Category: Product and Services

  • Ethical hacking

    Ethical hacking

    Maybe you should encourage your kids to become hackers. When you open Twitter handles and Linkedin profiles, it’s not unlikely that you’ll find people listing hacking as a skill.

    Parents used to tell their kids to become doctors, lawyers, and accountants. Later, they advised them to learn about computers. These kids have now grown to become hardware specialists and then software specialists today.

    In the past 10 to twelve years, we have seen ourselves thrown into the fourth industrial revolution. In it, technology affects our lives through social media and augmented reality.

    We share a lot of our personal information with more people, companies, and institutions every day, willingly and are often blasé about it. This has tempted people to steal this information by hacking it. 

    Hacking background

    Since the advent of personal computers in the 1980s hackers have become prolific, initially in ‘first-world’ countries that had an advanced infrastructure. There were numerous cases in the US but as computer technology permeated the world, hackers followed suit. 

    A hacking group called MOD, Masters of Deception, in the 1980s allegedly stole passwords and technical data from Nynex, and other telephone companies as well as several big credit agencies and two major universities.

    The damage caused was extensive and one company, Southwestern Bell said it suffered losses of $370,000 alone. These days the damages, though not always publically announced, can run into a few millions of dollars.

    READ MORE about the Online Threats hackers use here

    All this has paved the way for a special information technology (IT) vocation. A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system and networks. They break into systems they aren’t authorized to, and tend to break seamlessly into email and banking systems.

    Advertisment

    Hacking as a career

    Ben Wilson works as an ethical hacker. He has more than ten years of experience and worked in London where he received on-the-job training. He now works remotely in South Africa servicing UK clients.

    “I test websites for clients and look for vulnerabilities in the systems. I have done a lot of work for banks lately but my work is across industries.” 

    “Energy companies are using my services more and more,” he says.

    Wilson says he worked in a permanent position for six years. Right now he contracts for five clients regularly.

    Ethical hackers are the knights who test how permeable these systems are.

     

    “The majority of my work is for British clients. The UK pound is strong and I like to earn pounds. I’d say the best computer security consultants in the world are in the UK. The US is strong too but the UK consultants are sophisticated and the best.”

    Vulnerabilities

    The most common way in which people hack information is through email contacts; especially personal Gmail accounts.

    People think that their information is safe because it sits with one of the largest companies in the world. But this is exactly why it isn’t safe.

    Gmail and other third-party free email accounts are regularly hacked. If you want to protect especially valuable information you should either upgrade it to the business/enterprise level, use a different email service, or perhaps the one connected to your employer. 

    Nowadays companies use services to protect themselves against hacks and unauthorized access. These monthly or annual service providers might employ ethical hackers to check the companies’ systems.

    Hacking, however, isn’t just something that happens to big companies or in blockbuster movies. Here are some reality checks:

    • All websites are under threat;
    • So are applications (Apps) on your phone;
    • People can also program artificial intelligence (AI) to hack into systems. This has become a big concern and theme for security experts.

    Ways to proactively prevent a hack 

    Fortunately, there are several ways of protecting yourself and your information from hacking; starting with your emails. Be wary of “phishing” emails asking you to update your information, especially for bogus databases that you have never heard of.

    Use a spam filter – Avoid opening attachments from senders you don’t know – Update your passwords regularly – It helps to have authentication methods, such as a smartphone-linked and email-linked authentication (2FA) or security keys like Yubico – Do not click on any ad – period! Back up your files regularly – it’s always a good idea – Don’t allow ransomware bullies to bully you.

    • If you get sent communication saying that people have your files and want money or they’ll release the files; ignore them.
    • They can’t threaten you forever and might eventually move onto another target especially if your information loses its value over time.

    Anti-hacking software

    As a business, use tools like those from cybersecurity experts Acunetix. More than 4 000 companies protect their web applications from vulnerabilities using its powerful web scanner.

    Its penetration testing software prevents potential attacks by identifying holes in your websites’ coding. This is where hackers usually plant their complex code which allows them to extract data such as contact details, credit card details, and in worse cases, company-sensitive data like patents and blueprints.

    Naturally, it also scans networks to find gateway loopholes that could lead to crashes and downtime-related losses. A bank’s website going down for a few hours can cost it several thousand or even millions in lost revenue.

    Despite having firewalls, VPNs, and other Internet security systems in place, your websites and apps being developed are still vulnerable to cyber-attacks or a hack.

    The most commonly known hack used is a DDoS attack. Basically, it works like a traffic jam clogging up a highway, preventing regular traffic from arriving at its desired destination. Incidentally, only a few days ago, Amazon was hit by a DDoS Attack.

