Tag: data privacy

  • The Future Office Worker

    The Future Office Worker

    Aside from essential services personnel, millions of people are now working from home. The Covid-19 pandemic has prompted the growth of products to help the home office worker of today and tomorrow.

    Debunqed breaks down which cloud solutions to pay attention to and which to avoid while you adjust to a changing world of commerce.

    During the pandemic, one video conferencing service has exploded in popularity after years of trying on the wayside. This is the service operated by the NASDAQ-listed American group, Zoom.

    Zoom has become a service of choice especially for companies and staff which may have not used online conferencing before. This popularity has made the service a target and there are concerns around security and privacy issues.

    Before Zoom’s burst in interest, the most popular applications include Google’s Gsuite which offers online conferencing solution Meet, Microsoft 365 which includes competing conferencing solution Teams, and Slack.

    Slack which was formed in 2013 also offers chat services that multiple people can use at once in private groups and persistent chat rooms or channels, which are organized by topic as well as direct messaging.

    Zoom being hacked during quarantine might have made news headlines but it’s not the first time that technology services like these have been infiltrated by the wrong people.

    .

    web scanner

    Slack was hacked back in 2015. The data included email addresses, usernames, hashed passwords, and in some cases, phone numbers, and Skype IDs users had associated with their accounts. As a result, Slack added two-factor authentication to protect data in the future.

    Gsuite is the ‘OG’ of cloud-based business

    How does Gsuite work? G Suite which was founded in 2006 and was formerly known as Google Apps for Work is a suite of web applications created by Google for businesses. It’s still a decent offering 14 years later. A basic G Suite account gives you access to Gmail and 30GB of Google Drive storage per user.

    There are obviously Enterprise-level packages with beefed up security to match that offered by highly secured ‘on-premise‘ setups.

    The suite’s Meet service is a video conferencing app. It is the business-oriented version of Google’s Hangouts platform and is suitable for businesses of all sizes. The solution enables users to make video calls with up to 30 users per high-definition video meeting.

    Compared to other software, and due to familiarity and affiliation to Android Smartphones, G Suite is quick and easy to set up and use from the time you subscribe to it. It literally takes up to 15mins to start receiving emails and make video-calls!

    Still in the game

    Microsoft offers 365 which includes Teams. Teams is quickly becoming Zoom’s big competition. Several companies are using Teams for internal meetings and Zoom for external meetings. Microsoft gains its competitive edge from is strong data protection, GDPR, and comprehensive security measures. But others are slowly and sometimes painfully also having to jack theirs up.

    The crucial factor to Teams is that it is part of the Office 365 ecosystem. In this way, it can collaborate with different services offered by Office 365. Users gain access to several functions separated into four categories:

    MS Proplus

    Firstly, they have access to the main Teams application which lets them find and create channels to hold “on-the-spot meetings, have conversations and share files”. Secondly, they have access to a function called Meetings. You can plan, schedule, and track meetings.  This calendar syncs with Outlook, as an example of the deep Office 365 integration.

    Thirdly users have access to calls which includes VoIP calling as well as fourth, they have access to the Activity application. This application lets one access @mentions, unread messages, and replies.

    Other secure apps

    Then we have Signal, a very new addition to the saturated video calling and voice messaging application world. The non-profit organization, the Signal Foundation launched a stable version of Signal last month.

    Signal is a cross-platform encrypted messaging service. It’s an impressive entrant and it’s opensource too.

    It uses the Internet to send one-to-one and group messages. These may include text and audio files, voice notes, images and videos.

    It is also available through a mobile application that can also make one-to-one voice and video calls. We expect the Android version to become well-loved soon. It can operate as a replacement for the SMS app.

    Signal’s emphasis on messages being protected and voice and video calls being stable because of the push by hackers to infiltrate the plethora of online messaging and video applications coming online over the past few months since Covid-19 broke out.

    This will become more and more important in 2020 and beyond as working from home becomes more common.

    The German government has encouraged people to work from home offices beyond the Covid-19 pandemic. This call is gaining impetus after the country saw a rise in Covid-19 infections after it started to ease it is locked in marked ways.

    With so much choice around cloud-based solutions, it’s best to try a few for yourself and see what works for you. But don’t waste too much time. Many of them are free and you’d really want to just get on with whatever your business is.

    A key is to use strong passwords which you change regularly as well as other measures to protect yourself from hackers.

    Read more about how to make your online accounts safer.

    Find out more about online office collaboration tools on our resources page

  • Banking on Crypto

    Banking on Crypto

    The world is slowly realizing that it needs to rely less on old systems in order to manage its way out of financial crises. One of the oldest systems which saw the US dollar as the vehicular currency of the world may be slowly coming to an end.

    Enter the Bitcoin: the brainchild of cryptocurrency, a means of exchange that is less regulated and which is built on the Blockchain, a technology that is supposedly difficult to hack into.

    A quick recap for those of you not familiar with the tech: A Bitcoin is a computer file that can be stored in a ‘digital wallet’ app on your smartphone or computer. With this technology, every single transaction you make is recorded in a public list or publicly distributed ledger.

    This makes it easier for authorities to track and record your transactions but not you personally. We will not, however, get into the potential abuse of such anonymity in this article.

    Adoption

    We have been very slow to adopt new financial technologies for two reasons. First, there are many regulations that help maintain the US dollar as the vehicular currency, used by central banks and other financial institutions to secure assets. Second, many developers of the technology are hesitant to throw it upon us – yet.

    But this will change as the robustness and reliability of cryptocurrencies is proved study by study and case by case. One method is by using cryptology.

    Cryptology is used to protect your information from hackers. In fact, the protection of your data is more important than ever before. We have made our lives more public thanks to social media.

    While you may not mind so much if hackers get unauthorized access to your pictures and social media profiles, some information is actually valuable. This includes your banking details, birth certificate, licenses, and intellectual property.

    The Covid-19 pandemic has forced us all to work from home. Those employees of numerous companies are accessing commercial information using personal computers instead of office computers. But personal computers might lack anti-virus software, firewalls, and other security measures.

    Right now, cybercrime is costing companies at least $45bn a year worldwide.

    This is why now is cryptology’s time to shine. It will also be used to protect your online purchases made using cryptocurrencies instead of traditional money. It will help ensure that funds go from your bank account to a retailer’s quickly but securely.

