What is Chromium?

What is Chromium?

Is Chromium, the next browser from Google, trying to take over for Chrome?
At a recent I/O developer conference, Google’s senior VP of products, Sundar Pichai, announced that Google Chrome now has over 1 billion active users. Though Microsoft has pushed their Edge browser hard, consumers simply like Chrome better. So, why mess with perfection?

The Chromium browser project actually does not attempt to improve upon Chrome. It is an open-source browser that works more as a shell or window manager for the Internet instead of as a standard browser. The tabs work more as a title bar for desktop applications and are designed to manage groups of applications.
Chromium’s Quick Search Box simplifies the way people access the Internet, including their personal content. The Chromium OS combines these two common activities to make navigation faster and more intuitive.
How Chrome Differs from Chromium
Google has taken the basics of Chrome and added some important open-source bits that may attract those who love and use open source programs. A few of these include:

Adobe Flash (PPAPI). Chrome includes this Flash plug-in that gets automatically updated each time Chrome is updated. In order to experience the best in games and graphics, computers need the latest version of Flash. Their sandboxed Pepper API (PPAPI) plug-in can be installed on Chromium, but this is not done automatically.
Support for AAC, MP3, and H.264. Both browsers include the basic codecs, such as WAV, Opus, Vorbis, Theora, VP8, and VP9. Chrome provides licensed codecs giving users access to a wider range of media and content.
Extension Restrictions. These days, many extensions have been released that can actually harm your computer and zap resources. With Chrome, all extensions that are not found in the Chrome Web Store are automatically disabled. A recent investigation found that some rogue extensions can highjack your computer’s resources and use them to mine cryptocurrencies. This will cause your computer to slow way down and behave in unusual ways.
Updating Google regularly. Both Windows and Mac users have an app running in the background that keeps Chrome always up to date. Chromium lacks this convenient feature.
Security Sandbox. One of the best features of Chrome and Chromium is that these browsers have the security sandbox enabled by default. A few browsers, including some Linux programs, will disable Chromium’s security sandbox, which can cause random issues.

Why Build Another Web Browser?
Google’s developers designed Chromium in an effort to build a better, safer, more reliable way for users to surf the web. By allowing developers all over the world to work on the project, they felt that Google Chrome could be significantly improved upon. However, this hasn’t happened.
Chromium is still largely misunderstood by the masses and has not generated the global interest that other open source products have. For instance, the Linux operating system has become a very trustworthy program that is used today by about half of all Internet servers. It’s reliable and secure. A number of programmers and developers will always be fans of Linux no matter what. It remains freely distributable, allowing anyone to create a distribution for any purpose.
A large community of developers worldwide worked on Linux for many years and their hard work produced an amazing family of free, open-source operating systems. These programs are used in education, business, finance, video games, and supercomputers, among others. Linux set the bar high for open-source software collaborations.
Today, users can still get excellent support from these developers. Companies like Red Hat and SUSE still offer commercial support as well. The dream for Chromium was that global developers would continually improve upon the program until it far surpassed other browsers on the market.
Why Chrome is Preferred
Today, in spite of the many good browser choices available to users, Chrome is hard to beat. This may add to Chromium’s lackluster appeal. Below, are a few of the reasons why Chrome users say they will continue to use this browser over Chromium and others:

Extensions and apps are integrated seamlessly. Firefox takes months to add a new app or extension for new sites, programs, and content.
Ease of use and installation. It doesn’t take a rocket scientist to install and use Chrome. It has a very clean, organized design that takes away the confusion that new users may experience. That makes it perfect for groups like the elderly who need programs that work without much ado.
Bookmarks and favorites can be quickly transferred to a new computer, phone or tablet. Chromium and Firefox both use a more disorganized system of transferring your bookmarks that can be painfully inconsistent.
Lack of understanding is another hurdle for Chromium. Because it is not a standard web browser, users may get confused about exactly how to manage applications and programs.
Efficiency and speed. Today, people expect to assert almost no effort when using the computer. They want everything to work seamlessly without additional effort or education. The need to be user-friendly is a giant obstacle to overcome when creating new apps, computers, programs, etc.

