Security Protection – Harry Waldron MVP Rotating Header Image

Wireless Technology – Projections for 2015

Some projections for 2015 are noted in following article:

http://www.bidnessetc.com/31708-what-to-expect-from-the-wireless-industry-in-2015/

QUOTE:  2014 was a tumultuous year for wireless carriers. The telecom sector has underperformed the overall market due to failed merger attempts, intensifying price wars, and expensive spectrum auctions, The telecom ETF, iShares Dow Jones US Telecom has risen 0.34% year-to-date (YTD), compared to the S&P 500 Index which has risen 13% over the same period. As the year draws to a close, Bidness Etc speculates what investors can expect going into the New Year.

1. Price Wars To Intensify — Price wars were an ongoing theme in 2014.

2. Video Content As A Differentiator — As the price wars in the industry offset the revenue growth due to rising data usage, video content delivery is expected to be the next growth opportunity for wireless carriers.

3. Major Consolidation In The Industry  – With a total of $83.7 billion worth of deals, M&A activity was robust in 2014 in the North American telecom industry, but consolidation is expected to slow down in 2015.

4. Wireless Spectrum — Wireless spectrum will continue to play a major role in the coming year when the results of the ongoing AWS-3 auction become public.

Windows 10 – New Spartan web browser project may be in process

Microsoft may be working on a major update in it’s browser technology as part of the Windows 10 initiative.  Further developments are likely to emerge in future.

http://www.zdnet.com/article/microsoft-is-building-a-new-browser-as-part-of-its-windows-10-push/

 

There’s been talk for a while that Microsoft was going to make some big changes to Internet Explorer in the Windows 10 time frame, making IE “Spartan” look and feel more like Chrome and Firefox.  Microsoft is building a new browser, codenamed Spartan, which is not IE 12 — at least according to a couple of sources of mine.   Spartan is still going to use Microsoft’s Chakra JavaScript engine and Microsoft’s Trident rendering engine (not WebKit), sources say. As Neowin’s Brad Sams reported back in September, the coming browser will look and feel more like Chrome and Firefox and will support extensions. Sams also reported on December 29 that Microsoft has two different versions of Trident in the works, which also seemingly supports the claim that the company has two different Trident-based browsers.    However, if my sources are right, Spartan is not IE 12. Instead, Spartan is a new, light-weight browser Microsoft is building.

CyberSecurity – Gaming Networks offline Christmas

Cyberattacks were launched during holiday season as documented in article below:

http://bits.blogs.nytimes.com/2014/12/26/sony-and-microsoft-game-console-networks-disrupted/

 

The computer networks for Microsoft’s Xbox and Sony’s PlayStation 4 video game consoles were off line for most of Christmas Day, possibly because of an attack by a group of hackers with a history of targeting video games.

The hackers who call themselves the “Lizard Squad” claimed responsibility on Twitter for the shutdown, which essentially rendered the gaming devices unusable, but neither company confirmed the source of its problems.

Leadership – Travel High Road effective for difficult people

Another excellent leadership article:

http://www.johnmaxwell.com/blog/want-a-better-holiday-follow-my-dads-advice

 

There’s lots of great advice out there about handling relational conflict over the holidays – from setting healthy boundaries to sharing feelings kindly but honestly. And it’s all valuable advice. Today, I’d like to share with you one behavior that my dad modeled in my family growing up, and that I’ve done my best to demonstrate in all my relationships ever since. It’s made the difference in my friendships, my marriage, and my parenting. Here is what my dad advised.  Always travel the high road .. You see, in every interaction, there are three roads that we can take:

1. The low road, where I’m out to get you,
2. The middle road, where I’ll basically treat you as you treat me, and
3. The high road, where I’ll treat you well regardless of how you treat me.

Anti-Virus Testing- Android Security Applications NOV2014

AV-Test is an independent software testing firm. Their latest testing focus on how well Android security products can protect devices with most products scoring well in the evaluation

http://securitywatch.pcmag.com/security-software/330168-report-android-security-apps-improving

FULL REPORT AV-TEST – Android Security Applications NOV2014

http://www.av-test.org/en/antivirus/mobile-devices/android/november-2014/

 

While there aren’t nearly as many malicious applications aimed at Android devices as there are targeting Windows, that’s no reason to be complacent. If one of those malware apps hits your phone, you’ve got trouble whether it’s common or not. AV-Test Institute rated 31 Android security applications and found that for the most part they’re even more effective than when last tested.  AV-Test CEO Andreas Marx observed that “the malware protection rate of all products—with one exception (51.2 percent)—was in the very good range with an average detection rate of 97.6 percent.” He also noted that the current crop of products generated far fewer false positives (valid files detected as malware), with a total of seven compared with 36 in the previous test.

