Archive for March, 2018

Ways to Make Using Dropbox Safer

Dropbox was started off by a MIT student, Drew Houston after he felt the need for a service that would allow him to easily access & share files. Ever since, Dropbox’s pace of growth has been magnificent. With over 500 million users around the world, it has come a long way from the time it was first launched in 2007.

People can easily store their files online and can access it from anywhere & on any device which has Dropbox installed in it. However, there are certain security concerns that the users must pay a heed to.

What Are The Possible Issues?

  • Data Retention – Users must be extra careful about the data they provide as when they sign up, they are required to fill information like username, password, phone number etc. which are then retained by the company. The data is retained by Dropbox even if you delete your account. This is done to comply with legal obligations.
  • 3rd Party Logins – If you are using your Google account or other 3rd party portals for logging in Dropbox, people with access to your Google login can also gain access to your Dropbox files.
  • Data Sync: Improper syncing of data on multiple devices can increase chances of data being accessed by other people. Let alone personal security, it has brought about serious security threat to employees and organizations following BYOD culture as IT department has little control over files that their employees sync with their Dropbox account.

How To Make Using Dropbox Safer

  • Enable Two-Step Verification – Normally a person fills in a password to login.  However, passwords may be weak & easy to hack. Thus to overcome this lag, two factor authentication is a great alternative. It ensures that a code is sent on your mobile phone every time you log into your Dropbox account. This makes it secure as it requires you to add the one time password sent on your device.
  • Unlink Old Devices – The primary benefit of Dropbox is that you can access your files from any device & from any part of the world, as they are saved online. With time, we change our devices but our Dropbox account stays linked with our old devices too. This poses a serious security threat. So, it is important to keep a tab over the devices it is linked to. If there are some devices which are no longer in use, then delink your account from them.
  • Set Up Email Notification – You can make necessary setting onto your email account and it shall notify you of any activity in your Dropbox.
  • Manage App Access – For better Dropbox experience, you may allow third party apps or device data storage to grant access or “sync” to your Dropbox account. Overtime, one often forgets which apps were granted permission to access your account. If there is an app which is no longer being used by you then it is best to rescind access to such an app.
  • Encrypt Your Files – You can use third party solutions to encrypt your files before uploading them on Dropbox for an additional layer of security.
  • Use Strong Passwords – The most common way to protect your data stored on Dropbox is to use strong passwords that are difficult to guess and hack by cyber- criminals. This way you move a step forward in ensuring security of your private & confidential data.

To get more information on IT Security, call Centex Technologies at (254) 213-4740.

No Comments

All You Need To Know About WannaCry Ransomware

PDF Version – All-You-Need-To-Know-About-WannaCry-Ransomware


No Comments

Pros And Cons Of BYOD Culture

Times have changed and this has brought a significant switch in business sector too. With BYOD (Bring Your Own Device) culture now ruling the picture, more and more employees are bringing in their own smartphones, laptops and tabs at the workplace to perform their tasks. There are certain things which go well with BYOD and have benefited the organizations whereas there are some limitations too which it has brought along. Let’s go through the pros & cons of BYOD culture.

Pros Of BYOD

  • Convenience – The greatest advantage is that they do not have to carry two devices along. Since, they can work from their own devices, they are easily reachable if a sudden or urgent business task arises. So next time if you ask your subordinate to send you an email they can easily send it from their own device.
  • Employee Satisfaction – When employees are allowed to work on the devices they are already comfortable working on, then it can significantly contribute towards employee satisfaction. Also, this way their productivity increases which gives them enough time to think innovatively.
  • Cost – If employees work on their own devices it means that the company need not invest on laptops and PC’s for them. So, it is a cost effective strategy that helps companies in saving thousands of bucks.
  • Take Advantage Of Newer Technologies – Updating company software and upgrading hardware on regular basis equates to shelling out dollars at the company’s end. Whereas, when employees are allowed to use their own devices, you don’t have to worry about this at all. Employees will themselves get their devices upgraded with latest technologies & software’s which shall indirectly help company reap huge returns.

Cons Of BYOD

  • Security – One of the major concerns surrounding BYOD is security. It is very difficult to overcome this challenge. Many employees have access to confidential information as well as logins & passwords details. If a virus creeps in their device it might also leave your official information susceptible to data breach.
  • IT Support – It is always easier for people from IT team to fix and deal with devices of similar kind. Things have become complex with the rise of BYOD culture, where each employee brings in their own device. Somebody’s device might not support a program/ format that runs on the other person’s device. In such a case, it becomes difficult for the IT department to fix these issues and ensure that all the systems on the network are compatible with each other.
  • Difficulty In Retrieving Data – Since all the official data is available on the employee’s device as well, it becomes difficult to retrieve it when once he/she leaves the organization.

The smartest move is to educate your employees and keep them informed about device safety. For more information on IT Security, call Centex Technologies at (254) 213-4740.

No Comments

Better Alternatives To Setting Passwords

Till date, passwords were the most widely used way for authentication and to keep critical information secure. However, given the present scenario and state of cyber security it can be stated that traditional password systems have not been able to meet the security challenge. As per a report by Verizon, 81% of data breaches in 2017 were either due to stolen or weak passwords.

What Is The Problem With Passwords?

First, passwords are not secure at all. A weak password can easily be guessed or hacked by the cyber attacker leaving the user’s confidential information at risk. Secondly, a strong password is formed by the combination of alphabets, numerals and symbols. With an intention to set a strong password that is not very easy to hack, people complicate it too much and quite often forget it (now that’s a valid paradox).

Thirdly, employees often expose the organization to risk due to their carelessness. Writing the passwords and sticking them up on their desks in order to remember and keep them handy is the most common mistake and is a serious security threat. Also, it is very difficult to remember so many passwords for different login credentials which is why an alternative to setting passwords is required.

Better Alternatives To Setting Passwords –

– With things like Apple Touch ID, Face ID passwords, unlocking using fingerprints etc. biometrics has gradually ingrained itself into our lives. It is an excellent alternative to using passwords as it involves our unique biology which makes it difficult to forge or hack. From fingerprints, eye retina scans, face scan etc. are all widely being used by people today. Also with time, more and more devices are becoming compatible to biometric verification.

Two- Factor Authentication
– It provides an added layer of security. It uses a piece of information that only the user knows apart from the username and password. Either a one-time password that is sent to the user on their mobile phone or a specific user information that only he/she knows makes it difficult for cyber criminals to hack the password.

Heart Rate – Another safe alternative is using a security technology that resorts to heart rates of a person. Now this is something that is quite difficult to hack as each person has a unique heartbeat.

Security Tokens – There are two types of tokens – soft and hard security token. They are not connected to a network and generate one time passwords instead making them a great alternative.

With the evolving technology, there has been a paradigm shift in techniques that are opted to protect the confidential information. As predicted by Bill Gates in 2004 at a RSA Security Conference, passwords would soon become extinct as people are now opting for other alternatives which seem to be safer somehow.

For more information on IT Security, call Centex Technologies at (254) 213-4740.


No Comments