Getting Started with Chromium
Chromium is still a good option for those who are looking for open-source software and who want to avoid closed-source bits. Linux distributions may incorporate Chromium instead of Firefox simply because it’s so much like Chrome, yet offers good open-source attributes. Of course, Chrome still offers a better Flash player and a few other good features. For instance, using Chrome on Linux, users can now stream Netflix videos, an attractive quality for those who love Netflix. Chromium does not offer support for HTML5 video content.
Despite its drawbacks, numerous users including developers are working on Chromium. Getting involved in this project is easy. New users might begin by visiting forums and developer discussion groups. There, you can meet some like-minded individuals and get up to speed. You can also get involved by volunteering to help with testing. Chromium developers are looking for reduced test cases that improve web compatibility.
There is always a wide range of issues from translation problems to file bugs that developers can help with. Submitting patches can be extremely helpful. In the end, Google’s hope is that Chromium will become a fast, responsive program that is secure and dependable. It remains to be seen whether this will happen or not. Though Google is a trusted brand globally speaking, the company does sometimes create an “Edsel” when it comes to new programs, software, products, and apps.

More Businesses Will Soon Be Using Voice Assistants

More Businesses Will Soon Be Using Voice Assistants

“Hey Cortana, remind me to contact Bill at Acme to set up that sales meeting.”
More business people are relying on their voice assistants and AI chatbots to help them save time and effort, according to market research firm Spiceworks. After surveying more than 500 technology professionals throughout North America and Europe, they found that 40% of large businesses and 15% of smaller ones will now be using voice-assist technology to improve their business efficiencies.

Right now, Microsoft Cortana is the most commonly used AI assistant for businesses, at 49 percent – and 14% of businesses are using AI chatbots, with their Microsoft collaboration tools like Slack and Teams. This is probably because it’s so accessible and is integrated into Windows 10. Apple’s Siri isn’t far behind at 47 percent – it’s integrated into iOS and macOS.
Some of the tasks respondents use voice assist for include:

Voice-to-text dictation
Employee calendar management
Customer service purposes
Helpdesk management tasks
Sales and marketing

New Players in the Business Voice-Assist Marketplace.
Integrating voice assistants in the enterprise market is unleashing new use cases for the technology. In November 2017, Amazon launched their Alexa for Business platform, which lets businesses to create their own Alexa skills.
IBM recently launched their Watson Assistant for businesses. They plan to license it to enterprises so they can build customized, interactive tasks into their own products and services. The Watson Assistant is more focused on customization and privacy than are Google and Amazon. This might give IBM a competitive edge in the business marketplace.
Watson allows for better-tailored voice interactions and eliminates the need for a universal wake-up word like “Hey Siri” or “Alexa.” Plus, you can train the assistant using your own datasets. This makes it easier to set actions and commands.
The Watson Assistant also gives each user control over their personal data. It doesn’t pool users’ information and allows each person to control which Watson-powered devices and applications can access their data via the IBM cloud. The technology then learns and remembers each user’s preferences.
IBM is introducing their Watson Assistant to hotels, hospitals, banks, offices, restaurants, connected cars, and more. They’ve partnered Harmon where they’re using the Watson Assistant in a Maserati concept car. The Munich airport is also using IBM’s Watson Assistant to power a robot that provides directions to travelers. And Chameleon Technologies is using it to control temperatures in homes based on residents’ daily schedules.

What Voice Assist Will Demand from Your IT Professionals.
As voice assist becomes increasingly mainstream in the workplace, IT departments will face many challenges. As it stands now, the various forms of voice assist, machine learning and artificial intelligence operate on multiple platforms, operating systems, apps, and hardware. This will make it difficult to harness their potential without considerable investment in resources and expertise. Not only will IT professionals need to have a complete grasp of its functionality and how to integrate it with networks and legacy systems, but they must also define and implement strategies for using it, and provide training and education for an entire pool of users in the enterprise. As voice assist becomes more interactive and “personal,” IT professionals will need to combine their technical skills along with strategic and interpersonal capabilities to achieve greater success.Adoption of the technology is moving slowly but is predicted to pick up as the power of voice achieves a new level yet to be discovered. Those businesses that stay informed and ready for and prepared for change will be better positioned to take advantage of its benefits. Some of these benefits include increased productivity and sales, more and better innovations, improved collaboration, and the ability to increase global market share.

Deep Learning
Voice assistant providers are improving recognition capabilities through the power of deep learning, a form of artificial intelligence (similar to facial-recognition technology). Deep learning goes a step farther than machine learning that is based on algorithms and historical data.It will be able to predict a pattern of speech based on previous content without training by compiling vast amounts of data from the Internet. Voice assistants will be capable of taking meeting notes with much more accuracy. And, they’ll be able to identify different voices in a room to transcribe who said what.
Deep learning will be better at translating foreign languages. Imagine how this could fuel the growth of a global business, and the ability for more seamless collaboration. Right now, voice assist is a bit “robotic,” but eventually it will be more conversational in tone and respond more accurately due to deep learning.
But, Don’t Fire Your Administrative Assistant Just Yet.Those who aren’t using them say it’s because they don’t see a use for them, that the cost is holding them back, and they worry about security issues. They also worry about technology distracting their employees and that it could negatively affect productivity.