Anti-Virus Testing- AV-Comparatives tests Virus cleaning DEC2014

AV-Comparatives is an independent software testing firm. The latest AV product tests focus on how well they can clean infected systems in removing malware and correcting damages to the registry and overall Windows system.

http://securitywatch.pcmag.com/security-software/330210-pc-infected-which-antivirus-does-the-best-cleanup

FULL DETAILED PDF – AV-Comparatives tests Virus cleaning DEC2014
http://www.av-comparatives.org/wp-content/uploads/2014/12/avc_rem_201411_en.pdf

TABLE SUMMARIZING TEST RESULTS BY VENDOR
http://www.pcmag.com/image_popup/0,1740,iid=441354,00.asp

 

The AV-Comparatives researchers used a fairly simple system to convert these grades in to numeric ratings for comparison. A product that earned a D grade for removal or convenience got zero of 100 possible points. Perfect removal earned 100, 90, or 80 points, depending on whether the convenience grade was A, B, or C. Removal with executables remaining (a B grade) earned 70, 60, or 50 points, again depending on the convenience grade. And so on. Average point totals for the products tested ranged from AhnLab’s low of 68 to a high score of 88, shared by AVG and Bitdefender. Panda and Kaspersky came close, with 87 and 86 points respectively

Anti-Virus protection – one key defense for 2015

While safe practices can go along way in protecting users, this brief article highlights the complementary need for technology defenses as well.

http://securitywatch.pcmag.com/security-software/330459-why-you-need-antivirus-software

 

These days, “antivirus” is just a word for a tool that protects your data and your PC against viruses, Trojans, botnets, rootkits, rogue security software, ransomware, and all types of malicious software. Actual viruses are the least of your worries, since they lay low to avoid detection.   “But I only use my PC to surf the Web,” you may say. “I don’t keep any personal information on it. Who cares if a virus or some bad program goes along for the ride?” Well, it’s not as simple as that.    A Trojan horse gets onto your system by pretending to be useful, but once inside the walls, it releases a malicious payload. You say you don’t store personal data? How about your email address—that’s about as personal as it gets. A Trojan might try to capture your email address and password, or insert itself into financial transactions to drain your bank account. That’s bank robbery with no need for a mask or a gun.

Leadership – Five Techniques to sharpen skills for 2015

Excellent advice for coming year is found at John Maxwell’s leadership blog.  These strategies can provide improved techniques to help take on the challenges for coming year:

http://www.johnmaxwell.com/blog/5-surefire-ways-to-sharpen-your-skills

QUOTE: Recently, another leader asked me about how he should go about sharpening his skills in the areas where he was naturally gifted. Here are the thoughts I shared with him that day. To sharpen our skills in a strength area, we should seek to…

1. Gain Experience – Once you get some experience under your belt, it gives you both confidence and examples of what works and what doesn’t. Having dealt with a similar situation before really makes you confident that you can handle it this time.

2. Get Feedback – feedback from any number of people can be really valuable.

3. Write Down YOur Thoughts - I’ve discovered that when I write a thought on paper and then examine it, I can think of all sorts of ways to improve it.

4. Participate in a Small Group of People – Sitting in a group discussing ideas is huge because it allows us to flesh out great thinking. That’s because as a group, we can all contribute to improving an idea.

5. Study Available Resources – if you will spend one hour a day every day on a certain subject, within five years you will become an expert on that subject.

SUMMARY: I’ve always said that we should focus on growing in our areas of strength, more than in areas of weakness. Once you’ve figured out which way you’re naturally wired, work on gaining experience, getting feedback, participating in groups, and studying great resources. Your efforts in these areas will yield great dividends in your personal growth.

Enterprise Anti-Virus Protection Test – December 2014

Dennis Technology Labs is an independent software testing firm.  They compared corporate AV products with real-world simulated testing as noted in the comprehensive PDF report

http://www.dennistechnologylabs.com/

http://www.dennistechnologylabs.com/reports/s/a-m/2014/DTL_2014_Q4_Ent.1.0.pdf

Product Protected Legitimate accuracy Total Accuracy
Kaspersky Endpoint Security for Windows 100 100% 100%
Symantec Endpoint Protection 100 100% 100%
Trend Micro OfficeScan and Intrusion Defense Firewall 95 95% 93%
McAfee VirusScan, HIPs and SiteAdvisor 98 87% 88%
Microsoft System Center Endpoint Protection 53 100% 64%

 

This report aims to compare the effectiveness of anti-malware products provided by well-known security companies. The products were exposed to internet threats that were live during the test period. This exposure was carried out in a realistic way, closely reflecting a customer’s experience. These results reflect what would have happened if a user was using one of the products and visited an infected website

Device Security – Safely retire older devices when they are replaced

Modern digital devices can hold enormous amounts of personal and confidential data.  Great care must be exercised when they are replaced. Data contents should be reviewed with complete deletion of data even when passing on to others in family.  This is emphasized in following PC magazine article:

http://securitywatch.pcmag.com/security/330704-re-gifting-digital-gadgets-can-lead-to-identity-theft-woes

 

If you received a shiny new gadget for the holidays, you may be thinking about passing your existing device to a new owner. It works just fine, and it’s better to pass it on than to throw it away, right?   Re-gifting digital devices can be problematic, especially if you don’t take the time to scrub your personal data and financial information first. If you are looking to pass on your laptops, desktops, tablets, and gaming consoles to someone else, make sure your identity is still safe. And if you received something that was regifted, take the time to scrub the data before you start using it.

“Someone’s digital and personal footprint can still be acquired any number of ways outside the cash register or Internet shopping cart,” said David Anderson, director of product at Protect Your Bubble. One way is through information left behind on the older device.