    Using Crypto for daily activities

    Digital Cash

    Let’s face it, we are going to use Blockchain for shopping: Lamborghini already accepts purchases in Bitcoin. The concept might still be difficult for you to grasp, but they are still being developed and soon it will be near impossible to live without them.

    Read more about Distributed Applications ‘DApps’ here

    Gaming companies are already embracing cryptocurrencies. Fortnite, a popular online game, with more than 250-million players, allows you to buy in-game products using cryptocurrencies.

    Beyond regular shopping, you could soon buy a house using a cryptocurrency. Blockchain technology and the underlying distributed ledger technology is being used to increase transparency in real estate transactions using smart contracts.

    To reiterate the use case for Crypto, many countries like Germany are relaxing laws and giving licenses to allow ‘Crypto Banks’ to operate. This is one effort to ensure that your Cryptos are properly taxed when used for investment purposes.

    One such bank, Bitwala, allows you to purchase Bitcoins or Etheruem securely and quickly from a charges-free bank account which they provide.

    Your transactions are then documented so that you can seamlessly submit reports of the purchases to the local tax authorities (Finazamt) to avoid penalties. You can do this all directly from the Bitwala App.

    The blockchain and cryptocurrency are even being explored on national levels: China is allegedly creating its own national digital currency.

    The way forward

    Monetary systems will continue to be tested every day. Banks the world over are spending big bucks to protect themselves from hacks. But one day, a hacker could throw them into turmoil.

    When that happens, you might be unable to withdraw your money. A central bank’s database could be hacked making it difficult for it to work with other banks. In the meantime, alternatives to classic monetary systems need to be developed.

    Cryptocurrencies backed by cryptology could be a very strong alternative. There are also some valid cases for using Bitcoin as a global currency. This, however, will only become a reality if it shakes off its high trading volatility to become more stable.

    We live in a world where we need to be cognisant of our health and how viruses can spread easily and quickly like wildfire. It equally is imperative to realize that cyber attackers could get and infect our data just as swiftly. Using modern technologies can help prevent these intruders from creating a ‘digital security collapse’ pandemic.

  • 2019 in Tech

    2019 in Tech

    This year may have felt like it was dominated by political shenanigans, but technology also had its wild ride.

    The USA vs Huawei

    A story that has persisted throughout the year is the heat around Huawei in the US. The Americans have stopped Huawei phones from being sold in their country because they say the Chinese mobile phone maker has stolen technology from American companies and has spied on them.

    The tussle began in 2018 but kicked into gear in 2019. Nevertheless, some American companies and organisations are still doing business with Huawei despite the ban by US President Trump’s government.

    The President of Microsoft, Brad Smith, also wants to the US government to offer more evidence to back up its Huawei ban. 

    The core issue with Huawei has been around concerns with Huawei’s close relationship with the Chinese government and fears that its equipment could be used to spy on other countries and companies.

    Huawei has also hit back at US ‘bandwagon followers’ and recently threatened to boycott Germany’s Auto industry if the European powerhouse banned them from offering 5G (broadband) in the country.

    Not a great year for big tech

    Big technological companies like Facebook, Alphabet, Google and Uber have faced a barrage of probes in 2019 be it around anti-competitive behaviour, spying on customers or their staff abusing customers. We also haven’t seen many new companies graduate to super-size status.

    After a long drought of big-name tech IPO (initial public offerings), 2019 promised to be a banner year. A crop of highly anticipated, highly valued tech companies — with hot marquee names such as Lyft, Uber, Pinterest, and Slack listed on the public markets. The idea was to allow you to take a stake in their business.

    Their reception, however, was truly tough. These companies’ stocks have not gained momentum and being listed has attracted greater public scrutiny.

    The biggest disappointment, however, must be WeWork’s failed proposed listing and its subsequent business fallout.

    The hottest things in tech

    Artificial Intelligence (AI) – We’ve been talking about this for decades since Terminator came out but scientists are managing to harness the technology especially in manufacturing and medical fields.

    Most of the top tech companies (Microsoft, IBM, Amazon, and Google) have already embraced AI. Many tout it as one of the main distinguishing features to set them apart competitively.

    A little of this tech has gone into robotics with much fanfare and fear over their capabilities and propensity to ‘initiate a judgement day’. Check out Boston Dynamics

    Bitcoin
    Bitcoin

    Blockchain – Bitcoin may be highly volatile and not the get rich quick scheme people thought it could be, but it is still out there. Clever people are finding ways of making commerce more efficient.

    There are however several practical and use-cases for Blockchain-based tokens and tech other than for payments and investments.

    Robotic Process Automation (RPA) – this is a technology that could explode in 2020. Right now, only large enterprises are using RPA but it could become more affordable and workable for smaller businesses in 2020. RPA is the process of automating mundane tasks such as taking data from one file and entering it into a business application like CRM software.

    It’s about computerizing repetitive tasks that are an inefficient use of time, so it makes our lives more efficient. 

    RPA is not a physical robot. It is also an approach to working across multiple business applications and entering, maintaining, migrating, integrating, mining and testing data on spreadsheets.

    These tasks are prone to human error which is why computerizing them makes so much sense.

    amazon web servies edge computing ad

     Virtual Reality and Augmented Reality – VR made strong progress in 2019. This was most useful in gaming, real estate companies, pornographic entertainment and for people with disabilities.

    For you gamers – it is best to buy an Oculus Quest for your PC. Sony’s VR headset is still the best and only gaming set.

    Look after my data – or not!

    The first fines around the General Data Protection Regulation (GDPR) were lodged in parts of the EU. The GDPR was promulgated in 2016. It is a regulation in EU law on data protection and privacy for all individual citizens of the EU and the European Economic Area.

    It also addresses the transfer of personal data outside the EU and EEA areas. GDPR was enforced because of concerns about data breaches and attacks on privacy by the likes of Facebook and Google.

    Then there were concerns our banks, insurance, and other data keepers were selling or losing our data to dangerous entities.

    The types of personal data exposed included your names, addresses, phone numbers, email addresses, and even passport numbers.

    Lessons learned

    The Marriott hotel group’s data breach of 2018 resulted in the exposure of 339-million customer records. Around 30-million of the records belonged to European Union citizens, and therefore they were subjected to a GDPR fine.

    Facebook seems to love controversy and had been found to have allowed a massive 247 million user (mostly Americans) data leak.

    Back home in Berlin, on October 30th the Berlin Commissioner for Data Protection and Freedom of Information issued a €14.5m fine on a German real estate group, die Deutsche Wohnen SE. This was the highest German GDPR fine yet. The infraction related to the over retention of personal data.