Although voice assistants and chatbots are helpful in the workplace, the technology still needs improvement. 59% said that it can misunderstand requests and 30% said that it is inaccurate when executing commands. And, 29% said that it can’t distinguish their voice from others.

Other than using them for simple tasks, voice assist has yet to become widely used in the workplace. If you have a lot of employees in one area, the technology won’t work for you. It has difficulty deciphering commands with there are simultaneous conversations taking place. But, as the technology improves, more will be willing to use it.
Is your business ready to meet the demands that voice assistants and future technology advancements will surely bring? If your small or mid-sized business is struggling to manage your existing IT systems, or you can’t keep up with IT security concerns, it’s time to consider partnering with a Technology Solutions Provider. In this way, you’ll be prepared for what’s coming next in the world of voice-assist, and other technologies that can help you better compete in your marketplace, improve productivity and ultimately your profitability.

Stay competitive by making technology your business advantage

With our expertise and cloud services from Microsoft, you can quickly and affordably meet your business goals, whether it’s adapting to a changing competitor landscape, achieving business growth, protecting customer data, or reaching new clients. Let CompNetSys and Microsoft cloud services put you on the fast track to the modern business

What To Do When Your Privacy Is Violated And Your Details Are Public

What To Do When Your Privacy Is Violated And Your Details Are Public

Your relationship with the Internet started out so well! Long before you realized it, sites like Facebook and Google were tracking your every move and keeping records on you to you use against you. Fight back!

It may have started with an American Online disc promising 40 hours of free time, or it may have started with your university email account and use was limited to time spent in the school library. Perhaps it was with odd-duck Juno, connecting to download new email messages and then only dialing back in to re-connect for a quick send-and-receive, and no real time spent “online”. Or it may have started after “AOL” was unlimited and free, and you weren’t among those who had to create a brand-new email address every time you needed to score more free time from a new disc – seriously, those things were everywhere!
No matter how it started, we’re all in the same boat today. Well, unless you’re still connecting from a university library computer anonymously and your home life is spent in a cabin in the mountains somewhere living the life unplugged. Side note: There’s a reason people pay to travel to the most remote locations in the world – unplugged – for a back-to-the-basics experience, sometimes all the way to staying in a tent in a sleeping bag and fishing or foraging for food. It’s ironic how we’ll consider paying for this as a vacation, given the access we have to modern amenities like running water, indoor plumbing, air conditioning, and maybe a Keurig.
Are we on information overload? Are we overwhelmed with data and addicted to being busy? Well, yes to both – but that’s not the real reason we revert to rustic living. It’s the feeling of control over everything in your immediate world and being in charge of your destiny. It’s knowing the unknown doesn’t live in some dark room halfway around the globe, waiting to steal your credit card information or plant malware on your laptop through one innocent but careless action on your part. We’re going to skip the part about possible bears or wild animals on that extreme camping expedition analogy we’re making here.
Back in the real world, where Google and Facebook exist, we now know that those are just two of the major organizations who use the information gathered from us online to benefit them. Yes, the fine print we accept without reading vaguely indicates the information they collect will be used to cater our online experiences to our preferences, etc., but no matter how you look at it, the primary benefactor in that data collection isn’t us. Google collects the data to serve us advertisements, deliver sponsored search results which are really ads that charge the advertiser a premium to show their search result at the top – from which, again, Google benefits. We’re not saying this is a bad thing – oh, no! But at the same time, we need to be incredibly cautious about what information we do share. After all, knowledge is power. We already know Google is in an extremely powerful position, being the exception and the rule, depending on the circumstances.
Now that we’re learning more about the Internet and how organizations are using data to target consumers – us – and we’re learning the unfortunate side effects – for us – about the relationships these organizations have with other major organizations who are willing to pay for our information. All so they, in turn, can then target us with more advertising and messaging. We refer back to the earlier comment about information overload.
The question we face is, what can we do? How can we take back control of life in the world where we connect to the Internet every single day, whether it’s to check email, post a status to Facebook, share an image on Instagram, or use Google to search for a recipe?
We’ll tell you.
There are steps you can take to see what information Google has collected on you. We warn you, before you follow these steps, be prepared to understand Google has far more information than you realize, and it can feel like an intrusion. It may feel like the last time you went to a physical ATM – way back in the day – and were worried about that guy behind you who wasn’t at least 4 feet back, and you were worried he’d see your PIN and rob you.
For Google:

Log into your personal Google Account. You already have one if you’ve read this far. Chances are you’re already signed in. How to know? This is simple: go to https://www.google.com/ and look in the upper right corner. If there is the avatar you’ve chosen or an image you recognize, you’re signed in. If not, there will be a blue rectangle that says “Sign In”.
Once you’re logged in, visit this link: Google Maps Timeline.

