican library uses open source for wider operations.</p>
<h2>Well-maintained open source software</h2>
<p>Discussing digital file format in particular, Mr Ammenti referred to the features of the actively-maintained system the library uses and contrasted it with the only proprietary alternative, which was last updated in 1998. The freedom to identify and migrate to well-maintained open source systems such as that one is a key element of the appeal of open source and the heightened productivity it can unlock. Making operational decisions in the knowledge that open standards underpin the choices you make is a breath of fresh air for IT professionals used to working within the limits of proprietary systems.</p>
<p>If you have any queries about adopting open source alternatives to any of the proprietarysolutions you use, please email support@opensure.net.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fblog.opensure.net%2Fvatican-library-uses-open-source%2F&amp;linkname=Vatican%20library%20uses%20open%20source%20to%20avoid%20vendor%20lock-in" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fblog.opensure.net%2Fvatican-library-uses-open-source%2F&amp;linkname=Vatican%20library%20uses%20open%20source%20to%20avoid%20vendor%20lock-in" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fblog.opensure.net%2Fvatican-library-uses-open-source%2F&#038;title=Vatican%20library%20uses%20open%20source%20to%20avoid%20vendor%20lock-in" data-a2a-url="https://blog.opensure.net/vatican-library-uses-open-source/" data-a2a-title="Vatican library uses open source to avoid vendor lock-in"></a></p><p>The post <a href="https://blog.opensure.net/vatican-library-uses-open-source/">Vatican library uses open source to avoid vendor lock-in</a> appeared first on <a href="https://blog.opensure.net">OpenSure Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>An open source program to suit you</title>
		<link>https://blog.opensure.net/open-source-program/</link>
		
		<dc:creator><![CDATA[heather]]></dc:creator>
		<pubDate>Tue, 21 Apr 2015 13:48:19 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Open Source]]></category>
		<guid isPermaLink="false">http://blog.opensure.net/?p=2596</guid>

					<description><![CDATA[<p>What would you like an open source program to do? Imagine you&#8217;re already a very happy user of an open source program, full of the joys of freedom of choice, and you&#8217;ve chosen Original Sync (imaginary software for our imaginary &#8230; <a class="more-link" href="https://blog.opensure.net/open-source-program/">Continue reading <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://blog.opensure.net/open-source-program/">An open source program to suit you</a> appeared first on <a href="https://blog.opensure.net">OpenSure Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>What would you like an open source program to do?</h1>
<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-2626" src="http://blog.opensure.net/files/2015/06/osi_symbol-150x150.png" alt="open source program" width="150" height="150" />Imagine you&#8217;re already a very happy user of an <a href="http://blog.opensure.net/a-z-of-computing-o-is-for-open-source/">open source</a> program, full of the joys of freedom of choice, and you&#8217;ve chosen Original Sync (imaginary software for our imaginary scenario) to keep track of your contacts, appointments and emails.</p>
<p>You love it 95% of the time but there&#8217;s this little niggle &#8211; you&#8217;d like it to be able to do something additional to save you a job or help you work more efficiently. Wouldn&#8217;t it be great if it could talk directly to your note taking app or come with different coloured backgrounds for different days of the week or fill in a time sheet or in some other way do something totally incredible that it doesn&#8217;t do atm?</p>
<p>An open source program and approach allows you get those changes made &#8211; here&#8217;s how it works:</p>
<h2>Adding the features you want</h2>
<p>You approach your hosting provider (<a href="http://www.opensure.net">that&#8217;s us</a>) and pose us the problem. We talk to the programmers that we know and trust, and ask them if that mod is possible. Chances are it is, so the programmers obtain the source code (because that code is &#8216;open&#8217;, ie available to see and use) and develop it to include the features you want. Bingo &#8211; you have software that does just what you need it to do, an open source program with your name on it (not literally). The modified source code and new program is available for anyone to use, because why not?</p>
<p>The world is a happier place because Monday is pink and Tuesday is a delicate shade of sea green.</p>
<h2>Choice and freedom</h2>