    Despite the turbulent year for tech companies and consumers, we look to 2020 with breathless anticipation. We also ponder on which of the mentioned technologies will stick out and make a positive impact on our lives.

    Pictures courtesy of Pixabay

  • Ethical hacking

    Ethical hacking

    Maybe you should encourage your kids to become hackers. When you open Twitter handles and Linkedin profiles, it’s not unlikely that you’ll find people listing hacking as a skill.

    Parents used to tell their kids to become doctors, lawyers, and accountants. Later, they advised them to learn about computers. These kids have now grown to become hardware specialists and then software specialists today.

    In the past 10 to twelve years, we have seen ourselves thrown into the fourth industrial revolution. In it, technology affects our lives through social media and augmented reality.

    We share a lot of our personal information with more people, companies, and institutions every day, willingly and are often blasé about it. This has tempted people to steal this information by hacking it. 

    Hacking background

    Since the advent of personal computers in the 1980s hackers have become prolific, initially in ‘first-world’ countries that had an advanced infrastructure. There were numerous cases in the US but as computer technology permeated the world, hackers followed suit. 

    A hacking group called MOD, Masters of Deception, in the 1980s allegedly stole passwords and technical data from Nynex, and other telephone companies as well as several big credit agencies and two major universities.

    The damage caused was extensive and one company, Southwestern Bell said it suffered losses of $370,000 alone. These days the damages, though not always publically announced, can run into a few millions of dollars.

    READ MORE about the Online Threats hackers use here

    All this has paved the way for a special information technology (IT) vocation. A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system and networks. They break into systems they aren’t authorized to, and tend to break seamlessly into email and banking systems.

    Advertisment

    Hacking as a career

    Ben Wilson works as an ethical hacker. He has more than ten years of experience and worked in London where he received on-the-job training. He now works remotely in South Africa servicing UK clients.

    “I test websites for clients and look for vulnerabilities in the systems. I have done a lot of work for banks lately but my work is across industries.” 

    “Energy companies are using my services more and more,” he says.

    Wilson says he worked in a permanent position for six years. Right now he contracts for five clients regularly.

    Ethical hackers are the knights who test how permeable these systems are.

     

    “The majority of my work is for British clients. The UK pound is strong and I like to earn pounds. I’d say the best computer security consultants in the world are in the UK. The US is strong too but the UK consultants are sophisticated and the best.”

    Vulnerabilities

    The most common way in which people hack information is through email contacts; especially personal Gmail accounts.

    People think that their information is safe because it sits with one of the largest companies in the world. But this is exactly why it isn’t safe.

    Gmail and other third-party free email accounts are regularly hacked. If you want to protect especially valuable information you should either upgrade it to the business/enterprise level, use a different email service, or perhaps the one connected to your employer. 

    Nowadays companies use services to protect themselves against hacks and unauthorized access. These monthly or annual service providers might employ ethical hackers to check the companies’ systems.

    Hacking, however, isn’t just something that happens to big companies or in blockbuster movies. Here are some reality checks:

    • All websites are under threat;
    • So are applications (Apps) on your phone;
    • People can also program artificial intelligence (AI) to hack into systems. This has become a big concern and theme for security experts.

    Ways to proactively prevent a hack 

    Fortunately, there are several ways of protecting yourself and your information from hacking; starting with your emails. Be wary of “phishing” emails asking you to update your information, especially for bogus databases that you have never heard of.

    Use a spam filter – Avoid opening attachments from senders you don’t know – Update your passwords regularly – It helps to have authentication methods, such as a smartphone-linked and email-linked authentication (2FA) or security keys like Yubico – Do not click on any ad – period! Back up your files regularly – it’s always a good idea – Don’t allow ransomware bullies to bully you.

    • If you get sent communication saying that people have your files and want money or they’ll release the files; ignore them.
    • They can’t threaten you forever and might eventually move onto another target especially if your information loses its value over time.

    Anti-hacking software

    As a business, use tools like those from cybersecurity experts Acunetix. More than 4 000 companies protect their web applications from vulnerabilities using its powerful web scanner.

    Its penetration testing software prevents potential attacks by identifying holes in your websites’ coding. This is where hackers usually plant their complex code which allows them to extract data such as contact details, credit card details, and in worse cases, company-sensitive data like patents and blueprints.

    Naturally, it also scans networks to find gateway loopholes that could lead to crashes and downtime-related losses. A bank’s website going down for a few hours can cost it several thousand or even millions in lost revenue.

    Despite having firewalls, VPNs, and other Internet security systems in place, your websites and apps being developed are still vulnerable to cyber-attacks or a hack.

    The most commonly known hack used is a DDoS attack. Basically, it works like a traffic jam clogging up a highway, preventing regular traffic from arriving at its desired destination. Incidentally, only a few days ago, Amazon was hit by a DDoS Attack.

    So, how would you know or find out if you are vulnerable?  By conducting regular scans on your websites and apps to see where vulnerabilities lie.

    Avoiding a hack requires common sense

    Be aware and don’t fall into scams. It’s unlikely you’ve won 120-million Euros in a lottery. You should know by now that you are not the descendant of a king!

    In addition, if someone says they have a sex tape with you in it and they want your salary, unless you know you made a sex tape, they’re probably lying.

    Unless of course, a scorned lover of yours tricked you – but you can’t blame technology or a hacker for that.

     

  • The Online Threats of 2019

    The Online Threats of 2019

    How you can stop them from happening.

    Like a biological virus mutates – as technology advances so do the complexity of phishing and identity theft schemes. With major services adopting cloud technologies and storing private data online, anyone is vulnerable to hacking.

    To make matters worse, hackers continue to come up with some pretty creative ways to profit from stolen information.

    Without wasting time, these are the things you should already be doing to avoid being exposed to hackers in the first place:

    In order to keep these cyber-criminals out of your lives and computers, let’s take a look at some of the actual schemes to watch out for in 2019.

    Hacking

    We all know what hacking is by now – the term has almost become synonymous with internet security. So a question is: do you love watching movies on Netflix or jamming out to your summer playlist on Spotify? If the answer is yes, then you’re at a pretty high risk of getting hacked.

    DynaRisk, a UK cybersecurity firm, recently found that cybercriminals most commonly target these brands, along with adult-oriented sites (you know what we mean) and then, online gaming services.

