Month: April 2018
Is Facebook To Blame for Use and Abuse of Personal Data?
The Truth Behind the Facebook Data “Breach”
An important take away from last week’s Senate hearings, on Facebook’s so-called data breach, is that no one seems to understand what exactly happened.
Join VPLS, as we help you better understand the latest Facebook controversy.
[av_hr class=’short’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’ custom_class=” admin_preview_bg=” av_uid=’av-5rk4q6d’] …
Is Facebook To Blame for Use and Abuse of Personal Data?Read More »
2018 Coachella Festival Cyber Safety Essential Tips
2018 Coachella Festival Cyber Safety Essential Tips
The 2018 Coachella Valley Music and Arts Festival is finally here!
As you plan your itinerary, don’t forget to add these VPLS 5 Essential Tips to safeguard your personal information while you soak up the sun, music, and culture that Coachella 2018 has to offer!
As the weather heats up and the Coachella 2018 weekend creeps closer, it’s all to easy to switch into vacation-mode and let your guard down in the chaos. Especially when you consider this year’s lineup, which includes grand artists, Beyonce, Eminem, and The Weeknd!
But, as you soak up the excitement of spotting your favorite artist on the main stage, don’t forget it’s also a perfect spot to host criminals looking to take advantage of your carefree nature by phishing for your personal data information. Why? Financial gain. That’s why!
No worries! If you’re wondering if it’s possible to enjoy the best of both worlds: a stress-free way to protect your cybersecurity AND still fully immerse in all the fun activities, the answer to your question is…
Yes!
https://www.instagram.com/p/Bh5m69el9Yd/
So without further ado, let’s dive right into the 5 Essential Tips that will keep you safe from cybercriminals during your exciting weekend at the 2018 Coachella Music and Arts Festival!
Protect Private Data at Coachella 2018
Public Wi-Fi connections in a large crowd setting make great phishing holes for cybercriminals.
Abusers will phish for your personal data information by secretly tapping into your phone or computer to install keylogger programs, which will then transmit all typed passwords and login information back to the cybercriminals. This includes financial login information from apps like PayPal, Venmo, or trusted Bank applications.
If you are able to, only choose password-protected networks for your Wi-Fi needs. Also, don’t forget to turn off automatic connections to open Wi-Fi networks; you never know who may be lurking behind the scenes.
When on vacation, it’s always a good idea to use cash or credit cards instead of your debit card. Typically, credit card providers offer better fraud protection services that can limit your personal financial liability.
Credit card companies will usually waive any liability, regardless of the amount, per their investigation. However, debit cards may not offer the same protections. Don’t leave yourself susceptible, in the event that a hacker drains your account without no warning.
By making copies essential identity documents, i.e. your passport, driver’s license, or credit cards (make sure to copy the back and the front of your credit card), you will be prepared to take action quickly! Pickpocketers and thieves are notorious for scouting large crowds for easy targets.
If you happen to lose your wallet, you have backup documents to call and cancel any cards, while also providing proper identification.
Here’s a universal tip to hack-proof all of your devices: use passwords to gain access into them. Regardless of whether it’s your smartphone, iPad, or personal laptop! Make sure all are secure with complex passwords, especially if the device stores any personal or financial data.
Even devices with a fingerprint reader should come with a strong passcode to restrict any and all unpermitted access to your phone, should it end up in the wrong hands.
Identity Theft protection insurance can prevent or lessen the effects of identity theft. Services provided typically include ongoing monitoring with quick real-time alerts, if any suspicious activity occurs involving your personal financial information.
With a 100% recovery coverage, you will be able to enjoy Coachella 2018, knowing that cybercriminals cannot successfully compromise your good name in any way, shape or form.
These 5 Essential Tips to Coachella 2018 are key elements to having a fun and safe Coachella experience. Be prepared and stay vigilant! Now let’s get back to having some musical fun in the desert sun!
FOLLOW, LIKE & SHARE VPLS!
If you want to keep up with the latest security trends and other IT related products and services, please visit the VPLS blog and stay current with the latest news!