<p>Using open source to run your business expands your horizons as it gives you the choice and freedom to use the software that&#8217;s right for you, not the software that a developer wants you to use or that you have to use if you want other related packages to keep working. This is called &#8216;lock-in&#8217; and is one of the most unattractive aspects of proprietary software. Switch to open source and lock-in becomes something that holds back your competitors, not you.</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fblog.opensure.net%2Fopen-source-program%2F&amp;linkname=An%20open%20source%20program%20to%20suit%20you" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fblog.opensure.net%2Fopen-source-program%2F&amp;linkname=An%20open%20source%20program%20to%20suit%20you" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fblog.opensure.net%2Fopen-source-program%2F&#038;title=An%20open%20source%20program%20to%20suit%20you" data-a2a-url="https://blog.opensure.net/open-source-program/" data-a2a-title="An open source program to suit you"></a></p><p>The post <a href="https://blog.opensure.net/open-source-program/">An open source program to suit you</a> appeared first on <a href="https://blog.opensure.net">OpenSure Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ownership of content and assets</title>
		<link>https://blog.opensure.net/ownership/</link>
		
		<dc:creator><![CDATA[heather]]></dc:creator>
		<pubDate>Thu, 12 Mar 2015 10:59:02 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://blog.opensure.net/?p=2577</guid>

					<description><![CDATA[<p>Ownership &#8211; content, domains, accounts, do you really hold the rights to everything you do online? It&#8217;s important to be clear about ownership of your web assets and content. Here we take a quick look at a couple of areas, &#8230; <a class="more-link" href="https://blog.opensure.net/ownership/">Continue reading <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://blog.opensure.net/ownership/">Ownership of content and assets</a> appeared first on <a href="https://blog.opensure.net">OpenSure Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Ownership &#8211; content, domains, accounts, do you really hold the rights to everything you do online?</h1>
<p>It&#8217;s important to be clear about ownership of your web assets and content. Here we take a quick look at a couple of areas, and include an update on something we were talking about a fortnight ago &#8211; linking accounts.</p>
<h2><strong>Who owns your content?</strong></h2>
<p>It&#8217;s reasonable to assume that you have total ownership and full rights over all your original content that you post on the internet. Reasonable, but possibly wide of the mark. Double check the Ts&amp;Cs of any sites where you post content.</p>
<p>Some sites such as LinkedIn <a title="LinkedIn user agreement via OpenSure blog" href="https://www.linkedin.com/legal/preview/user-agreement" target="_blank" rel="noopener noreferrer">explicitly reassure you that your content is yours</a> and you have full rights to it, but there&#8217;s a sting in the tail:</p>
<p style="padding-left: 30px"><em>&#8230;you own the content and information that you submit or post to the Services and you are only granting LinkedIn the following non-exclusive license: A worldwide, transferable and sublicensable right to use, copy, modify, distribute, publish, and process, information and content that you provide through our Services, <strong>without any further consent, notice and/or compensation to you or others</strong>.</em></p>
<p>&#8211; our bold, because that&#8217;s quite an important little clause. Some sites go further and expect to be able to use others&#8217; original creative content royalty-free. <a title="WattPad terms of service via OpenSure" href="http://support.wattpad.com/hc/en-us/articles/200774344-Terms-of-Service" target="_blank" rel="noopener noreferrer">This from WattPad</a>, a creative writing platform:</p>
<p style="padding-left: 30px"><em>C. For clarity, you retain all of your ownership rights in your User Submissions. However, by submitting User Submissions to Wattpad.com, you hereby grant Wattpad.com a worldwide, non-exclusive, <strong>royalty-free, transferable license</strong> to use, reproduce, distribute, display, and perform the User Submissions in connection with the Wattpad.com Website.<br />
</em></p>
<p>This is all there in black and white, but how many people actually read it, inform themselves and consider the ramifications? This is a concern as WattPad is aimed at the teen/young adult audience. These digital natives often dismiss this stuff as boring and unimportant, which can have unwelcome consequences.</p>
<p>If you&#8217;re posting original content make sure you understand what can be done with that content. Read the agreement and make sure you&#8217;re happy with it. Otherwise, don&#8217;t sign up.</p>
<h2><strong>Registering a domain name</strong></h2>
<p>Easy peasy. Find one of the few remaining available domain names, hand over your £9.99, fill in a few fields and you&#8217;re away. Or maybe you get someone else to do it and trust them to get it right. It isn&#8217;t that simple though and making common mistakes can jeopardise your whole business set-up.</p>
<h3>Common mistakes</h3>
<p>To focus on just a couple of mistakes, do you know who&#8217;s named as the owner of the domain your business relies on? Do you know who&#8217;s named as the administrative contact? These should be respectively the owner of the business and the person who is authorised and competent to act for you on domain matters. This should be an in-house IT person or a trusted technical provider.</p>