    Identity Theft

    A few weeks ago, authorities caught a New York-based gang who had used identity theft to steal over $19 million worth of iPhones. Quartz reported that this operation ran for seven years.

    So-called “Top Dogs,” the ring leaders, would organize lower level members of their organization to steal identities and create clone credit and identity cards. Then, affiliates fanned across the nation, signing up for mobile phone plans to acquire iPhones, which were later sold for a profit by the Top Dogs.

    Because phone payment plans take the shape of nominal fees over the course of several years, victims often wouldn’t notice the fraud until it was too late. Learn how another scheme dubbed sim port attack works in the diagram below:

    Ransomware

    Hacking can happen to anyone – including our favorite bands. In early June, a hacker managed to steal the minidisk archive of Thom Yorke, the lead singer of Radiohead. This included previously unreleased demos and audio material from around the time of “OK Computer,” the band’s 1997 worldwide hit album. The hacker then demanded $150,000 on the threat of releasing it.

    Holding files for ransom is so common nowadays that it even has its own name: “Ransomware.” Either pay over the ransom or lose your files—or, even worse, have them released onto the unforgiving Internet.

    In response, Radiohead released all 18 hours of material on Bandcamp themselves, winning against these ransom hackers.

    Most security experts recommend the same route as Radiohead—never pay the ransom, because there’s no guarantee you’ll recover files or prevent their release.

    Sextortion

    If you think ransomware is bad, there’s an entire subgroup of it aimed to profit off sexual shame. Cheekily named “Sextortion,” some hackers creatively upgraded the classic email phishing scam to scare victims into handing over Bitcoin.

    According to Fortune, hackers have already racked up over $900,000 with sextortion. In these phishing emails, the sender claims to have spied on you while you watched porn—and has webcam footage of the salacious deeds. The message then demands a Bitcoin ransom, or else face the social and professional consequences of this lewd video getting sent to all your contacts.

    To make the threat even more believable, the sender references a previous password tied to the user’s email account. According to Krebson Security, a sextortion phishing message might look a little like what’s written in the sidebox.

    In rare cases, the threats are real—and hackers get their hands on some sexually explicit photos. Recently, American actress Bella Thorne fell victim to sextortion. Last Saturday, she took a similar, albeit more risqué, route as Radiohead, opting to release her nude photographs on Twitter in order to take the power away from her hacker.

    Last thoughts

    So, what’s the best way to avoid your personal, or, business from costing thousands in virtual currency? Since most of these emails are fake, you can just avoid them with a spam filter. And you should probably buy a webcam cover…just to be safe. When it comes to general browsing- we suggest using a VPN.

    Read more about VPNs here

    There are now more secure anti-hacking tools that use the Blockchain and offer great protection, especially against identity theft. Have a look at our feature on Tokenisation.

    Most online services now like mobile banks, offer App-based 2-factor authentication. This should now be regarded as the minimum security for ANY online account or App.

    To avoid hacking or phishing scams in general, optimizing your cybersecurity and using online common sense will save you loads of time, trouble and money.

    Cybersecurity by Acunetix
  • Open Banking – too exposed?

    Open Banking – too exposed?

    As a human race, we are constantly striving for easier ways of doing things: simpler, faster, and more practical. Thanks to better tech, you can now interact with people globally and instantly with the click of a few buttons.

    Likewise, you can also physically move quickly due to advances in transportation technology. When it comes to the age-old practice of banking – the same is now happening.

    Provided you have the necessities, a passport, residential address and a mobile phone, you can now open a bank account within minutes. This is brought about by a Fintech offering better known as Open Banking.

    Open banking uses APIs that enable third-party developers to build applications and services around the financial institution.

    Wikipedia

    It is ultimately about giving you a better, secure, and flawless service experience. This comes with the opportunity to gain access to excellent financial products.

    Online security expert and Chairwoman of Zortrex, Susan Brown reflects on the advent of the new offering:

    “Just over a year ago when Open Banking came into the limelight for the Fintech world. CMA9 were effectively mandated to make their banking platform accessible for third party companies.”

    A comprehensive global report commissioned by Accenture emphatically highlighted growth and talking points about the emerging industry in 2017.

    MS Office package

    This is all wonderful, innovative, and promotes transparency within the financial services market. There is only one drawback:

    “Consumers really do not know what Open Banking means, there has been a lot published about the benefits that are to be had from Open Banking. At the same time, consumers have become very aware of the negative aspects around sharing their data.”

    Scourge of hacks & breaches

    Daily, you hear more and more about hacks, and data compromises. With the UK’s Lloyds Bank breach last year; the trust by its consumers to share their financial and personal information, some would say, is completely gone.

    In addition, you go onto a site to review products and before you know it, you are bombarded with adverts on the products that you have been looking at elsewhere. This has led some consumers to abandon shopping carts and refrain from using online retailers.

    If not adequately protected, the newly established Fintech system might suffer a similar data breaches.

    Visa and Mastercard for one, are among the established firms threatened by Open (Mobile) Banking. And so, they should be according to Brown.

    “As consumers knowledge grows about their data and the security around their financial data has not been secure as shown with the Marriott hack.”

    Naturally, new systems pose a huge threat for banks. They become the digital gateway channel connection to the financial sector. This eliminates the direct relationship between consumers and banks.

    This is not a bad thing as banks are overwhelmed and cannot always keep in touch with everyone.

    An added layer of protection

    The solution for failing global acceptance would be for a new Fintech company to gain the trust of its new customers. They would naturally also be able to chip away at the market share of other expensive financial institutions.

    What you as a consumer know and want is privacy and security. Currently, only banks can make this happen – but at a high cost.

    With a new digital tokenisation system like Zortrex vault, you can concurrently let your consumers reap the awards on their transactions.

    They can as a result, gain redeemable tokens for patronising your services. This can occur while both you and your partners offer them products globally.

    “Don’t be a gateway for the challenger banks be in control of your omni channel for your consumers,” Brown advises

    Read more about Zortrex’s solution to privacy here.

    This contains excerpts from Susan Brown about Open Banking initially published on her LinkedIn page.  

     

     

     

  • Anonymous Surfing

    Anonymous Surfing

    You don’t have to be an online arsonist, hacker, or international cyber-terrorist to hide your online identity. Likewise, concealing your PC’s web address or your Internet Protocol address (IP address), making it unknown to the public, does not necessarily mean you are up to no good online.