    So, how would you know or find out if you are vulnerable?  By conducting regular scans on your websites and apps to see where vulnerabilities lie.

    Avoiding a hack requires common sense

    Be aware and don’t fall into scams. It’s unlikely you’ve won 120-million Euros in a lottery. You should know by now that you are not the descendant of a king!

    In addition, if someone says they have a sex tape with you in it and they want your salary, unless you know you made a sex tape, they’re probably lying.

    Unless of course, a scorned lover of yours tricked you – but you can’t blame technology or a hacker for that.

     

  • The Online Threats of 2019

    The Online Threats of 2019

    How you can stop them from happening.

    Like a biological virus mutates – as technology advances so do the complexity of phishing and identity theft schemes. With major services adopting cloud technologies and storing private data online, anyone is vulnerable to hacking.

    To make matters worse, hackers continue to come up with some pretty creative ways to profit from stolen information.

    Without wasting time, these are the things you should already be doing to avoid being exposed to hackers in the first place:

    In order to keep these cyber-criminals out of your lives and computers, let’s take a look at some of the actual schemes to watch out for in 2019.

    Hacking

    We all know what hacking is by now – the term has almost become synonymous with internet security. So a question is: do you love watching movies on Netflix or jamming out to your summer playlist on Spotify? If the answer is yes, then you’re at a pretty high risk of getting hacked.

    DynaRisk, a UK cybersecurity firm, recently found that cybercriminals most commonly target these brands, along with adult-oriented sites (you know what we mean) and then, online gaming services.

    Identity Theft

    A few weeks ago, authorities caught a New York-based gang who had used identity theft to steal over $19 million worth of iPhones. Quartz reported that this operation ran for seven years.

    So-called “Top Dogs,” the ring leaders, would organize lower level members of their organization to steal identities and create clone credit and identity cards. Then, affiliates fanned across the nation, signing up for mobile phone plans to acquire iPhones, which were later sold for a profit by the Top Dogs.

    Because phone payment plans take the shape of nominal fees over the course of several years, victims often wouldn’t notice the fraud until it was too late. Learn how another scheme dubbed sim port attack works in the diagram below:

    Ransomware

    Hacking can happen to anyone – including our favorite bands. In early June, a hacker managed to steal the minidisk archive of Thom Yorke, the lead singer of Radiohead. This included previously unreleased demos and audio material from around the time of “OK Computer,” the band’s 1997 worldwide hit album. The hacker then demanded $150,000 on the threat of releasing it.

    Holding files for ransom is so common nowadays that it even has its own name: “Ransomware.” Either pay over the ransom or lose your files—or, even worse, have them released onto the unforgiving Internet.

    In response, Radiohead released all 18 hours of material on Bandcamp themselves, winning against these ransom hackers.

    Most security experts recommend the same route as Radiohead—never pay the ransom, because there’s no guarantee you’ll recover files or prevent their release.

    Sextortion

    If you think ransomware is bad, there’s an entire subgroup of it aimed to profit off sexual shame. Cheekily named “Sextortion,” some hackers creatively upgraded the classic email phishing scam to scare victims into handing over Bitcoin.

    According to Fortune, hackers have already racked up over $900,000 with sextortion. In these phishing emails, the sender claims to have spied on you while you watched porn—and has webcam footage of the salacious deeds. The message then demands a Bitcoin ransom, or else face the social and professional consequences of this lewd video getting sent to all your contacts.

    To make the threat even more believable, the sender references a previous password tied to the user’s email account. According to Krebson Security, a sextortion phishing message might look a little like what’s written in the sidebox.

    In rare cases, the threats are real—and hackers get their hands on some sexually explicit photos. Recently, American actress Bella Thorne fell victim to sextortion. Last Saturday, she took a similar, albeit more risqué, route as Radiohead, opting to release her nude photographs on Twitter in order to take the power away from her hacker.

    Last thoughts

    So, what’s the best way to avoid your personal, or, business from costing thousands in virtual currency? Since most of these emails are fake, you can just avoid them with a spam filter. And you should probably buy a webcam cover…just to be safe. When it comes to general browsing- we suggest using a VPN.

    Read more about VPNs here

    There are now more secure anti-hacking tools that use the Blockchain and offer great protection, especially against identity theft. Have a look at our feature on Tokenisation.

    Most online services now like mobile banks, offer App-based 2-factor authentication. This should now be regarded as the minimum security for ANY online account or App.

    To avoid hacking or phishing scams in general, optimizing your cybersecurity and using online common sense will save you loads of time, trouble and money.

    Cybersecurity by Acunetix
  • Cloud-hosted services square up

    Cloud-hosted services square up

    Running your business requires choosing the right tools for you and your employees. In order to streamline work-related productivity, many organizations are migrating to cloud-based office suites. Specifically, Microsoft’s Office 365 and Google’s GSuite (now known as Google Workspace).