Don’t forget, VPLS offers Managed Security Solutions that allows organizations to gain greater visibility into their network in order to detect and respond to attacks faster and with more intelligence.
Essential Checklist for Finding the Perfect Cloud Service Provider!
Essential Checklist: Finding the Perfect Cloud Hosting Provider
How can you be certain that your selected cloud hosting vendor is a trusted one who applies the best security practices? Easy! By knowing what questions to ask and recognizing potential red flags.
Without further ado, let’s dive in and go down the checklist of what to look for in a reputable cloud hosting company!
How To Select the Right Cloud Hosting Provider for Your Business
Signing up with a cloud hosting provider can feel overwhelming when you’re not sure what to look for. Additionally, many cloud hosting services tend to splash their site with ridiculous amounts of technical jargon that make it harder for any person to decipher alone.
To better understand what you’re signing up for and what services matter most to your business, let’s go down the list of essential questions and concerns you may want to be answered before proceeding:
Is the provider cloud compliant?
A legitimate cloud vendor may claim that they comply with legalities within the market they sell and service. Sadly, some providers who imply compliance, are really just banking on the compliance of their product and service partners. Be sure to ask details on compliance regulations and where their responsibilities lie when it comes to protecting data privacy.
Will the provider consent to an audit?
An honest cloud vendor will have no problem submitting their services to an audit. This audit should cover both the technology being provided and also the business processes the vendors use to operate those services. Passing an audit regularly is part of a trust-worthy cloud vendor’s normal routine.
Will the provider allow you to define their role and responsibilities?
A transparent cloud vendor will allow you to set clear expectations of what you want the vendor to be responsible for. Ideally, the vendor will meet these customer-defined responsibilities without any problem.
Will the provider deploy and enforce proper data protection standards?
A credible cloud vendor makes sure that their team members are using proper security technology to maintain and manage their services. This includes SSL encrypted connection, a sturdy password policy, and other practices that will guarantee a super secured cloud environment.
Will the provider practice proper cloud security policies?
A reliable cloud vendor knows exactly what security measures to take and when to put them into practice. They are known not only for preventing security breaches but also how to properly handle them should they occur.
Will the provider monitor physical security of the data server?
A responsible cloud vendor’s premises are secured with restricted access to secure equipment as well intricate device logging, to protect movable devices such as laptops and tablets.
Will the provider provide a service level agreement (SLA)?
A professional cloud vendor will continuously comply with all of the Service-Level requirements, inside and out, that were defined in the contract terms without having to be asked to do so.
Searching for the perfect cloud hosting provider doesn’t have to be so scary after all. Just keep this checklist on hand as you navigate towards a safe and reputable cloud hosting environment.
FOLLOW, LIKE & SHARE VPLS!
If you want to keep up with the latest security trends and other IT related products and services, please visit the VPLS blog and stay current with the latest news!
Don’t forget, VPLS offers Hybrid Cloud services that combine the flexibility and agility of putting on or pulling off data from hybrid data centers without compromising compliance and security.
Dire Consequences of Cheating on PUBG On the Rise!
The Public Enemy of PUBG
Leave it to cheaters to take the fun out of popular PC games.
Cheaters are running rampant on PlayerUnknown’s Battlegrounds (famously known as PUBG) by gifting themselves the unfair advantage during gameplay, and as if that wasn’t enough, cheaters are also profiting from their hacks on PUBG.
To better understand the reason behind all the unnecessary cheating, let’s dive into the world of PlayerUnknown’s Battlegrounds!
PUBG Cheaters and Hackers on the Rampage
PUBG has a storyline similar to one you may have already heard of, Suzanne Collins’ The Hunger Games.
Much like the book, players start off with a team of four (including themselves), then proceed to fight and kill team members of the opposite team until only one player is left standing. The surviving player’s squad takes the win and all the glory that goes with it.
Sounds fair enough, right? Think again.
You may be wondering, “How exactly are these hacks taking place in PUBG and how do they affect me?”
Cheater, Cheater, Virtual Hate Eater!
The problem that hackers and cheaters pose to the game lies in the permissions and advantages (aka hacks) to which their avatars are allowed, thereby causing unfair capabilities against other players.