<p>Do you know if the contact email on your domain registration arrives at a live and monitored inbox? Is there an established path to contact you, eg to deliver notice that your domain name is nearing expiry? This all sounds extremely simple and it is, but many small business owners don&#8217;t know the answers. To make matters worse, they wouldn&#8217;t know who to ask. This exposes a business to losing their online presence and email addresses.</p>
<p>Consider this from <a title="Nominet via OpenSure blog" href="http://www.nominet.org.uk/uk-domain-names/registering-uk-domain/choosing-domain-name/advice/data-quality-improvement-programme" target="_blank" rel="noopener noreferrer">Nominet</a>:</p>
<p style="padding-left: 30px"><em>We have always required domain name holders to provide accurate and up-to-date information in the form of a correct registrant name and postal address. Failure to do this means a registrant <strong>risks losing their domain name</strong>.</em></p>
<p>And that&#8217;s before a company registering a .uk is wrongly described as a charity. This and other mistakes can legally permit your domain to be removed from you. We&#8217;ve had to act for clients who&#8217;ve suffered this mistake. It&#8217;s now our practice to run the rule over existing domains new clients bring to us. It&#8217;s all part of the service.</p>
<h3>Ask the experts</h3>
<p>Help is at hand. In this as with so much else, OpenSure can see the process through for you accurately and quickly. We can run a check on an existing domain and advise on domain queries, such as <a title="False invoicing scams - Nominet - via OpenSure blog" href="http://www.nominet.org.uk/uk-domain-names/manage-your-domain/security-spam" target="_blank" rel="noopener noreferrer">false invoicing scams</a>.</p>
<h2><strong>Using a third-party app to log-in</strong></h2>
<p>Two weeks ago we looked at why <a title="Smartphone security via OpenSure blog" href="http://blog.opensure.net/smartphone-security/" target="_blank" rel="noopener noreferrer">linking accounts on different platforms</a> wasn&#8217;t such a good idea, and now this from <a title="Hijacking on sites that use Facebook login - OpenSure blog" href="http://www.computerworld.com/article/2895035/tool-allows-account-hijacking-on-sites-that-use-facebook-login.html" target="_blank" rel="noopener noreferrer">Computerworld</a>:</p>
<p style="padding-left: 30px"><em>A new tool allows hackers to enerate URLs that can hijack accounts on sites that use Facebook Login, potentially enabling powerful phishing attacks.</em></p>
<p>All sorts of sites allow you to use other sites&#8217; logins to log in to them, eg <a title="Goodreads via OpenSure blog" href="http://goodreads.com/" target="_blank" rel="noopener noreferrer">Goodreads</a>. This is yet another example of stretching security rather thin, completey unnecessarily. Just come up with a unique login for your Goodreads account and snip another thread between your online identities.</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fblog.opensure.net%2Fownership%2F&amp;linkname=Ownership%20of%20content%20and%20assets" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fblog.opensure.net%2Fownership%2F&amp;linkname=Ownership%20of%20content%20and%20assets" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fblog.opensure.net%2Fownership%2F&#038;title=Ownership%20of%20content%20and%20assets" data-a2a-url="https://blog.opensure.net/ownership/" data-a2a-title="Ownership of content and assets"></a></p><p>The post <a href="https://blog.opensure.net/ownership/">Ownership of content and assets</a> appeared first on <a href="https://blog.opensure.net">OpenSure Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security quick tips to act on today</title>
		<link>https://blog.opensure.net/security-tips-act-today/</link>
		
		<dc:creator><![CDATA[heather]]></dc:creator>
		<pubDate>Wed, 04 Mar 2015 11:50:05 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://blog.opensure.net/?p=2521</guid>

					<description><![CDATA[<p>Security and giving away information Security isn&#8217;t just down to other people choosing not to hack your device or a service you use &#8211; you have some control and some responsibilities too. As part of our ongoing weekly series on &#8230; <a class="more-link" href="https://blog.opensure.net/security-tips-act-today/">Continue reading <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://blog.opensure.net/security-tips-act-today/">Security quick tips to act on today</a> appeared first on <a href="https://blog.opensure.net">OpenSure Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Security and giving away information</h1>
<p>Security isn&#8217;t just down to other people choosing not to hack your device or a service you use &#8211; you have some control and some responsibilities too. As part of our ongoing weekly series on security, we review three measures you can take today to increase your security and privacy and that of the people you communicate with.</p>
<h2>Keep distribution lists private</h2>
<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-2632" src="http://blog.opensure.net/files/2015/03/padlock-hi-150x150.png" alt="security" width="150" height="150" srcset="https://blog.opensure.net/files/2015/03/padlock-hi-150x150.png 150w, https://blog.opensure.net/files/2015/03/padlock-hi-300x300.png 300w, https://blog.opensure.net/files/2015/03/padlock-hi.png 600w" sizes="auto, (max-width: 150px) 100vw, 150px" />How often do you get an <a href="http://blog.opensure.net/e-is-for-email/">email</a> from someone that includes swathes of other email addresses in the Cc field? Lucky you if the answer is &#8216;not often&#8217;. Dare I ask how often you *send* an email like that?</p>