    Both products boast a variety of helpful productivity tools and the latest remote collaboration technologies. While it’s impossible to say which one is “better”. This head-to-head comparison can help you decide which office suite is a better fit for your business.

    What is Workspace & Office 365?

    Office 365 and Workspace (previously GSuite) are packages, of powerful business tools that facilitate your day-to-day tasks using the cloud. They even provide business emails along with apps for creating documents, spreadsheets, presentations, video conference calls, shared calendars, and notes.  

    In addition, storing information on Google or Microsoft servers, rather than your own via these suites, can also save your business a lot of money.  

    Plans and Pricing

    First, let’s look at plans and prices. It’s important to note that Microsoft requires an annual commitment, while Google offers you the option to make monthly payments if you prefer.

    Contact us to get a formal quote for your business
    GooglevsMicrosoftSuites
    Cloud packages head-to-head

    Email

    While both Office 365 and Workspace offer web and mobile apps (Outlook and Gmail, respectively) for email. There are, however, some subtle differences.

    One advantage to Office 365 is the desktop version of Outlook, which is incredibly feature-rich and lets you sort and group emails with ease. Gmail, on the other hand, is widely used throughout the world. For this reason, a variety of third-party app options (e.g. WordPress) can be linked to it to enhance its capabilities.

    Cloud Data Storage

    For the entry-level plans, Office 365 Business Essentials wins out with 1 TB (terabyte) of storage per user, while the Workspace ‘Basic’ plan only offers 30 GB. GSuite includes emails in this storage limit, whereas Office 365 provides extra storage for email files with added archiving.

    However, Workspace’s upgraded plans beat out most of Microsoft’s storage offerings. So long as your business has more than five employees, Workspace Business and Enterprise provides unlimited cloud storage. Although, businesses with less than 5 employees on the “Business” plan are capped at 1 TB. Only Microsoft’s E3 plan and higher offer the same unlimited cloud storage.

    Applications

    Applications are the cornerstones of a suite’s functionality. Workspace and Office 365 offer you a variety of comparable apps for word processing, creating spreadsheets and presentations, all on the cloud!

    This means every user gets a free desktop version of the Office suite (i.e. Microsoft Word, Excel) to download.

    These feature-rich apps expand far beyond the capabilities of the mobile and online versions, and are available on every plan except the ‘Business Essentials’.

    While both services offer mobile and online apps, one major benefit of Office 365 are its desktop applications.

    Collaboration

    These online applications make both suites ideal for remote collaboration. Microsoft Teams lets facilitate this with tools like real-time co-authoring, mentioning users by name and chat capabilities while working on OneDrive. Microsoft now lets you collaborate using its desktop apps, too, although the updates to shared files are a bit sluggish compared to its online apps.

    Similarly, GSuite offers Hangouts for chats and Google Drive for real-time collaboration. Google’s online and mobile apps were created with cloud collaboration in mind, so some might find them a bit more user-friendly.

    For remote meetings, GSuite and Office 365 both offer group video conference calls. If you plan on large-scale video conferences, then Office 365 offers far more for your money: most plans have a 250-participant limit, while the E3 plan increases to an astounding 10,000-person limit.

    Meanwhile, GSuite’s Google Meet allows up to 25 participants on the “Basic” plan, 50 on the “Business” plan, and 100 on the “Enterprise” plan.  

    Security

    Cloud services are running into a variety of security issues, and these suites are no exception.

    A 2019 Barracuda Networks’ report found that a large percent of ATO (account takeover) attacks were targeted at Microsoft Office 365 accounts after businesses migrated emails to the service.

    These attacks prompted the Cybersecurity and Infrastructure Security Agency (CISA) to issue a set of best practices. The aim was to help organizations migrate their email services while avoiding risks and vulnerabilities.

    Meanwhile, Google recently announced that a cloud storage feature for encrypted passwords on its “Enterprise” plans was faulty. As a result, some user passwords were stored in plaintext on Google’s servers!

    While cloud computing has its risks, the two suites do have impressive security features. GSuite is comparable to Google’s own level of security and offers AI detection of suspicious activity, Two-Factor authentication, and data leak protection—in which admins can block outgoing communication determined by set keywords.

    On the other hand, Office 365 has the option of Multiple Factor Authentication (MFA), along with the detection of malware, viruses, and suspicious activities. Microsoft also provides data loss protection, and admins can restrict access to company-issued devices only.

    Ease of Use

    So, which is easier to use? Well, it depends on who you are, and your ability to grasp software quickly.