This pulls up Google Maps and may give you a dialogue box with a brief introduction: “Explore your timeline”, with the text under this that “Only you can see your timeline”.
“What’s Location History?” wants to tell you that you’re about to see a personalized map of all the places you’ve been with your logged-in devices. This is where you’re promised better commute options and improved search results.
You’re next promised control, with the option to delete anything you prefer.
Clicking through will take you to a page where Google tells you what it thinks your home address and work address are. These may be blank.
At the bottom left, there is a blue button: “Manage Location History”.
This is your option to delete the data Google has collected from your usages and stored.

For Facebook:

Log into your personal Facebook Account.
Once logged in, there will be a drop-down menu in the upper right corner that just looks like a triangle pointing down. Click this to see the drop-down menu.
Select “Settings”.
In the left navigation menu, select “General”.
In the center panel, you’ll see a series of items – probably about a half dozen, depending on the latest iteration of Facebook. Underneath these menu items, you’ll see an option to “Download a copy of your Facebook data.”

Depending on your Facebook tenure and activity, this can take a very long time to download. Clicking this text will take you to a page with a green button that reads “Start My Archive”. You will probably be prompted for your password again at this point.
Facebook will happily email you when your archive is complete – it’s ok, they already know your email address, remember?

This is not necessarily related to all those personality quizzes some Facebook users love about “Which Harry Potter Character Are You?” or “What Color Is Your Aura?” or “What Type of Dog Breed Are You?”, and the data that is collected through this – by the way, it’s typically your email address and your list of friends. With the news of Facebook selling information on over 80 million of its users recently, there is a large movement to #DeleteFacebook, but we’re not sure jumping ship is the answer.
Updating activity on Facebook isn’t as straightforward as it is on Google, but at least now you know what is being collected from you now from both and how to handle it. As we mentioned, knowledge is power, and the more power you can take back, the more control you have over your digital destiny.

Why I No Longer Charge My Mobile Phone Overnight and Why You Shouldn’t Either

Why I No Longer Charge My Mobile Phone Overnight and Why You Shouldn’t Either

I just read this warning: “Don’t overcharge your mobile phone. Make sure you unplug it from the charger after it reaches 100%. Don’t leave it charging overnight.”
Why is this?
It’s because your mobile phone charger doesn’t stop charging after your phone reaches 100% capacity. It keeps topping off the charge during the night. This is called a “trickle charge.”