<p>It&#8217;s bad manners to reveal lots of email addresses that have been displayed without their owners&#8217; consent. It looks amateurish and spoils the layout of your email. Some recipients will realise it&#8217;s hardly personal and delete without bothering to read it.</p>
<p>So how do you prevent this and avoid jeopardising other people&#8217;s security? It&#8217;s very simple: when sending a mass email ensure that the recipient addresses go in the Bcc (blind &#8216;carbon&#8217; copy) field. Put your own address in the To field. That&#8217;s all it takes.</p>
<h2>Be careful what information you record</h2>
<p>It&#8217;s too easy to keep up a running commentary across the breathtaking range of social media opportunities. Add to that devices that we actively configure to record our sleep, exercise, health. We can even record our driving experience with dashboard cams.</p>
<h3>Proving your innocence</h3>
<p>The innocent face of this is to increase our own security and protect ourselves (proof that that white van simply pulled out in front of you). It helps us optimise our lifestyle for the benefit of our health. Consider though the implications of being on the wrong side of the law or a dispute. Clearly we aren&#8217;t going to encourage anybody to with-hold evidence or do anything shady, but put it like this: information you don&#8217;t record can&#8217;t be twisted to be used against you.</p>
<p>Just imagine the fun an insurance company (yours, or someone else&#8217;s) could have with your health and fitness data. What if it could be proved that you were sleep-deprived or fasting the morning you had a car accident (<a title="Cout accepts FitBit health tracker evidence - OpenSure blog" href="http://www.theguardian.com/technology/2014/nov/18/court-accepts-data-fitbit-health-tracker" target="_blank" rel="noopener noreferrer">consider this case ongoing in Canada</a>)? What if you&#8217;d used Twitter to vent your frustration with a child the day that child breaks an arm? You&#8217;d be innocent, but now you may have to prove that because of the information you&#8217;ve broadcast and/or recorded.</p>
<p>You&#8217;ve all heard of children having parties while their parents are away. The time and venue made it onto social media and 300 uninvited guests arrived, with predictable results. Hilarious. What a numpty. But take a step back and draw the connection between that and the situation you could be creating for yourself.</p>
<h2>Kill off obsolete accounts</h2>
<p>Over the years we accumulate vast numbers of accounts. These accumulate across forums, social networking, journal log-ins, multiple email accounts etc etc. It&#8217;s worth revisiting these from time to time and deleting any that you&#8217;re sure you no longer need. This minimises your exposure to hacking attacks as well as reducing the amount of information about you that&#8217;s available on the internet.</p>
<p>In most cases, certainly for personal non-work related accounts, it&#8217;s advisable to avoid using your real name for display purposes. Clearly professional sites such as LinkedIn are an exception. And remember &#8211; <strong>never EVER re-use a password</strong>.</p>
<p>&nbsp;</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fblog.opensure.net%2Fsecurity-tips-act-today%2F&amp;linkname=Security%20quick%20tips%20to%20act%20on%20today" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fblog.opensure.net%2Fsecurity-tips-act-today%2F&amp;linkname=Security%20quick%20tips%20to%20act%20on%20today" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fblog.opensure.net%2Fsecurity-tips-act-today%2F&#038;title=Security%20quick%20tips%20to%20act%20on%20today" data-a2a-url="https://blog.opensure.net/security-tips-act-today/" data-a2a-title="Security quick tips to act on today"></a></p><p>The post <a href="https://blog.opensure.net/security-tips-act-today/">Security quick tips to act on today</a> appeared first on <a href="https://blog.opensure.net">OpenSure Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Smartphone security</title>
		<link>https://blog.opensure.net/smartphone-security/</link>
		
		<dc:creator><![CDATA[heather]]></dc:creator>
		<pubDate>Wed, 25 Feb 2015 09:34:41 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[smartphones]]></category>
		<guid isPermaLink="false">http://blog.opensure.net/?p=2559</guid>

					<description><![CDATA[<p>Smartphone security &#8211; be informed Smartphone security and the specific risks attached to increased smartphone use have attracted a lot of attention recently. Not only is the technology ever more sophisticated, inter-connected and beyond many people&#8217;s ken, but we rely &#8230; <a class="more-link" href="https://blog.opensure.net/smartphone-security/">Continue reading <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://blog.opensure.net/smartphone-security/">Smartphone security</a> appeared first on <a href="https://blog.opensure.net">OpenSure Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Smartphone security &#8211; be informed</h1>