    If you’re accustomed to working with MS Word or Excel documents, and edit them for work on a regular basis, then Office 365 and its desktop-to-online formatting compatibility will probably be your best bet. This is especially true if your company solely computes with Windows PCs.

    However, new users might find GSuite apps easier to learn, as the tools are a bit simpler and straightforward.

    So, which is best for you?

    Firstly, Office 365 offers feature-rich apps, and most of its plans come with a desktop version of MS Office applications. This is a definite advantage over its competitors.

    Its entry-level plan is far more generous in terms of data storage than GSuite’s “Basic” plan. In addition, businesses that already exclusively use Windows technology are likely to find Office 365 better-suited for their needs.

    With that said, GSuite was originally designed as a cloud collaborative productivity tool. Therefore, its features might be easier for collaboration and can be used among a wider variety of Windows and Mac devices. In addition, GSuite’s Business’ plans and above outdoes Microsoft when it comes to unlimited cloud file storage. <- This has changed since the article was first published.

    Unfortunately, I can’t tell you which of the two is “best.” But, with this knowledge in mind, you can make an informed decision to choose the best cloud suite for you.

  • The latest cloud computing trends in 2019

    The latest cloud computing trends in 2019

    It’s 2019, and the Cloud is everywhere—from the apps we use every day to the infrastructure of global tech giants.

    According to researchers at Gartner, revenue generated from public cloud services is projected to grow 17.5 percent in 2019. This amounts to a total of $214.3 billion, up from $182.4 billion in 2018.

    More than a third of organizations surveyed by Gartner saw cloud investments as a top three investment priority. With this kind of growth, tech organizations are racing to get on board with cloud-only software and platforms.

    Here are some of the trends to look out for this year:

    Hybrid Cloud, Multi-Cloud and Mergers

    IBM announced its purchase of Red Hat last October, calling it the “most significant tech acquisition of 2018.” This combined Red Hat’s extensive network of open-source clouds with IBM’s Hybrid Cloud team.

    Mergers like these are likely to become a trend this year, as companies see the benefit of using multiple clouds across all sectors of their organization.

    Furthermore, this system will dominate in the future, as businesses find public clouds inadequate to meet every one of their requirements.

    As a more flexible and functional solution, many organizations will shift to a network of multiple private, public and hybrid clouds in the future.

    Serverless Cloud

    Serverless computing is a young market in technology, but it will continue growing in 2019. It isn’t actually “serverless.” Instead, it is a cloud-computing model in which the cloud provider itself runs the server on a dynamic, as-used basis (FaaS).

    Rather than buying server space, developers can use a back-end cloud service to code. They will only then pay for the server space they actually use.

    As this relatively new technology develops, we can expect to see more companies providing and expanding their “serverless” offerings.

    Artificial Intelligence

    Although cloud technologies are growing exponentially, artificial intelligence (AI) could prove an even greater economic driving force. According to Accenture, the impact of AI could double economic growth rates by 2035 in developed countries. 

    Around 80 percent of large companies have adopted some form of AI, according to the Harvard Business Review.

    Amazon, Twilio and Nvidia, to name a few, are thus, incorporating AI with cloud computing, next-gen GPUs and the Internet of Things (IoT). This has led to the developing of applications with “smart assistants,” and voice-to-text technologies.

    Such a combination of AI and the cloud provides an extremely powerful and unconstrained computing network.

    Security

    Digital transformation is already underway, with Gartner also projecting that 83 percent of all workloads will shift to the cloud by 2020. However, this movement presents issues of cybersecurity.

    Many businesses have not properly secured their cloud-stored data. For example, marketing and data aggregation firm Exactis left around 340 million records exposed on its cloud servers. This was uncovered in a data breach last year.

    Mitigating factors

    The implementation of the General Data Practice Regulations (GDPR) makes this even trickier. It affects cloud security, and IT companies will likely struggle to comply with these new laws while protecting sensitive information.

    Cloud computing services are progressing exponentially, as are their new developments. The year 2019 will surely be filled with businesses pouring investment into enterprise solutions. This while expanding, securing, and implementing cloud technologies to their fullest extent.

    Bridget is a freelance writer and editor, and the founder of Lost Bridge Blog, where she writes about traveling as a Millennial woman on a budget. When not writing, you can find her traveling, drinking inhuman amounts of caffeine and scrolling through the latest tech & political news.
    N26 Bank
  • Smoother Online Shopping

    Smoother Online Shopping

    As a small online business, it makes sense to ensure that what you are selling is very easy to access. This is especially important when offering something that is common. The purchasing process should be practical and aesthetically pleasing to your clients.