While you’re sleeping, and the phone is plugged in, it works to keep fully charged by compensating for the small amount of charge it loses by just being turned on. This is bad because the trickle charge causes your mobile phone to retain a higher ambient temperature than it should. This ultimately reduces the battery’s capacity.
I wondered why I couldn’t seem to keep my phone charged all day. It’s barely three-years-old, and I’m already having battery issues! Now I know why. I’ve been damaging the battery all this time by charging it at night while I sleep. I wish I had known this before!
Mobile phones contain a rechargeable lithium-ion (or Li-ion) battery that charges faster than traditional rechargeable batteries. So, when we plug our iPhone or Android into a charger, it can get fully charged in just about two hours.
By keeping our phones charged overnight we’re increasing the amount of time it spends on the charger, thereby degrading its battery capacity that much sooner.
Hatem Zeine, the founder of Ossia, a developer of wireless charging technology, tells us: “If you think about it, charging your phone while you’re sleeping results in the phone being on the charger for 3-4 months a year. So even though the manufacturers try their best to cover this scenario, this process inevitably lowers the capacity of your phone’s battery.”
Batteries decay from the moment you start using your new phone. This means they gradually lose their ability to hold a charge. By charging your phone overnight, you’re increasing the amount of time it spends with the charger. As a result, it degrades the capacity much sooner.
If you’re like me, you’re always on your phone checking text messages, emails, calling people, listening to music, watching videos, surfing the Web and more. It’s no wonder the battery runs down so quickly. However, if we’re careful about the way we recharge our phones, we can get much more life from the battery.
The people at Cadex Electronics that make lithium phone batteries say:
“Go ahead and charge to 100%. There’s no need to worry about overcharging as modern devices will terminate the charge correctly at the appropriate voltage…Modern smartphones are smart, meaning that they have built-in protection chips that will safeguard the phone from taking in more charge than what it should. Good quality chargers also have protection chips that prevent the charger from releasing more power than what’s needed. For example, when the battery reaches 100%, the protection hardware inside the phone will stop current from coming in, and the charger will turn off.”
However, they go on to say:
“Li-ion does not need to be fully charged as is the case with lead acid, nor is it desirable to do so. In fact, it is better not to fully charge because a high voltage stresses the battery.”
Don’t wait until your phone battery gets to 0% to charge it. A good time to charge it is when the battery reaches 35-45%. Doing this will help to preserve the battery life. If you do this religiously, then you should be able to keep your smartphone for longer than two years.
So essentially what I’ve learned is that rechargeable batteries are doomed to failure. They are constantly decaying from the moment you first turn on your brand-new phone and eventually lose their capacity to hold a charge. How depressing!
This is why my phone keeps losing its charge more quickly the longer I have it! I’ve owned my current iPhone 7 for over two years, and I’ve experienced a significant reduction in battery capacity.
Even worse, Apple tells us that constantly charging and recharging the iPhone battery isn’t good because the capacity of Li-ion batteries diminishes slightly with each charging cycle.
Most Android phones have a feature that allows for fast charging. They also have a chip with a Power Management IC (PMIC) that tells the charger when it’s receiving the higher-voltage fast charging to prevent it from overheating. Heat is a bad thing for all mobile phones. This is why you should never leave your phone in a hot car. The same goes for freezing temperatures.
So, what do the experts advise us to do? How should we charge our smartphones?
Here’s what the people at Cadex say to do:
“Don’t wait until your phone gets close to a 0% battery charge until you recharge it. Full discharges wear out the battery sooner than do partial discharges. Wait until your phone gets down to around a 35% or 40% charge and then plug it into a charger. That will help preserve the capacity of the battery. You should also keep your phone cool, as higher temperatures accelerate the loss of battery capacity.”
Another tip: Take off your phone’s case before you charge it so it won’t overheat.
Well, I guess this is the reason why I never seem to keep a phone longer than two years. This, coupled with the fact that Apple keeps coming out with cool new phones entices me to replace my old one. I know–This can be an expensive proposition. Maybe this is what the phone companies planned for all along–To keep us buying new phones! And with the pay-by-the-month plans that providers now offer, they make it even easier to swap out our not-so-old phones for a new one.
But for those of you who want to keep your phones for longer than two years, charge your phone during the day after it reaches 35 to 40 percent and unplug it when it reaches 100%. This might get you more longevity from your Li-ion battery so you can hang onto your phone for another year or so.

Why Do 4 Out Of 10 Companies Still Use Ransomware Friendly Anti-Virus?

Why Do 4 Out Of 10 Companies Still Use Ransomware Friendly Anti-Virus?

If The Marketplace Distrusts and Has Moved Away From Legacy Anti-Virus and Switched To Next-Generation Endpoint Protection To Escape Ransomware Infection, Why Are You Keeping It?

All the way back in 2006, the word was getting out that Anti-Virus software must retire and make way for the Cloud, Next-Generation Endpoint Protection. AV served its purpose when systems were simpler. And hacking was a college prank, not a malicious attack for financial gain.
Ransomware, Malware, and non-Malware exploits were infants. Legacy AV could carry the load. But in this day and time, they’ve grown-up, and 53% of US organizations are blaming their tired, outdated Anti-Virus, as the cause for not preventing a Ransomware attack. Could your Legacy Anti-Virus be one of them?
It Takes A Cool Million to Plunk Down and Recover, From a Ransomware Attack.
$900.000 a year, is the average cost an individual company spends, on the Ransomware attack, paying the ransom monies, time used to respond, and productive labor time lost. In the US alone, the lost work time equals 44-man hours, responding to an attack, from attack to complete recovery.
44-man hours! That’s a little over a week’s work for one employee. The cost translates into paying that person’s salary, to do a job, you did not hire them to do. Is this good or wrong time management?
Do you know the percentages your Partners and Supply Chain suffered from your infestation?
Research recently provided by SentinelOne shows your affliction has a vast, direct and negative impact, on your Partners and third-party vendors. What happened to your company, magnified their loss and downtime, both in productivity and revenue, it’s the proverbial “domino-effect.”
Let’s look at those numbers SentinelOne provided:

46% Downtime – Your Partners and third-party vendors suffered;
35% Loss of productivity – Your Partners and third-party vendors suffered;
20% Loss of revenue – Your Partners and third-party vendors suffered.