These hacks include the use of an aim bot, which automatically targets your weapon so you never miss a shot. Additionally, PUBG cheaters are granting themselves the ability to teleport anywhere within the game, and also use a wall hack to allow their avatar the ability to see and walk through walls.
For honest players, the continuous poor gameplay can be discouraging and can even lead to temptation in downloading a few game hacks for themselves.
Cheating and hacks are so widespread that Anti-cheat service, BattlEye, has brought down the ban hammer on a total of 1.5 million PUBG players since January of this year.
…And those numbers are expected to escalate by the day.
We have banned nearly 25K PUBG cheaters within the last 24 hours. And no, we don't like such numbers at all.
— BattlEye (@TheBattlEye) October 22, 2017
Reaping in the Rewards
What causes players to go through all of the trouble just to win a match? It’s simple. Money.
At the end of every PUBG game, winners are presented with prizes that can be sold for Steam Currency. Steam Currency is a universal game currency that can be used across different platforms and towards various products and services.
With endless possibilities and the extra perk of playing their favorite PC game, it will be a long time until the trend of PUBG players using cheats or hacks, runs its course.
Cheaters Never Win…
Fortunately, the rules of the real world apply to PUBG as well.
There are consequences that hackers can face in order to cheat a win in a PUBG game. Because the majority of cheaters stem from China, Bluehole Studios, the developers of PUBG, are planning to limit the number of Chinese gamers that show up on Western servers. If this restriction does not better regulate the situation, Bluehole Studios is willing to take more drastic measures to prevent cheaters from hurting PUBG as a whole.
…And Winners Never Cheat!
In conclusion, as tempting as it can be to sink to their level and win a PUBG match using your own hacks, try to keep yourself calm by remembering this notion: True winners never cheat.
While many have made a killing on PUBG, their methods are through questionable means and have caused the decline in users over time. If you are someone who enjoys the gameplay as it was developed, a fun skilled game that brings you and your team together towards a common goal, then you are victorious whether or not you receive the cash prize.
FOLLOW, LIKE & SHARE VPLS
If you are someone that enjoys crisp graphics and layouts, VPLS offers professionally constructed Web Design Services that will add the perfect oomph! to your website.
Don’t forget! If you want to keep up with the latest security trends and other IT related products and services, please visit the VPLS blog and stay current with the latest news.
Ready Player One: Will VR Technology Change Our Near Future?
Ready Player One: A Virtual Reality Phenomenon
Now a worldwide phenomenon, Ernest Cline’s Ready Player One has recently been adapted into a science fiction adventure film directed by renowned filmmaker Steven Spielberg.
The movie has everyone wondering how far VR technology has come and what tech leaders across the globe are doing to bring us closer to a virtual future.
Ready Player One: A Very Short Synopsis
Set in 2045 in a highly dystopian society where “being human totally sucks most of the time [and] video games are the only thing that makes life bearable,” citizens find solace in a virtual reality world called the OASIS.
A young underdog named Wade Watts, decides to change his reality and finds himself in a universe of ground-breaking reality-bending, danger, mystery, and discovery.
Virtual Reality to the Next Level
Virtual reality is taken to the next level in both the film and the book. According to Cline, the character James Halliday “created the OASIS because [he] never felt at home in the real world. [He] didn’t know how to connect with the people there. [He] was afraid, for all of [his] life, right up until [he] knew it was ending. That’s when [he] realized, as terrifying and painful as reality can be, it’s also the only place where you can find true happiness. Because the reality is real.”
If this is so, how close are we as companies, society, and citizens to achieving that kind of true happiness?
Games like OASIS Beta, which were created in partnership with the movie by Viveport Studios on the HTC Vive platform, attempt to give audiences a taste ground-breaking and heaven and hell aspect of VR from the OASIS in the movie and book.
According to Anshel Sag, Moor Insights & Strategy technologist and technical writer focusing on consumer platforms, on Forbes, 2017 was a turnaround year for VR, and it looks like 2018 will be a continuation of that trend. While both virtual and augmented reality is a ways away from reaching their full potential, there are a significant number of VR users in 2018 than there were in 2017.