    Your online shopping cart software creates that important connection between you and your customers. It must therefore help you achieve three goals:

    -Deliver the best and most secure experience for your users;


    -Make it simple and desirable for them to complete transactions;


    Minimize common ecommerce hurdles (such as shopping cart abandonment).

    Customers expect consistency, reliability, and speed. Most users are now accustomed to the speeds facilitated by broadband Wi-Fi and omnipresent LTE mobile networks.

    Research indicates that 78 percent of ecommerce consumers completed a purchase on their mobile device in 2016.

    This percentage has probably increased since then. Therefore, delivering experiences that embrace mobile best practices has to be one of your primary concerns as you choose a solution.

    Some other salient things a good online shopping cart solution should pay attention to:

    TRUSTis obviously a huge part of establishing a valuable relationship. Your shopping cart software is an extension of your brand, and your buyers must trust it with their personal and financial information.

    As buyers avoid using direct credit card purchases (due to increasing fraud and data breaches) in favour of more secure methods. Your company must be prepared to offer new payment options.

    Customers appreciate the SECURITY and ease of mobile wallet payments, such as Apple Pay and Google Pay. This is because they can complete purchases using a single-use virtual credit card number.

    Give them the ability to use these alternative payments and if possible, do not exclude Cryptocurrency!

    It would also need to link up to your MARKETING and customer service platforms to provide a holistic customer experience.

    Naturally, you also want a system that tracks product sales and customer activity with as much detail as possible, and that can also sort transaction data across a multitude of categories.

    So, where does one get such software?

    Read more about how to get a good shopping cart software here.

  • Open Banking – too exposed?

    Open Banking – too exposed?

    As a human race, we are constantly striving for easier ways of doing things: simpler, faster, and more practical. Thanks to better tech, you can now interact with people globally and instantly with the click of a few buttons.

    Likewise, you can also physically move quickly due to advances in transportation technology. When it comes to the age-old practice of banking – the same is now happening.

    Provided you have the necessities, a passport, residential address and a mobile phone, you can now open a bank account within minutes. This is brought about by a Fintech offering better known as Open Banking.

    Open banking uses APIs that enable third-party developers to build applications and services around the financial institution.

    Wikipedia

    It is ultimately about giving you a better, secure, and flawless service experience. This comes with the opportunity to gain access to excellent financial products.

    Online security expert and Chairwoman of Zortrex, Susan Brown reflects on the advent of the new offering:

    “Just over a year ago when Open Banking came into the limelight for the Fintech world. CMA9 were effectively mandated to make their banking platform accessible for third party companies.”

    A comprehensive global report commissioned by Accenture emphatically highlighted growth and talking points about the emerging industry in 2017.

    MS Office package

    This is all wonderful, innovative, and promotes transparency within the financial services market. There is only one drawback:

    “Consumers really do not know what Open Banking means, there has been a lot published about the benefits that are to be had from Open Banking. At the same time, consumers have become very aware of the negative aspects around sharing their data.”

    Scourge of hacks & breaches

    Daily, you hear more and more about hacks, and data compromises. With the UK’s Lloyds Bank breach last year; the trust by its consumers to share their financial and personal information, some would say, is completely gone.

    In addition, you go onto a site to review products and before you know it, you are bombarded with adverts on the products that you have been looking at elsewhere. This has led some consumers to abandon shopping carts and refrain from using online retailers.

    If not adequately protected, the newly established Fintech system might suffer a similar data breaches.

    Visa and Mastercard for one, are among the established firms threatened by Open (Mobile) Banking. And so, they should be according to Brown.

    “As consumers knowledge grows about their data and the security around their financial data has not been secure as shown with the Marriott hack.”

    Naturally, new systems pose a huge threat for banks. They become the digital gateway channel connection to the financial sector. This eliminates the direct relationship between consumers and banks.

    This is not a bad thing as banks are overwhelmed and cannot always keep in touch with everyone.

    An added layer of protection

    The solution for failing global acceptance would be for a new Fintech company to gain the trust of its new customers. They would naturally also be able to chip away at the market share of other expensive financial institutions.

    What you as a consumer know and want is privacy and security. Currently, only banks can make this happen – but at a high cost.

    With a new digital tokenisation system like Zortrex vault, you can concurrently let your consumers reap the awards on their transactions.

    They can as a result, gain redeemable tokens for patronising your services. This can occur while both you and your partners offer them products globally.

    “Don’t be a gateway for the challenger banks be in control of your omni channel for your consumers,” Brown advises

    Read more about Zortrex’s solution to privacy here.

    This contains excerpts from Susan Brown about Open Banking initially published on her LinkedIn page.  

     

     

     

  • Sell easily with the aid of smart tech

    Sell easily with the aid of smart tech

    Practical online software can – without a shadow of a doubt – help your business (large enterprise or Start-up) get on top of its operations.