So, who’s to blame?
Worthless legacy antivirus software? Careless employees? Decision makers? Yes. All three have a hand in it. And we’ll explain how.
Let’s start with the legacy antivirus software.
According to Business Wire, a Berkshire Hathaway Company, “Legacy vendors have failed to build solutions for new vectors – specifically, many legacy AVs still lack basic anti-exploit capabilities.” The key word here is “Exploit.” Exploiting is what a Ransomware programming-pirate knows and uses against you and your system.
Legacy anti-virus solutions are not able to keep up. Innovation is inadequate. The volume of attacks from:

DDoS Attacks
Malware Attacks
Ransomware Exploits
Viruses

Can not be charted. Hundreds of thousands of new strains appear daily. The best legacy anti-virus can’t keep up. It is overwhelmed. And here’s why.
AV infection solving depends on long-established signature-based identification methods to search for digital threats. What it struggles to overcome in today’s world, is the new strains. They are Signature-less and Fileless. The dangers go unchallenged and give a cyber-thief an easy way to access any unprotected enterprise networks.
The second culprit is the carelessness of employees.
According to Ponemon Institute’s 2017 State of SMB Cybersecurity report, sponsored by Keeper Security, The number one most significant cyber threat to your business is your employees. The cause of a breach was a whopping 54% from negligent employees.
But what makes them negligent? For starters device convenience. 50% of your data is accessible from a mobile phone. Not just a company-issued device. It could be a spouse or friend’s phone. A company, of any size, is a target. If your employee has 3 bars in the middle of the Sahara desert, your data can be accessed.
Secondly, your security and policies have gaps making it difficult to enforce your employees to follow proper protocols. According to the research, password policies lacked strict enforcement, 68% of the time. And 58% had no or unclear direction into password practices.
The third and final enabler.
I hate to be the one that says it, but the business owner or decision maker(s) prevent their protection from a Ransomware attack. They hang on to old beliefs. “It won’t happen to us.” Or “It costs too much to swap our legacy antivirus for endpoint solutions.”
45% in this group will pay the ransom, to get their files unlocked and returned, rather than the 55% that credit Cloud, Next Generation Endpoint protection. But those who spent to get their files back were targeted again and again and were attacked 73% of the time. The cyber-criminal sees that business as a bank atm. When they need some cash, it’s paid up or lose your files.
According to {company} Ransomware Specialists, “Cybercriminals will continually perfect their ransomware attacks. They will bypass your Legacy Anti-Virus. They will trick non-trained employees into infecting their organization. They will make you pay their ransom demands or sell your data to the highest bidder.”
Of the 70% who swapped from Legacy Anti-Virus over to Next Generation Endpoint protection, 96% are confident they will prevent future attacks.
To learn more about Next Generation Endpoint Protection and have 96% confidence you will prevent future Ransomware attacks give {company} a call at {phone} or email us {email} to speak to one of our Ransomware Prevention Specialists.

Data Breaches and Credit-Card Fraud Can Destroy Your Small Business

Data Breaches and Credit-Card Fraud Can Destroy Your Small Business

Most business owners are cognizant of the prevalence of fraud in the digital world today. According to Experian’s Global Fraud and Identity Report 2018, almost three-quarters of businesses believe fraud is a growing concern, and nearly two-thirds reported fraudulent losses over the past year.

What is Fraud?
Fraud occurs when an individuals’ payment information is used without their authorization. When hackers breach your network and access your customers’ or clients’ sensitive cardholder information, they have many opportunities to commit fraud numerous times. Anytime someone falsifies an identity and “tricks” a system into thinking the person making a purchase is someone other than who they actually are, this is considered to be fraud.

Fraud is Pervasive in Today’s Digital World

This is because the majority of business and consumer data remains vulnerable. As the value of digital information grows, so does the hacker’s motivation to develop methods to avoid detection from the latest technologies.
The existing account setup process requires consumers to provide extensive amounts of personal information along with passwords and secret questions. And data breaches provide this information to cybercriminals. When this data is stolen, it’s often used for fraudulent activities.
Fraud is a moving target just like the hackers. New tactics are evolving where criminals combine real and fake information to create new identities.
Most business owners just don’t have a handle on this – and they lack confidence in their ability to protect their customers and their companies from fraud.
One of the reasons for this is that their initiatives are mostly reactionary rather than proactive as many continue to use legacy cybersecurity technology rather than investing in new, more sophisticated data protection solutions. As a result, every month that goes by increases their vulnerability and exposure to data breaches and fraud.