According to CEO and founder of HostingFacts, there were about 90 million active users in 2017 and VR is projected to increase to 171 million users in 2018, which is almost double of 2017.
The Next Generation of VR
Currently, there are many next generations of VR technology, including new displays and high-quality tracking. Developers and headset manufacturers have learned these lessons and are integrating them into current hardware and software trends.
For instance, Vive and its new HTC Vive Pro headset focus on the high-end user and enterprise customers who are currently willing and able to spend lots money on new, higher resolution headsets. Just like in RPO, the characters experience a whole new world of VR in the OASIS when they put on their high-end headsets.
In an interview with gaming contributor Heather Newman from Forbes, Joel Breton, General Manager of Vive Studios, talks about how far away we are from achieving the kind of tech in RPO and what the delay is:
“The Ready Player One story occurs in 2045, 27 years into the future. We know that CPU, GPU, bandwidth, full haptic bodysuits, and gloves will all be orders of magnitude more powerful, faster, and cheaper. Continued development of these necessary components for premium VR will experience exponential growth over the next 27 years.
I think that we are about 7 to 10 years away from deploying the technology enjoyed in the Oasis as described in the story and shown in the film. By then we will certainly have full haptic feedback, 64K resolution displaying at 120 FPS, and 8G bandwidth at consumer-friendly price-points. With that kind of firepower, we will be very close to launching worlds as expansive and immersive as the OASIS in Ready Player One.”
As we continue to see advancements in VR, especially with experiences that transport the user completely inside of a game, a world, or an application, this means that we can learn more and faster by experiencing content according to Breton.
Currently, there are plenty of phenomenal applications for 3D design, architecture, enterprise training, art and education, cinematic stories that can be very useful and effective VR learning tools for the future of any company in any industry and Ready Player One is just a snippet of how close we are.
Ready Player One is playing in theaters everywhere now.
FOLLOW, LIKE & SHARE VPLS
If you want to keep up with the latest security trends and other IT related products and services, please visit the VPLS blog and stay current with the latest news!
Sources: Forbes, The Next Web
Fog Computing: Unlocking the Business Value
Cloud Moves to the Fog, discusses what fog computing is and compares fog computing, cloud computing and the Internet of Things.
It also addresses the technology challenges facing the modern cloud. In this blog post, we will focus on four fog-related business benefits that IT professionals should take into consideration when deciding whether to deploy an enterprise-wide fog computing strategy.
1. Improved Customer Experience Reduces Churn
In this highly competitive business climate, customer experience is more important than ever before. Every interaction a customer has with your business is a new opportunity for you to provide an exceptional experience.
A critical component of this experience is personalized service. The use of IoT-based devices combined with a customer’s expectation of personalized service is now driving businesses to speed up data analysis and deliver a customized response. By moving the analysis to devices at the network’s edge, companies with customers across the country can implement networks in different geographic areas, closer to their key customer centers. This reduces the distance that critical data needs to travel, delivering an improved user experience and a higher level of customer satisfaction.
2. Faster Business Decision Making Improves Business Processes and Reduced Costs
Today, every department is charged with reducing costs, improving business processes and adding to the company’s bottom line. It requires agility in both thinking and execution.
Especially prevalent in manufacturing environments, the ability to place hardware close to the factory floor to quickly review and adjust production performance, throughput and reliability can have a substantial impact on a company’s bottom line.
Shorter lag-time and enhanced decision-making by technicians, machine operators, quality control managers, and plant foremen, combined with decreased latency and increased connectivity speeds between the factory floor and edge devices deliver advanced business processes.
3. Increased Employee Privacy and Prevention of Cyberattacks
The more devices you add to various points on a network, the greater the opportunity for a cyber-attack to occur. So, you would think that a fog computing strategy would help hackers in entering a company’s IT network through an edge device.
But, you would be wrong. Because the goal of fog computing is to position devices and data analysis at the edge, outside of the network’s hub, a company can actually strengthen their network by increasing security measures on the edge devices, keeping threats at bay.