    We will, therefore,  build a case for why it is important at times to conceal your private online location using VPNs (Virtual Private Networks).


    A VPN is a connection method used to add security and privacy to your private and public networks. This includes your Wi-fi Hotspots and access to the Internet. They are most often used by corporations to protect sensitive data but now also by people like yourselves for the same purpose.

    VPN-Protect-you

    Click on the image to view a quick video


    Let’s get back to the importance of your IP address. It is probably something you rarely think about but is crucial to your online lifestyle even as an individual. How so? You might still ask.


    Well, without an IP address, you wouldn’t be able to get the current weather, check the latest news, or view videos (streaming) online for instance.

    The uses of VPNs

    Your IP is also used to access every online service you partake in including very private things like your internet/mobile banking or online trading activity.  Think of it as your physical address and how important it is when getting things delivered by post or using it when you need to make applications for loans, jobs, etc.

    “Without a public IP address, online service providers like Netflix, BBC, or Amazon wouldn’t know where to send the information you asked for. They wouldn’t be able to get it to your computer.”


    Imagine how naked you must feel if you have nothing to protect this address from the advent of a hack without adequate data encryption.  Also the just the haggling by overzealous online marketers, spam, malware, and even ‘419 scammers’!


    Now the argument for whether using VPNs is illegal is highly debatable for some of the valid reasons highlighted above. It should, however, be a given right to be able to use it. And even though it is commonly used by cyber-thugs to mask their clandestine and often dark activities, it should not be outlawed altogether.

    The case for VPN

    The legitimacy of VPNs debate, therefore, carries on into a grey area.
    We will, however, investigate a few VPN providers that are ‘paid for services’ and even offered by established companies such as AVG (which primarily offers Antivirus protection).


    The directive is to help the everyday consumer surf the web without ‘virtual’ salespeople bombarding them with offers based on personal information gathered in an ‘unsolicited’ manner.


    Policies like the European-based GDPR law were put in place to protect consumers from the non-consensus use of their data. Even your Internet Service Providers (ISPs) can track your online activities via your IP and sell your browsing habits.


    Some forward-thinking people and companies, however, have long been shielding themselves manually using VPNs.


    One direct benefit for you as a consumer is the ability to access content (information, products, and services) from different servers. A good VPN service can enable you to obtain access to other geo-locational content despite being on a different continent.

    It is perfectly legal provided you are paying for the service. The burden falls on the provider of the service and not you if it came down to a legal “scrap”.

    Rationale for using them

    If you perform these tasks frequently, you need a VPN:

    • Hide your IP address (to enable anonymity from marketers and hackers)
    • Change your IP address (to avoid identity theft)
    • Encrypt data transfers (private and financial data)
    • Mask your location (to access other services)
    • Access blocked websites
    250x250

    A word of caution when navigating websites blocked by governments with a VPN. Unless you are a high-profile journalist working on a case and backed by good legal aid – it’s not a wise thing to do.
    Do some research if you are not sure because accessing such sites could land you in some hot water. Rather use a known privacy service like Tor to ensure full anonymity to gain access to restricted sites if you really must.


    Top Virtual Private Network Protocols

    VPN protocols and available security features are numerous. The most common (best) protocols are:
    ExpressVPNthe acclaimed best offshore VPN for privacy and unblocking.
    IPVanish great for P2P and Torrenting.
    VyprVPNthe best choice for those looking for security.
    NordVPNsecurity is its middle name.
    TunnelBeardubbed the easiest VPN to use.
    Windscribea VPN which gives you unlimited connections.
    Hotspot Shieldan awesome solution for online browsing.
    KeepSolid VPN Unlimitedthe jack of all trades of VPNs.
    CyberGhostrich clients and ease of reconfiguring.
    ZenMateuser-friendly VPN that caters to the newbies to VPN.
    PureVPNtake advantage of easy to use apps and access to many servers.

    Source: www.itproportal.com, PureVpn

    Making the choice

    Picking a VPN service can be a daunting task as there are now literally hundreds of them to choose from. Landing the right one means striking the right balance between what you are offered, the ease of use, and naturally, the price.

    Some providers offer free you VPN services while some like AVG charges for their VPN service. Paid VPN providers, however, are preferred to the free service providers as they offer robust gateways, proven security, additional free software, and unmatched speed.

    The key is to find the best VPN that meets your immediate needs while matching your budget.

  • Cloud (Storage) Wars!

    Cloud (Storage) Wars!

    The term “storage wars” has taken on a new meaning. It has shifted literally from the ability to keep one’s belongings in physical containers to having one’s data stored and managed in the digital realm.

    A question often asked is whether the (Internet) cloud is infinite. The answer is both a yes and no.

    The top four cloud tech companies are endlessly engaged in a silent market share war. It is a tough choice as they all offer millions of gigabytes in storage. We can only attempt to investigate to what extent is there an abundance of storage when we ‘run out’.


    The “Cloud” as explained in our previous blog, is a series of backed-up servers scattered across the globe.

    Consequently,  in terms of availability of storage, it is just a matter of where (location) a datacenter can be run and at what its maintenance costs are.
    The answer to how infinite is the cloud, therefore, boils down literally to a cost, rather than a capacity issue for cloud-storage providers (CSPs).

    The main CSPs vying for a market share in the paid cloud storage subscriptions are Google, Microsoft (Azure), Amazon, and IBM.

    There are also smaller yet significant players such as Box, Dropbox, Tresorit, and Barracuda.  A quick online search on their websites will reveal what they can offer you.


    Similarly, the pages of any one of the smaller companies will give some comparisons of each cloud storage offer (bundles).


    We will, however, focus on the major ‘players’ and summarize their offerings based on offers for both individuals and small to large enterprises.

    What to look out for
    stacking-up-cloud-vendors-2018-right-scale-2

    Some of the key features to look for when storing data in the cloud include Encryption at rest and in transit, as well as end-to-end encryption; 2-Step Verification, HIPAA Compliance.


    Other factors to consider are the actual server location, ability to sync any folders, and perform selective Synchronization.


    There are also key offerings such as offering the ability to edit files on mobile devices. For businesses, the ability to remotely wipe mobile devices, perform file-versioning, and other useful features for data management.

    As a business, if the above-mentioned features are not in your cloud solution, you better look into switching away.


    While you can technically run your own cloud, it would require a full-on IT team. That or a very good support system to assist in its maintenance and administration.