    The most common operational tasks most of us use are sales and customer support. Though very important they cannot, however, be used in isolation to other business processes.

    There are also other ‘bits’ and ‘bobs’ that can be built-in or integrated to ensure that your business processes are fully automated. And automation saves you time and therefore, money!

    Core operations that a good ERP can manage for your business are not limited to the following:

    • Sales (the lifeblood of your business)
    • Customer Support (now extended to Customer Engagement)
    • Accounting and Finance (all your banking, invoicing, payments and taxation)
    • Supply chain and logistics management (Cataloguing, Inventory, stock management, warehousing, storage and deliveries)
    • Retail (B2B, eCommerce, Point of Sales)
    • Human Resources (Staffing, holiday bookings, Salaries and wages, recruitment).
    • Marketing (Branding, campaign management, targeted ads etc.)

    Can you imagine these have been in use since the industrial revolution and the introduction of chain stores? 

    Trading
    Trade with IQOption

    ERP is the abbreviation for Enterprise Resource Planning and is basically the software your business uses on PCs/cashier systems, scanners, and all points of sale devices.  

    One of a kind

    We identified and reviewed a specialized ERP called  SmartSaleERP. It is an integrated tech platform targeted for retail business owners to help you get in control of your business. 

    Granted, there are hundreds of ERP solutions out there including those from known brands such as Microsoft Dynamics, Salesforce, Zoho etc.

    A distinguishing feature on SmartSaleERP however, is the kind of technology they use over and above the traditional features and user interfaces (UI).

    This ‘edge’ comes from the use of biometric and smartcard tech to provide you with a better customer/user experience.  The sales experience can be derived from both the customer and the business side.

    Read the full feature to find out more about this distinct ERP here.

  • Get a vault for your data!

    Get a vault for your data!

    It’s not often that we readily endorse a product or company. However, when the nature of work they engage in is considered ground-breaking and has a positive impact on our lives – it most certainly warrants a mention.

    The rationale for considering such tech-driven projects as highly significant is neither due to ‘gut feeling’. Nor that it is simply because it is fascinating and therefore must be an excellent product. This project actually has a value proposition for you!

    We are indeed well into the information age and while we have written extensively about data, its importance to marketers, and its fragility when used and abused by unscrupulous third-parties for their financial gain.

    The issue of data security is, however, quite a serious one. You just need to pay attention to the news to become even more aware.

    Data breach incidents

    In Europe, where security is supposedly more advanced, we have seen the likes of renowned airline British Airways, being hacked. Several hundreds of thousands of customers’ personal data compromised.

    These were followed by hacks on other major airlines such as Cathay Pacific.  Aside from airlines, other business outfits have suffered a similar fate.

    The perpetrators are getting a lot more brazen and very recently, a cable car, used as public transport in Moscow was hacked. This left vulnerable passengers terrified and stuck high up in the air. And all this happened probably to the amusement of the pranksters (hackers).  

    Can you imagine the chaos and commotion that would be caused if their control systems of driverless cars were to be hacked? 

    The digital intrusion gets even more sophisticated...

    This time affecting the very wealthy:  private yachts are now being hacked and taken into the pirate waters, all via uniquely coded signals, reading data from their antennas!

    Data security 

    On the issue of data security, you often hear about extra protection but not just anti-virus and anti-phishing software. The more secure and heavily encrypted Blockchain technology is, however, making waves in the digital sphere.

    It is mainly for the escalation of its once shining star by-product designed for discreet transacting – Bitcoin.

    Blockchain technology has also triggered several other technologies based on its digital cryptology technology. The aim is to ensure that your information is kept safe from prying eyes while stored, used, or transferred online.

    Blockchain products such as cryptocurrencies, however, are not completely safe from hackers.

    A solution

    Zortrex400x400

    The company we chose to highlight uses a unique vault system and is called Zortrex. It has adopted one of such Blockchain technologies dubbed tokenization. It will be using it to ensure that your highly sensitive data online is kept safe.

    “Our tokenised solution would have protected their customers’ personal identification information (PII) details. Instead the hackers ran off with the date of birth; passport numbers; financial data etc,” says Susan Brown, Chairperson of Zortrex – relating to the British Airways incident.

    Tokenization is the process of converting rights to real-world assets into a digital token on a blockchain.

    Brown’s background in data privacy systems as well as her devoted passion for the protection of PII, financial and healthcare data led her to start up and chair Zortrex. 

    The law on data

    Thanks to new laws like the European GDPR law, which enforces the protection of data, breaches are now met with hefty financial penalties.

    “Companies have disrespected your data for over 25 years, and if left unattended, there will be nothing left to protect,” Browns says.