Since most of the data moves between local IoT connected devices and an edge device, with only a small amount of data transferred to the cloud less frequently, potential attacks can be spotted before they infect the entire network. In addition, security can also be increased at the employee level with specific individuals identified as a greater risk for potential attacks. Their data can be analyzed and potentially stored in the fog rather than transferred to a central cloud database where it could be accessed by other unwitting employees.
4. Alternative Business Continuity Solution
Fog computing is a critical component of a company’s larger IT infrastructure and should not be treated as an afterthought with edge devices simply placed in the closets of a company’s branch offices.
For a fog implementation to succeed, it must be managed and maintained with as much planning, care and attention as the rest of your data center colocation or cloud services. Data center-based edge devices enable you to incorporate systems which detect failure such as a power outage and automatically enable backup servers to kick in at the same physical location or another location altogether. Here are 3 critical steps:
-
- Select a data center provider like Evocative that has multiple connected data centers in various regions across the U.S.
- Implement edge technology in specific data center locations close to your facilities or your customer-base depending on your business needs and objectives.
- Implement a cloud strategy in a separate data center location with the same provider to provide long-term data storage.
This ability to implement an all-inclusive edge/cloud solution with one trusted data center provider across multiple, connected data center locations can help your business remain up and running even if a disaster occurs.
Conclusion When evaluating how fog computing fits into your IT strategy, it is important to consider your company’s business requirements. The faster and more accurately business decisions can be made, the more successful your company will be at enhancing your customer experience, improving business processes and reducing costs. Edge technology stored by a data center provider like Evocative that has both a local and national footprint will enable you to:
-
- maintain both your edge and cloud infrastructure in the hands of one trusted data center provider
- reduce the strain on cloud services, sending only the most appropriate data to the cloud
- eliminate downtime or data loss in a disaster
- meet both your business and IT goals by implementing best practices company-wide
Will Trump's War on Amazon Be the Beginning of the End for the Public Cloud?
Why Are Companies Leaving the Public Cloud? Dropbox was the first well known company to leave the Amazon cloud two years ago, deciding to build their own IT infrastructure, and President Trump’s attack on Amazon is reigniting industry tensions.
The top four concerns of IT professionals in adopting a public cloud computing strategy are:
-
- security
- achieving governance and compliance goals
- overcoming the challenge of an inexperienced public cloud staff
- vendor lock-in which hinders agility and flexibility
Benefits of Pay-As-You-Go Data Center
In addition, greater control over applications and infrastructure, increased costs as workloads grow, always-on availability, and centralization of technology are also issues driving the transition away from the public cloud.
Scalability is always on the list of key benefits, but it is important to realize that as a company’s workload grows, the public cloud cost can actually become greater than a private cloud or dedicated servers as more features and resources are used. For companies in financial services, healthcare, legal or other regulated sectors, compliance issues are also causing many firms to remain rooted in dedicated IT options.
Many companies who jumped into Amazon AWS or Microsoft Azure with both feet and now want to leave the public cloud, don’t have the capital or resources to build-out their own facility. Using the colocation services of a purpose-built, pay-as-you-go data center is a reliable and secure alternative embraced by more and more enterprises every day. The benefits are significant:
- Technical expertise
- Disaster recovery preparedness
- Support services to provide on-site assistance
- Affordability by turning a traditional capital expense into a low operating expense
- Flexibility to pay-as-you-go, increasing or decreasing your physical space, power and IT requirement as your needs change
- 100% uptime reliability
- 24/7/365 network monitoring by a team of technical professionals
- Connectivity choices providing multiple carrier options under one roof
- Ability to customize hardware to meet specific needs
Government Interference into Amazon’s AWS: Public Cloud Services
President Trump’s tweetstorm has shined the light on government interference and its ability to bar specific companies like Amazon from doing business with the federal government.
This brings into question whether any company, organization, or government agency should go all-in when it comes to public cloud services, since government interference into Amazon’s AWS business could trickle down to their customers in the future. Is this a sign of more to come?
The Department of Defense expects to announce the winner of its cloud services contract in Q4 of this year, so we shall see. Maybe businesses should begin evaluating alternative IT storage and management solutions in case a cyber wall is on its way.