Fraud is an ever-present and growing risk

For businesses in e-commerce, managing the risk of fraud is a delicate balancing act between providing an ease of use for customers vs. fraud protection. They struggle with mitigating fraud and providing a positive customer experience. Unfortunately, the customer experience wins out in most cases, and businesses are willing to risk fraudulent losses over losing customers to their competition. Ironically, they are setting their businesses up for reputational damage where they will end up losing customers anyway, fail to gain new ones, and possibly face financial penalties and litigation costs.
The 2017 Cost of Data Breach Study from the Ponemon Institute, sponsored by IBM, puts the global average cost at $3.6 million, or $141 per data record. That’s a reduction in the average cost in 2016, but the average size of data breaches has increased. It’s also worth noting that the average cost of a data breach in the United States is much higher at $7.3 million.
More than 50 percent of businesses say they still rely on passwords as their top form of authentication.1 And business leaders know that using passwords isn’t the most secure option. But customers are used to them, and business owners want to please them. They also complain that they lack the financial resources to adopt more advanced authentication methods when this would save them legal fees and penalties if/when their customers’ accounts are breached–not to mention their reputation and the future existence of their business. This, of course, is very shortsighted.

How data breaches and fraud are connected
Data breaches and fraud don’t usually occur at the same time and place. Cybercriminals won’t steal a customer’s information and turn around and use it for a purchase from the same business. So. it’s not easy for a business to detect when a breach occurs. Data breaches are typically detected by using specific security tools that monitor all payment activity. Merchants should follow PCI/DSS Standards to identify and prevent breaches and remain compliant. PCI-DSS audits will help you find vulnerabilities in your system and reveal inadequacies that must be eradicated.

A successful case of fraud spreads like cancer

If a hacker can get one password, they may have the keys to other password-protected accounts. The more online accounts people open, the greater their risk. And most people have quite a few. If the hacker can figure out the password to someone’s email account, they may also have the key to their credit card and banking accounts as well.
You must remain vigilant to prevent data breaches and fraud.

What to do if you suspect fraud

A key indicator of evidence of fraud is in chargebacks where a customer disputes a charge on their credit card, and where you aren’t paid for the service or product. If your chargeback rate increases above a 1% margin, this is a good indication that you’re experiencing fraud.
In this case, you should hire a third-party auditor like an IT Managed Services Provider (MSP) to help bring you back into compliance and stop the thieves. They will detect where the problem(s) exist and if what they find indicates a data breach. PCI-DSS compliance requirements mandate that you do this to stop the fraudulent activity.
Of course, you should contact the card processor as well. They will connect you to the card providers who can often identify the point of access or detect a suspicious pattern of activity.

What You Can Do to Reduce Fraud and Data Breaches.
Use EMV Technology.
EMV (Europay Mastercard Visa) is the global standard to authenticate payment cards. EMV technology can help you protect your business from fraud. It ensures the card is legitimate and that the person using the card is the authorized user.
EMV chips are microprocessors that store and protect cardholder data. They use a unique cryptogram that’s validated by the card issuer. This makes it more difficult for hackers to break the code and steal card information to commit fraud.
Today, if you don’t use an EMV-capable terminal, and the transaction turns out to be fraudulent, you can be held financially liable for that transaction.
EMV has been used in the United Kingdom since 2004, and card-present fraud has gone down by 80% as a result. By comparison, without EMV in the U.S., fraud increased during this time by nearly 70%.
Protect Data in Transit by Using Encryption.
When credit card data is stolen, it’s considered a data breach. Considering the number of card payments your business processes in a month, hackers may view you as the “Pot of Gold at the end of a Rainbow.” In other words, your business is a prime target.
You can help stop the hackers from accessing data in transit by using end-to-end encryption (E2E) and point-to-point encryption (P2PE).
The advantages of end-to-end encryption are:

That you don’t need a separate key for the decryption of the data.
You have flexibility in deciding what data to encrypt.
You can choose specific configurations for more functionality.
The file size is small, and the processing time is minimal.

Point-to-point encryption encrypts transmitted data as it goes through a designated “tunnel.” This is used most often for credit card information that’s encrypted from the point-of-sale (POS) to the credit card processor.
With encryption, if a breach does occur, and data is stolen, it will be useless to cybercriminals in its encrypted state.
Protect Data at Rest by Using Tokenization.
Tokenization breaks up a sequence of data into pieces such as words, keywords, symbols, phrases, and elements called tokens. Tokens can be words, phrases or even whole sentences. In other words, tokenization keeps cybercriminals from using data by replacing it with meaningless characters. Tokenization is helpful for businesses that store sensitive card data for re-billing. It’s also one of the most effective and affordable ways for businesses to protect their customers’ confidential card data.
Combining encryption and tokenization is one of the best ways to protect your business from the devastating effects of a data breach.