    Companies now have to think twice about getting your consent and how to use and share your data digitally. But is it enough? The simple answer is no.  

    The authorities just do not have the resources to investigate every complaint nor to actively enforce all data breaches.

    We have ingeniously invented systems that automatically align with financial messaging, payments and securing information. All of which require data. 

    “However, we need to go a step further to secure all the PII details with tokenization. This is so that in the event of a hack, the cookies and trackers will only be following a ‘useless’ token will be no real identification on it,” Brown explains.

    Zortrex would naturally like to tokenize all healthcare data. This way, vulnerable those of you living outside of major cities can also feel assured that your privacy is protected.

    Using Blockchain

    The application of the all-powerful blockchain is not limited to use in the financial sector and will be applied via the supply chain to all industries that deal with your data – especially the most sensitive ones.

    A business angel or any investor for that matter looking to get onto the next best thing since Amazon would therefore be unwise to pass up the opportunity to back the Zortrex venture given its scope.

    Furthermore, regulations are currently being implemented primarily in the pharmaceutical sector.

    A tokenized supply chain such as what Zortrex offers would be ideal for this new law which is planned to be implemented by 2023.  A judiciary blockchain, for instance, would allow the police to “talk” to the prison service. They,  in turn, will communicate with the legal sector or public health institutions (NHS).

    Forensic evidence would in such instances be tokenized and kept secure (away from tampering) during legal hearings.  In another practical scenario, Smart Contracts (which could replace some lawyers) can spark off legal aid assistance to you.

    Your court cases will be heard quicker and be more efficient.  Protection registers can also be guarded using tokenization – rendering them more secure.

    Blockchain technology offers quality assurance making sure that no shortcuts are taken.

    This will enable the monitoring and tracking if any of your data is shared with third parties once tokenized. The third-party apps would only gain access to your data once the trigger has been activated.

    Like other pioneers and visionaries, Brown’s futuristic hope that every child being born will have their name, date of birth, blood type data being tokenized, might seem far-fetched.

    Zortrex wants to use its technology to put the hackers out of business! 

    Tokenisation cannot be mathematically reversed and thus it will least it will keep the hackers busy for a while.

    Scalability

    For such high ambitions, the creators of Zortrex’s software have adequately ensured that the technology used is fully scalable. One stumbling block many Blockchain projects now face is what is referred to as scalability. This is the ability of a network or software to grow and manage increased usage.

    This image has an empty alt attribute; its file name is 250x250.gif

    Cryptocurrencies like Bitcoin and Ethereum specifically – which is used to build a lot of Distributed Applications, however, have massive scalability issues.

    The growth in demand for DApps is also crippling (slowing down) those systems. They need to investigate the incorporation of alternative technologies, upgrade or split their platforms to cope with such high demand.

    Someone must take the first step in securing this data forever. You should be able to purchase what you want without being harassed by trackers and cookies.

    The need for tokenization is endless and further, down the line, celebrities and government official’s PII can be secured by it to protect them from damaging schemes, ‘bad press’, and scandals.

    In a previous blog, we “prophesized” that data is the new commodity – like gold or oil. However, the actual value with that data will lie in its privacy, the ability to store it securely and unlock it only with legal permission by its rightful owner.

  • Gear up for Online Trading

    Gear up for Online Trading

    We end the year once more with trading: a topic that might not be directly tech-related. It, however, relies heavily on online technology to help with investments and therefore, is noteworthy.

    More and more millennials are getting into the habit of adopting get-rich schemes. You just have to look on Instagram and Twitter to see how gullible some of them are to Ponzi-like schemes preying on online and financial naivety.

    It has become so cumbersome as most of the predators ‘befriend’ you only to present you with the offer to trade (Forex, Binary options, or mine Crypto) on your behalf. Some blatantly just ask for you to deposit cash (usual increments of $500) into unknown accounts!

    Nothing to perform due diligence is available and not even a website sometimes – just the promise of profits of up to 30-80% weekly, monthly, or whatever – it’s all clickbait!


    A notable 60 percent of high net worth individuals (HNWIs) in Latin America alone showed high-interest levels in Crypto investments in 2018.

    Capgemini’s World Wealth Report 2018.

    You can, however, as we mentioned around this time last year, take full control of your financial destiny.

    When it comes to managing an online portfolio via a broker such IQOption, there are a few things you have to consider first before dropping cash into your trading account.