    It is for this very reason that a SaaS(and Hybrid)-approach to storage is preferred by many medium to large enterprises.

    4 of the most popular CSPs 


    Google

    Weaponry: 

    A standard (personal) GoogleDrive starts from 15 GB in size and comes when you open a Google email account. This is a standard with most Android-powered mobile phones which require a Gmail account to register the phone.

    It is a convenient way to store and access your pics, videos, and files across multiple devices or back them up in case of a hard drive crash.
    If you do not mind the inconvenience of having several logins, you could get away with multiple drives giving you 15 GBs each.


    There is, however, a drawback as there is no such a thing as a free lunch – the level of security and compliance features naturally are little to almost none.  Additional storage can also be purchased with different upgrade plans, which may come with more  add=ons such as extra file encryption.


    When it comes to their business offering, their Team Drive is available with the G-Suite bundle. One can upload 750 GB of data per day and up to a total of 5 TB in size.  Team Drive can contain a maximum of 100,000 files and folders, however, this limit can be increased upon request.


    The basic package including the more advanced security costs $5 per user per month and gives you 30 GB for storage and collaboration.

    A full comparison of available storage plans 

    Tactical strengths:

    The ease of accessing and using the drives via strategic partnerships such as Android provides them with a growing market share.   As it is cloud-based and not linked to physical devices,  you can access your GoogleDrive using a Mac computer as well.


    There are growing talks of incorporating Artificial Intelligence <AI> into the data management systems. They are currently building a full AI Center in Accra, Ghana. This will help bigger companies manage, access, and organize their stored information faster and with more purpose.


    They have recently launched a set of new cloud storage tiers under the branding Google One. This comes with revised pricing and storage options: 15 GB: remains Free; 100 GB costs $1.99/month; 200 GB $2.99/month  and 2 TB $9.99/month.

    Potential weakness/es:

    Google is a latecomer when it comes to offering business solutions and still battles with the stigma of being a free service and thus associated with inferior quality.


    The integration with Office applications is still something they struggle to get right. Not many are fans of  Googlesheets.


    Most non-Microsoft platforms will have this compatibility problem.
    They also run into a few data syncing problems ever so often, especially with the free storage. Google offers full 24/7 customer and technical support with their products. More aggressive advertising and pricing of their business offerings now serves to hopefully alleviate this issue for them.


    How Google bounces back from a hefty  EUR 4,34 billion fine for colluding with Android will determine if they survive the storage war. This especially if they will be now forced to allow other CSPs to offer services on mobile devices.


    Amazon

    Weaponry:

    One of the first cloud solution providers to offer eCommerce and Business-to-Business (B2B) offerings. Amazon and its Amazon Web Services (AWS) have come a long and calculated way from just offering/selling books online.


    They are actually seen as a formal threat and a direct (more superior) competitor to Microsoft’s cloud (equivalent) offering –  which we touch on next.
    Most of this comes from a robust and apparently the world’s largest global cloud infrastructure.


    Based on this, its cloud storage, dubbed Amazon S3, works on a “pay as you use” basis while its free tier starts you off on 5GB of storage. Thereafter you pay in increments based on the storage class you fall under.


    So the first 50 TB will cost  $0.023 per GB per month and then the next 450 TB will cost $0.022 per GB per month and so on.
    This is practical for businesses that do not have a limit to storage space but scale up and down very quickly based on their operations.

    Tactical strengths:

    Amazon’s storage platform gives users and businesses alike the ability to geographically store and move data with the highest levels of encryption. In addition, one can use data analytics on your data without moving the data into a separate analytics system.


    Amazon Athena additionally provides anyone who knows SQL on-demand query access to vast amounts of unstructured data. As with Google, AI incorporation along with Alexa would facilitate this even further.


    Other notable benefits offered include open workflows, Hybrid-cloud storage capability, powerful APIs, and easy and reliable access to many Third-Party vendors & Partners.


    Naturally, you get access to its AWS Marketplaces. It also has a strong compliance adherence including HIPAA/HITECH, EU Data Protection Directive, and FISMA.

    Comparison of the various storage classes available.

    Potential weakness/es:

    Its primary offering of consumer goods and online delivery will make it prone to any bad press received if that arm of operations does not work well.


    Further expansion into areas like streaming TV via Amazon Prime and cashless stores might result in a jack of all trades expert in none phenomenon. They are, nevertheless, handling all well so far.


    Microsoft

    Weaponry:

    The “go-to” tech company for word-processing software as well as operating systems. This software giant like Amazon is branching into many products.


    They now offer games, server hosting software, applications, an online store for all its devices, software, services, and of course, storage.
    Its Azure platform powers certain parts of Nasa and utility giant Schneider Electric to mention a few clients. Its purchase works similarly to Amazon via ‘pay-as-you-use’ terms.


    Storage users need to have a .Net Framework and SQL installed to use the storage. For those looking for quick storing solutions without building heavy infrastructure, they can adopt the cloud completely.


    With the launch of its online services (Microsoft 365), it has had to repackage a portion of its Azure platform to cater to small to mid-sized businesses.


    These include functional/specific bundles such as OneDrive (personal), OneDrive for Business, and Sharepoint (powerful storage and content management tool).


    The online version of the Sharepoint starts at $5.00 per user per month for a rather limited 1 TB per organization. Thereafter, users can purchase more in 1 GB increments of 12 to 16 (US) cents depending on the total (storage space) size ordered.

    Tactical strengths

    Also early adopters of AI (Machine Learning) and recently, the Blockchain (Blockchain Workbench), Microsoft is providing its developers with more and better reasons to use its storage space for practicality.
    Like their online storage offers on Office 365, Azure storage packages are also quite structured and well categorised.


    There are specific functions such as a database server-data management system. Then there is one for application running services, and others to handle rest-based object storage (Blob Storage).
    Lastly, they offer storage to help perform computations and process events (Functions).
    These bundles are all provided free for the first 12 months and then range from $0.002 per GB to about US 0.20c per million executions.


    They have a good Partner system to help distinguish and provide support for the best storage package based on one’s immediate needs.


    To bolster their growing Marketplace, they recently also purchased a business that deals with OpenSource (GitHub).  This enables more freedom for developers to manipulate the software on their platform.

    For a comparison of the storage types via Azure and pricing for each, click here.

    Potential weakness/es:

    People have found its pricing a little to steep on the storage side and so keeping market share will be tough.  Many new smaller CSPs offering cheaper per GB rates.


