An important security update (3.4.5) is due out on Thursday October 22. You are strongly advised to update immediately.
Need advice on updating Joomla! WordPress or other websites? Please contact us direct via our website www.thenorthernoffice.com #Joomla! #Philippines
A Joomla 3.4.5 release containing a security fix will be published on Thursday 22nd October at approximately 14:00 UTC The Joomla Security Strike Team (JSST) has been informed of a critical security issue in the Joomla core. Since this is a very important security fix, please be prepared to update your Joomla installations next Thursday.
“Publication is a self-invasion of privacy.”-Marshall McLuhan
The Communication Theory philosopher, Marshall McLuhan, captured the very essence of today’s talk when it comes to privacy with this quote. We alienate ourselves with the emergence of different social networking sites and social applications that can be use through the internet. Private recording and photos can be easily uploaded and distributed online.
Some of them are okay but others can result into tarnishing your life’s work of building relationships and reputation. The privacy risks that the internet offers to unknowing and unvigilant users are staggering. We have identity theft, illegal use of credit card information, defamation, and blackmail or extortion. Countless people have been victimized by these scams. Many have lose their money, jobs, identities, and lives just because they posted information about themselves online. But it doesn’t mean you have to steer away from the internet. You just have to be mindful of the things you share online to avoid such risks.
Steps To Protect Your Internet Privacy
Remember to think before disclosing any personal and confidential information to others. By following these simple reminders, you are able to protect yourself from harmful effects of too much sharing of personal information online. Remember that there is a limit to what you can tell others online. Since we don’t know who is on the other side of the computer. Besides, there is nothing better than sharing personal things to those we trust. Again, as a word of advice and caution, think before you post.
By Kristin Tarr, Communications Manager atCloudFlare With the recent phishing hack on the Associated Press’ Twitter account and thecyberattack that compromised more than 50 million Living Social customers, you’re probably thinking that with all the time and energy hackers use up on high-profile attacks, that your small business is in the clear, right? Wrong. SMBs are not safe. In fact, they get hacked all the time. According to a 2012 study conducted by the National Cyber Security Alliance, nearly 40 percent of all cyber security attacks are targeted at small businesses. Compared with big enterprise companies with robust security teams and generous security budgets, small business can be an easy target for hackers. Many small businesses don’t allocate enough resources to their security systems or have little knowledge on how to stay safe from the schemes of cyber villains. So what are the holes in your system making your small business vulnerable? Here are a few we think are important: IPv6 Transition – The Internet is running out of IPv4 addresses and making a seamless transition to IPv6 is becoming more and more necessary, especially if you’re a small business. As an SMB, it’s important for your company to be technologically current and utilize services that offer gateways for conversion to avoid any customer confusion or lack of access during the switch. Two-Factor Authentication – Although two-factor authentication may seem obvious, it’s a constant potential threat that consumers don’t always think about. The absolute minimum your SMB should be doing to protect itself is turning on two-factor authentication whenever possible. It may not make your account invincible, but it adds an extra layer of necessary protection. DDoS Attacks – Don’t let your website get held hostage and lose business. SMBs are vulnerable to spambots and malicious DDoS attacks just like high profile companies. Be aware and educate yourself on best practices to avoid attacks. Phishing for Passwords – Still? Yes, phishing is still an all-too-common technique for hackers to steal your passwords, usernames and other private information by sending fake emails posing as an organization. As a small business, be cautious of any suspicious communication via email or over the phone. And, never use the same password twice – vary your passwords by using numbers, capital letters and other symbols. By following these simple tips and staying educated on the cyber security offerings available, small businesses can focus on their goals and objectives while thwarting hacker attempts and staying safe. Small businesses are the largest source of employment in the United States, and with the proper security measures, we can ensure it stays that way. Kristin Tarr is CloudFlare’s communications manager and oversees the company's marketing and thought leadership initiatives. Kristin hails from California’s Central Coast and is also a running fanatic, having run numerous half and full marathons. She graduated from CSU, Chico with a degree in Public Relations and Political Science. (Source)
Posted by John Joe Morgan
GoDaddy is an IT services and software provider to millions of online businesses. Several news reports stated that it was hacked by a twitter user Anonymous Own3r. But GoDaddy claimed that it was a Distributed Denial- of- Service Attack (DDoS). DDoS means that a certain website will be overloaded with tons of communication request that it can no longer respond to traffic. Then it collapses afterwards. This is what happened to GoDaddy which led to thousands of company accounts web hosting to go down. Series of questions have been raised on how effective is GoDaddy in providing web hosting solutions to its thousands of clients and prospects? Will it ever bounce back from this dilemma? Whereas for us how do we choose a good web hosting company who can cater of needs? Here are some factors you can consider before choosing one: 1. Value for Money. Let’s admit it we usually go for cheaper options. It’s good and very practical. Some prefer expensive offers from well-known companies because they have this certain reputation. So where do we go? Go for: ✓ Starting package first ✓ Detailed features and services ✓ Warranty ✓ Areas of expertise 2. Technical Aspect. Even if you know less about technicalities always put in mind first what you actually need. Then browse on the company services and testimonials that have the same problem as you do and what solution has been provided to them. Know: ✓ Technical Specs and Limitations ✓ Technical Support ✓ Features/ Add-Ons ✓ Hardware they use ✓ Email Features 3. Scalability. If you finally choose the plan for your web hosting; see to it that you can stay with it. It should be established and it has a room for growth. That means that it can answer your needs even a year from now. Because technology is changing every time. In that case, GoDaddy DNS Attack could have been prevented. They should know that any time that their network suffers they need a strong control of the situation. They need back up plans so that they don’t lose their clients. Posted by John Joe Morgan