<p>Smartphone security and the specific risks attached to increased smartphone use have attracted a lot of attention recently. Not only is the technology ever more sophisticated, inter-connected and beyond many people&#8217;s ken, but we rely on these phones in business and give them free access to much of what we do.</p>
<p>By sending information back and forth and connecting to myriad accounts and services we concentrate lots of valuable data about ourselves in one easy to intercept location. Here we outline three steps you can take today to minimise your exposure.</p>
<h2>Reviewing connected apps &amp; accounts</h2>
<p>Do you run social media on your phone, using Twitter, LinkedIn, Instagram, Pinterest, Facebook etc for your business? Five minutes&#8217; use of these platforms will show you that many people automate cross-platform posting so that every Facebook status update is tweeted and every Instagram post pops up on Tumblr  &#8211; often with no accompanying information and without any suggestion of why we should want to schlep over to FB or Instagram to see it in its full glory.</p>
<p>There are lots of reasons for not cross-posting (from a content point of view, these platforms have different functions and audiences therefore your FB content isn&#8217;t suitable for Twitter and vice versa, and it bores audiences who follow you on several platforms to see the same content on each), but the most significant is that linking your accounts like this dramatically increases your exposure to hacking. If someone gets into one account it&#8217;s a short hop to compromise the others.</p>
<ul>
<li>Review your linked accounts and consciously uncouple wherever you can.</li>
</ul>
<h2>Remove apps that sell information</h2>
<p>Downloading a free app is always a gamble (and some paid ones are risky too &#8211; do your homework before downloading). Consider how the developer is going to monetise that app: it might be advertising, it might be anonymised user data gathering or it might be simply selling on your data, with or without &#8211; most likely without &#8211; your consent.</p>
<p>Consider <a title="Flashlight app data gathering via OpenSure blog" href="http://www.wired.com/2014/10/iphone-apps/" target="_blank">this Flashlight case</a>. First of all, what on earth is a torch app doing asking for  access to such a range of data in the first place? It gets worse. To quote the Wired article linked to above:</p>
<p style="padding-left: 30px"><em>The FTC has clamped down on another flashlight apps</em> [sic]<em> for doing downloading data for advertisers without informing consumers</em></p>
<p>Trying to find out precisely what information is being gathered (as opposed to simply the scope the app requests) is very difficult, and that&#8217;s in the developers&#8217; interest. As the article goes on to say, there&#8217;s really no such thing as a free app.</p>
<p>As well as that article listen to <a title="What info do apps sell? from The Naked Scientists via OpenSure blog" href="http://www.thenakedscientists.com/HTML/typo3conf/ext/naksci_podcast/jplayer/player.php?podcast=1000990" target="_blank">this brief podcast article</a> from <a title="The Naked Scientists via OpenSure blog" href="http://www.thenakedscientists.com/" target="_blank">The Naked Scientists</a>.</p>
<ul>
<li>Pay attention to the permissions a new app asks for and don&#8217;t download it if it&#8217;s not essential and you have concerns</li>
</ul>
<h2>Apply software updates</h2>
<p>Do you keep on top of your phone&#8217;s requests to update apps and software, or do you automate updating? Patches and updates come out in response to changes in external elements that apps use to run (ie not something within the developer&#8217;s control), in response to security concerns and calamities, and in order to offer you a better service or user experience.</p>
<p>You should have the option to authorise these updates manually (and change other settings such as downloading updates only over wifi so you don&#8217;t hammer your data allowance). Setting update to manual is a good idea if you want to keep close control over updates and have the option to review what they&#8217;re asking for. You might be surprised at what&#8217;s still lurking on your phone (you can uninstall anything you feel you don&#8217;t need any more &#8211; do you really need that eBay app these days, the one with your eBay password stored in it?) and what updates are asking to access.</p>
<ul>
<li>Set updates to manual and review them with every update request</li>
</ul>
<p>&nbsp;</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fblog.opensure.net%2Fsmartphone-security%2F&amp;linkname=Smartphone%20security" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fblog.opensure.net%2Fsmartphone-security%2F&amp;linkname=Smartphone%20security" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fblog.opensure.net%2Fsmartphone-security%2F&#038;title=Smartphone%20security" data-a2a-url="https://blog.opensure.net/smartphone-security/" data-a2a-title="Smartphone security"></a></p><p>The post <a href="https://blog.opensure.net/smartphone-security/">Smartphone security</a> appeared first on <a href="https://blog.opensure.net">OpenSure Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