    They can only counter this by offering more products that require their storage (compatibility-wise).
    Some other cumbersome restrictions like users being only able to upload 20 000 files at once or the actual file-size limit might not bode too well with heavy cloud data users.


    They also don’t have as many APIs as Google or Amazon does, but these are growing by the day.


    IBM

    Weaponry:

    Probably the first of the CSP batch that provided cloud computing. It therefore has had the experience of honing ways of storing and retrieving data for larger businesses. International Business Machines (or IBM) can be considered as the grandfather of data storage.


    As with the other CSPs, there is a free offering called the “Lite plan” consisting of a single IBM Cloud service instance with storage up to 25 GB/month.
    Paid storage is staggered, per consumption and based on complex costing tiers based on location, storage class, and resiliency choice.


    Storage charges start from $0.09 for up to 50 GB down to $0.014 for 500+ TB on what they call the Cross-Region Flex plan.

    For more insight into the complex costing table, visit the IBM storage pricing page here.

    Tactical strengths:

    Their security is their biggest pride and strength and makes them a firm favourite for large companies and potentially governmental institutions.
    The fact that they do not actively advertise as much as Google or Microsoft is telling. They clearly need to provide high secrecy and protection for their existing clients.


    One such feature unique to the way data is stored on their cloud servers is using Information Dispersal Algorithms (IDAs). This helps to separate data in unrecognizable “slices” that are distributed across datacenters.


    So basically the complete copy of the data resides in any single storage node, and only a subset of nodes are available in order to fully retrieve the data on the network. This is similar to how peer-to-peer sharing or data encryption works.


    And speaking of heavy encryption, they have allegedly recently also started on the Blockchain and are experimenting with a particular Cryptocurrency to enable ease of payments. This in the light of IBM with its Watson platform looking to become more of a cloud-based data operating system.

    Potential weakness/es:

    IBM relies too much on its reputation as a forerunner for tech and cloud-based computing. It has earned that title for several decades before the likes of Google and Amazon barged in.


    They might lose out on market share once the newer CSPs start to offer more robust products and compliance services like theirs.


    Their high security and complex system come at a premium so designed for or rather restricted to wealthy companies essentially. The hosting option (main server locations) looks limited and restricted to geographical areas primarily in the US and EU.


    250x250

    Be wary of clandestine terminology such as ‘unlimited archiving/storage’ even with a paid subscription. This usually refers to storing data at rest and not the ability to constantly and unlimitedly sync files.


    Another salient factor to compare would be the number of files that you can upload or sync at the same time.
    This will be relevant for larger companies that need to upload large files and by large, we mean 10 GB files (2 and a half HD DVDs’ worth of content) and upwards.

    Making a choice

    At the end of the day, your decision to take on a faction in the storage war should be based on your priorities. You simply match it to what each of the companies is offering taking your budget into consideration of course.


    You may need to consider running a combination of two or more of them.
    Some larger companies offer storage as a “must-have” with hosted email or something as basic as purchasing a new smartphone.


    You will, however, have to ask yourself a few more pressing questions around functionality, data security, and compliance before taking it up.

    Or you can simply not accept the offer or disable it in cases where it is presented as a freebie!
  • Already GDPR-ed Out?

    Already GDPR-ed Out?

    Well, it didn’t take long. Less than a full week in fact, for the first GDPR-related court cases to surface against social tech giants Facebook and Google.

    It was as if lawyers were just waiting to pounce on them for their apparent failure to protect our rights as online users. This pertains specifically to issues relating to data privacy and the sharing of private details mainly with third-party marketers.


    How Facebook stores and shares your data has been clarified by several intense inquiries in the US and recently in Europe. This is where the law is set to benefit users of the social media platform in that geospatial area of the world.


    The said lawsuit, however, focuses on the opt-out clause that forces you to make a choice to comply or leave. The claimant is a privacy campaigner. He has made the Billion-Euro complaint on behalf of several users; seemingly a challenge to Facebook.


    Additionally, he has launched a separate suit against Google, accusing them of “pressurizing” users into accepting their data collection policies.
    This ‘comply and accept or get thrown out’ clause could leave you without your routine dose of social media consumption. Such a clause is thus deemed unfair.


    It could cost Facebook a lot if they get their way based on the terms stipulated in the new law. The social media giant could be fined up to a few billion or a sizeable fraction of their earnings in punitive damages.

    The aim of the new law

    The passing of the new regulation on May 25th, 2018, better known as the General Data Protection Regulation {GDPR} has been a long time coming.


    Despite the warnings of the “kick-in” of the regulation, many are unprepared for it. Some of the reactions to the law include confusion, anxiety by both large and small firms alike, and plain comical hysteria!


    Non-compliance now carries heavy fines and penalties, up to 20 million euros for anyone operating within the EU borders.

    So, what then, is the big fuss about GDPR?


    Well, it boils down to a right that has since the launch of the Internet to the mainstream, been waivered and overlooked. Gaining CONSENT to use your data for anything other than the reason you went public on the Internet is very crucial.


    This has become a contentious issue as many companies have over the years, unscrupulously benefited from data acquired (mined) – without your consent. Facebook only brought this into the spotlight recently.

    You can read more about data mining here

    Ad: Web, Network & App Scanner

    Who needs compliance?

    If you hold a folder, database of clients whether online or on your internal server, you would have to comply with the rules which stipulate full disclosure. This includes who you share your details with, and how the information is tracked, shared, and kept secure.


    Furthermore, research in March this year showed that only 39% of the Fortune 500 companies in the UK and 47% had GDPR compliance taskforces.


    Another UK firm commissioned study found that our buying behaviours are heavily influenced by we perceive our data is being handled by companies.

    The consent given to use your basic information cannot be taken for granted – even in the medical environment.

    German doctors’ practices, in the wake of GDPR, are manually making you sign consent forms. Doctors are now required to fully disclose who they share your contact information with.

    How to be compliant

    There are simple ways you can stay GDPR compliant. One method is to adopt an attitude of embracing it rather than just complying with it. You can be transparent with your customers by doing the following:

    Add a cookie bar to your website. You can also add a clause/paragraph to that effect (website disclaimer) in your ‘About Us’ section.


    Similarly, you must state clearly on any opt-in forms. Newsletters and any forms where their data is collected, used, and passed onto other third-parties must be announced. State clearly who they are and which data they have access to.


    You then need to give your customer the option to select what they want to share. Even if such data may not be necessary for them to receive services from you.