    Checklist

    Research

    • Equities (Shares or stocks, ETFs, Commodities, Indices, Options, Forex, Futures, and Cryptocurrency). These are all vehicles you can engage with concurrently in the same portfolio. They all also have their (moderate to extremely high) levels of risk. Learn how each of them worksShares are actually the less risky of the batch nowadays.
    • Have a plan! One does not just opt to invest in equities to “make money”. Of course, you will make (or lose) money. The question is how much and within what timeframe? When are you looking to have the money back? These questions will help determine what kind of investor you are or the approach to adopt when investing.
    • Based on your knowledge, appetite for risk, and the associated costs, you will either be a long, mid (mixed), or short-term investor. The latter is referred more commonly to as day-trading. Long term trading works pretty much like savings. You buy the stock/share and hold it for a long period of time (shares/stocks and indices are the best vehicles for such). All the others can be bought and sold by the minute, hour, day, or weekly.

    Setting up

    Setting up with your bank means there is also less admin when it comes to verifying your personal details such as ID, physical address, and so on.

    Be sure to have all documents ready and up to date. These are mandatory and required by local financial authorities to help prevent or determine fraud, the use of securities to launder money, or fund terrorism.

    The bank trading brokerage fee can be waivered by going for an online broker independently if you have all your ducks (paperwork) in a row.

    Costs

    Once set up, there are further internal costs that the broker will charge you. Pay attention to the commission charged when you purchase security of choice. Some waiver it but then charge what is called a spread. Then there are other deductions such as a charge for borrowing money to trade – what is termed ‘overnight fees‘.

    And of course – pay attention to TAX!

    • Pay attention to all the associated costs. It costs nothing to setup an online trading account via a broker. Your bank may charge a brokerage fee for running a separate trading account. The advantage of that mainly is just the ease of adding and withdrawing your ‘winnings’.

    We strongly recommend actively running a trial for at least 2 months before making your first deposit to start purchasing securities.

    Some strategies

    Before that first purchase, you should hopefully, by then, have used the trial period to learn some of the tools. Trading (or investing) is not something you do out of a gut feeling. There is about 3% ‘gut feel’ but the rest of the knowledge comes from studying the tools for technical and fundamental analysis.

    TradingTools
    Courtesy of cryptoworld.info

    The difference between technical and fundamental analysis is the difference between trading and investing – without any, you are outright just gambling!

    There are also some ways to mitigate your risk and minimize losses. One system that applies to all investing is called Dollar-Cost-Averaging. So, under this strategy, you divide the total amount into bits to ensure that on average your losses are smoothed out by profits. The diagram to the left illustrates this.

    Budget within your portfolio

    Always start small and see how that goes before diving fully in. People get greedy and think if $10 fetches a $5 profit then $10 000 would subsequently garner $5000 or at least $500. It doesn’t always pan out that way. If it was that easy we would all be millionaires!

    One must also quickly avoid the habit of topping up the account to get the next hot stock because like a business, your trading portfolio is an investment for future growth. It must therefore, be nurtured that way.

    Ride the waves (with your initial investment) and reinvest your winnings by ploughing back some of the profits into less riskier securities once you make a small ‘killing’.

    Switch from a short to medium term trading approach to secure your profits. Many day traders end up losing all their gains because they stay in the game for too long. The stock market always turns eventually and gets its pound of flesh!

    As a rule of thumb, purchase only after a massive drop in price – as you would in a fashion sale. When a security’s price has risen to abnormally high levels, its ‘bubble’ tends to ‘burst’. In addition, there are tools to measure whether a stock/share or any security for that matter is overvalued. Study them!

    Market trends

    The markets are constantly in motion and like a rollercoaster, prices are constantly going up and down. You have to choose where (and when) to place your buys (and positions) to make your profits.

    TradingTimes

    Know the market (opening and closing) times so you do not miss a good deal. Many markets will either open with a big rally; cool off in the afternoon and then close with a sell-off (in the red) in the evenings in general.

    What causes the up and downs is the buying and selling off respectively.

    Based on that, and with the common knowledge that everyone sells at a high profit – what do you then think would happen after a massive rise in the price of a security? It is not rocket-science yet many people fall for it and end up buying at the height (peak) price of an equity.

    Easier said than done. Naturally, it is hard to predict where this peak is as many inexperienced profit hunters have found out the hard way.

    Markets tend to crash in predictable cycles. The Crypto market fell by a whopping 70% in 2018 – a monumental drop in market capitalization after its equally amazing 2-month bull run. Many individuals and companies who bought Cryptos in January 2018 as a result went down in flames because of such bad timing – and just plain greed.

    These are just some of the basics to help you get into an investing state of mind – more particularly with online trading. You will find a few more useful pieces of information on the resources page.

    Happy trading and remember to start of with a free trial!

    General Risk Warning: The financial products offered by the company carry a high level of risk and can result in the loss of all your funds. You should never invest money that you cannot afford to lose.
Translate »

This website uses cookies. By continuing to use this site, you accept our use of cookies.