Secure Your IT Environment

Ask your IT Managed Services Provider (MSP) to set up a next-generation firewall, anti-spam, and anti-virus solutions.
Ensure your POS and router are on different networks and separate from other systems that access the Internet.
Don’t use your business POS for surfing the Web. This can expose it to viruses and result in vulnerabilities that can be breached.
Assign separate login credentials for each user.
Forbid sharing of login credentials and enforce this.
Keep your user list up to date and disable accounts that are no longer needed.
Only provide remote access for users with a clearly identified need.
Don’t leave remote access software turned on when unattended.
Keep all software and anti-virus, anti-spam programs up-to-date.
Regularly run and review scans for malware.
Regularly have your MSP run vulnerability scans.
Ask your MSP to train your staff on the latest security threats and what to do if they come across one.
Train your staff how to detect unauthorized skimming devices that could be installed on POS or credit-card terminals.

Have Your MSP Train Your Employees on Cybersecurity Awareness.

Teach your employees about password security and make sure you enforce this behavior:

Don’t use words from the dictionary.
Don’t use names of family members.
Don’t reuse passwords from your other accounts.
Don’t write down your passwords or put them where others can see them.
Consider using a Password Manager (e.g., LastPass or 1Password).
Use password complexity (e.g., P@ssword1).
Create a unique password for work separate from your personal use.
Change passwords at least quarterly.
Use passwords with 9+ characters.

A criminal can crack a 5-character password in 16 minutes.
It takes five hours to crack a six-character password.
Three days for a 7-character password.
Four months for eight characters.
26 years for nine characters.
centuries for 10+ characters.

Turn on Two-Factor Authentication if it’s available.

Teach employees about ransomware and phishing threats. These appear to be from an official like the IRS or FBI. If a screen pops up that says you’ll be fined if you don’t follow their instructions, don’t! If you do, the criminal will encrypt all your data and prevent you and your employees from accessing it. Teach them to:
Beware of messages that:

Try to solicit your curiosity or trust.
Contain a link that you must “check out now.”
Contain a downloadable file like a photo, music, document or pdf file.

Don’t believe messages that contain an urgent call to action:

With an immediate need to address a problem that requires you to verify information.
Urgently asks for your help.
Asks you to donate to a charitable cause.
Indicates you are a “Winner” in a lottery or other contest, or that you’ve inherited money from a deceased relative.

Be on the lookout for messages that:

Respond to a question you never asked.
Create distrust.
Try to start a conflict.

Watch for flags like:

Misspellings
Typos

Ask Your MSP to Help You with PCI Compliance.
PCI Compliance is not a one-time event but should be a continual process to ensure your IT systems are appropriately transmitting and storing sensitive data. It mandates that network and business practices are secure.
Failing to maintain compliance with the Payment Card Industry Data Security Standards (PCI DSS) can ruin your small business if you get hit with a data breach.

It’s not always easy to do this on your own. Your MSP can help by:

Performing scans of your network to identify and eliminate vulnerabilities that can lead to data breaches.
Monitoring network activity and blocking malicious activity before it can lock down or steal your data.
Providing you the tools and resources to promote compliance.
Implement data-breach protection solutions.
Help you sign up for a breach assistance/cyber insurance program that provides for reimbursement of certain card brand fees that are charged if data is compromised. Some cover the costs of a data breach, which can be upwards of $100,000 or more.

Protect Your Business from Data Breaches, Fraud, and the Resulting Consequences
When you take all of this seriously, you’re not just protecting your customer’s confidential information; you’re also protecting your business from fraud.
Most companies that experience a data breach will see a rise in cost to retain existing customers. And, they will also see an increased cost to acquire new customers. When you add these increases in cost to the loss of revenue from customers that choose take their business to your competitors, you’ll soon see how your damaged reputation dramatically affects your company’s bottom line.
You don’t have to face this alone.

The right IT Managed Services Provider can be your best ally against security threats. From helping you with integrated and compliant POS systems to implementing technologies like encryption and tokenization, and providing compliance and breach assistance, the right IT Partner is worth every cent when it comes to helping you secure your business against the devastating effects of credit-card fraud and data breaches.

Stay competitive by making technology your business advantage

With our expertise and cloud services from Microsoft, you can quickly and affordably meet your business goals, whether it’s adapting to a changing competitor landscape, achieving business growth, protecting customer data, or reaching new clients. Let CompNetSys and Microsoft cloud services put you on the fast track to the modern business