    Constantly review your relationships with third-party affiliates and partners to ensure that they are also complying with the law.
    They could be jeopardizing your data compliance efforts – as Cambridge Analytica did with Facebook.

    The last and most challenging step requires the action of what is promised above. This means an upgrade of your internal software to include security/encryption.

    GDPR compliant software

    You can obtain full compliance by using a GDPR-compliant package like Office 365 Enterprise E3. This package has email software specially designed for those of you dealing with sensitive client’s data that need to be kept for long periods.  Litigation hold, heavy archiving features; as well as basic email encryption are all included.


    You can add supplementary encryption software such as Azure Information Protection as an extra layer of security. This helps you to safeguard emails and stored data from being lost, compromised, or accidentally shared.


    All said and done it is likely that if you are a bigger firm, you would either need to create the position of a data security officer internally. If your lawyers are not up to date with digital laws, however, you can simply outsource the service.

    This should help make you become fully compliant thereby having to avoid issues with the data compliance authority altogether.
  • Data (Gold) Mining

    Data (Gold) Mining

    Let’s face it, if you really were going to quit Facebook, you would have a few years ago. Fact is, you should have asked the serious questions when the ‘free’ social media platform started turning over billions of dollars.

    No free service can generate that amount of money out of goodwill and thin air. So much that they could list on the stock exchange. So, we are not quite sure why everyone is acting amazed or why the knee-jerk #DeleteFacebook campaign is only now coming to light.


    There really is no such thing as a free lunch. If you believe that all these online social platforms would keep it that way, then you are as naive as they are hoping you to be.


    Think about it, the companies behind the platforms, actively recruit in pretty much tens and hundreds of cities globally.


    And the simple fact of the matter is that in order for them to pay all their staff of programmers, developers, executives, lawyers, and other stakeholders. They need to be paid!

    What your data means

    Facebook, Google, Twitter, Snapchat, and any social media platform that has over 100 million users sit on a goldmine for advertisers.

    The commodity, however, is not just what their users wish to own in the short term, or their purchasing power directly for that matter.

    The commodity is simply you, the user. So, your preferences, habits, and views along with their personal data are analyzed via machine-learning systems to study behaviours and habits.


    The data, in turn, is used for constant revenue maximization. In some extreme cases, it is used for political, psychological, and social manipulation!

    “Your ‘payment’ on a social media platform is your consent to have your information used for marketing purposes. Opting out of marketing would give you true ‘free use’ of the service. But no profiteering company offers you that privilege today. The best you can get is a month’s free trial.”

    Your likes, spending habits, music preferences, political views, location and working habits enables marketers to present their goods and services.


    They can position their offerings (sometimes subliminally) into spaces where you are likely to indulge in them.


    Social media platforms, in this case, become the marketplace for them to ‘mine’ data to use.

    Social network sites worldwide as of January 2018, ranked by the number of active users (in millions).
    Most famous social network sites worldwide

    Source: © Statista 2018

    How the mining works

    text-mining-icon-2793702_640


    Data mining is not a new idea and completely legal if presented transparently in the terms and conditions of any service. The terms get longer by the day (small print) that we don’t bother to read them.
    Microsoft envisioned this a decade ago and changed the way its operating systems work (with its Windows 8 series).

    Its operating systems are now more of a social, interactive, and information gathering system. Allegedly designed to “help you” organize things better.
    This is fostered by a voice-activated app called Cortana – all under one Microsoft account.


    Amazon has its own ways of data mining via your shopping habits and Alexa – is its own voice-activated search and information-providing device.
    Google (owned by Alphabet company) has the biggest stranglehold of the lot. They must, therefore, be the most cautious when it comes to data privacy and security.


    This applies especially with its partnership with Android, which makes it a requirement for you to use for all their devices to link all your data.


    These include phone contacts, emails via Gmail, pictures via GoogleDrive, apps (music, movies, etc) orders via the Google (Play)Store, and social media (Google+).


    You can even have your search fields stored and synced onto your devices – from your laptop to phone and tablet via Google.


    You are now having to give up your personal details to unknown affiliated marketers and partners of tech giants. They get first dibs on this data – and paying good money for it.

    Read more about Affiliate Marketing here

    Required by regulation

    The main violation by Facebook, therefore, might not even be non-consensus selling of data to marketers. Such things could be countered with a clause.
    They may have strategically stuck one in while you were busy posting selfies and liking random videos of cats.


    The real issue is the potential use of the data for political or advanced manipulation of data for fraudulent purposes. This can be facilitated by the use of artificial intelligence to influence you without your knowledge.

    Read more about the uses of Artificial Intelligence here

    250x250

    It is possible for you to have full data privacy and absolute freedom from advertising on social platforms. This, however, comes at a ‘cost’.

    This was reiterated recently by the COO of Facebook who admittedly confirmed that ‘opting out’ would mean you will have to pay to use Facebook in the future.
    They had just not put this in place but will now forcibly have to make it a clearly visible option.

    The fact of the matter is we are in an era of Big Data, the Internet of Things (IoT), and AI. All of these require your data to ‘operate’.

    Data mining is here to stay

    Though many were reluctant at first, pretty much every company now has a Facebook, Twitter, or Instagram page. It serves as a platform to showcase and communicate with thier clients via the newly termed phrase ‘social engagement’.

    This has turned out to become a strong branding and marketing tool for them.


    And if you think you are out of it by leaving one platform, just remember this: Facebook owns WhatsApp & Instagram; Google owns YouTube; Microsoft owns LinkedIn, and so on.


    There is, in fact, nowhere to hide if complete online privacy is important to you. And let’s not forget your web-browser: Not many of us actively use ad-blockers: but your browsing data is being scanned and processed by external third-parties companies.


    If you aren’t using a Virtual Private Network (VPN), you should seriously consider it! Along with some good plug-ins to help secure your online browsing from all types of behind the scenes snooping and ransomware.
    It will be interesting to see the outcome and verdict of the probe into the Facebook case.

    Rest assured, many other heavily used platforms will be deleting and removing ties with data mining marketers. Especially ones that have had a similar agenda to what Cambridge Analytica was accused of conducting.

    A change in the verification of marketers, data storage and data security laws (such as the new GDPR law) were long overdue. Facebook will now be the scapegoat to enforce data security laws on social media.
Translate »

This website uses cookies. By continuing to use this site, you accept our use of cookies.