19 Apr

Twitter moves all NON-US Accounts to Ireland

twitter moves all non us accounts to ireland

What's behind this?

The rumors are numerous regarding the amendment made by Twitter this week regarding their terms of use. Basically, Twitter moves all data of Non-US accounts to Ireland.

Originally, it was Twitter USA, based in San Francisco, CA who controlled all the data and accounts. A new division in Ireland now has all of the world accounts except those in the United States.

Circumvention of US laws

Moving data in Ireland, bypasses the current Laws in force in the United States, as much as to prevent future laws that may apply. It also repels most intelligence agencies to be able to ask to check those informations with a warrant.

Is there a desire to circumvent the laws and get away from the Federal Intelligence Agency (NSA)? It is interesting to ask the question, especially when you know that Facebook has also made this kind of data movement, also in Ireland.

 

Commercial Advantage

Most likely, we think that doing a change in this way, it is more a commercial advantage and a desire to have more money on data management and operations. Ireland does not have the same laws as the United States. The laws are more laxist in terms of rights to confidentiality and privacy.

This leaves room for a benefit of using data for user-targeted advertising, expoiting the personal information of each users. There is much more global users of Twitter users than Americans users. Easy to see the benefits of such a change.

 

Data Privacy

We should be concerned by how our personal informations are used on social networks such as Twitter and Facebook. The constant search for profits and the pole position on the advertising market will establish whether intentionally or not personal data breaches for sure.

The search for more flexible laws involves an element of risk that criminals also have more latitude to operate in these permissive legal contexts. As Canadians, we are in the same boat as the rest of the world, our data is sent in Ireland.

 

Twitter takes advantage of the 2 sides!

First, they decentralize your personal informations in order to use it in a less restricted legal context. The stated goal: Make targeted advertising on a vast scale by charging advertisers.

On the other hand, advertisers pay to put forward their brand to targeted users (gender, age, location etc.). But Twitter mentions loudly that we can use “aliases” in order to have control over our personal information.

By allowing pseudonyms, the target audience is biased. When Rolland 54, teacher with a living 90K per year will select a username and create a Twitter account, I doubt that he will only changes its name …

Rolland will change his age group, his city, his country, who knows ?! Where is the targeted advertising?

Twitter assured people that their personal information is safe while doing a lot of profit on advertisers who do not have the quality of the target data they should expect if they were in a regulated country like United States.

 

Observations

Finally for those who believe that Twitter is trying to get rid of the NSA, note that in any data movement, there is possibility of intercepting it. Finally, for those who believe to be free to do whatever they want by having their account hosted in Ireland under pseudonyms, do not believe that it will give you the right to harass, manipulate, terrorize. You will be observed and tracked as needed.

Intelligence agencies have a lot of ressources. Right or wrong, these ressources are set in motion to protect the population. In those “transactions” like Twitter has done, we hope it do not give too much space to the enemy in certain situations where you need accurate information by the police departments.

When discussing on social networks and broadcasting your personal information or your activities, residence etc, be very careful. The internet gives an occasion to dehumanize the interaction, giving way to other kinds of predators that may be just as dangerous as all others!

Share this
18 Apr

How to perform a Audit Check of your Website

audit check website

All firms, small and big ones should conduct a security audit on their data structures and their website. Every owner or manager of a website must lead at regular intervals a security audit to determine if everything is secure.

Because of the frequent changes that are made in the technology and softwares,  security auditing is essential as a prevention tool but also for planning future equipment needs, programming and logistical support.

 

 

How to conduct a security audit?

Before driving a security audit, you must do some planning (pre-audit) and organizing this recurring task. An infrastructure plan should be done. If you have a small system, you can always write down the brand, model, drive capacity and memory, software versions, proof of purchase and warranty.

You should then make a short summary of what constitutes the infrastructure. Mentioning how many computers are in the network, internet access point, routers, switches, wiring, where are these facilities and who is the internet provider with the account number and the annual cost of the solution.

Then you determine if your security audit is done globally or if it is done in portions all year long. You might determine to check that online transactions meet the standards every 6 months, but keep an audit of physical security every 3 months. In addition, you may establish a software audit annually.

A possible division of audits should respect your budget, be well targeted in dates in order to have all relevant human resources available during the audit.

It is useful to clearly define the objectives of the audit of each departments according to their environment by clearly stating the degree of sensitivity of the data passing through. All policies and procedures or guidelines should be classified in handwritten files made available to all and clearly identified.

Remember that security auditing is used to enforce security, it is a development tool for systems and data. Do not search for things not done as demanded rather to improve the situation by taking the current pulse of the situation.

 

 

The Checklist

Depending on the type of organization in which you operate, the elements constituting the safety audit will increase. Even in small businesses you should have these basic elements:

– Check the protection of passwords;

– Check open and accessible network ports;

– Whether it is possible to do SQL Injection;

– Determine whether the backups and supports are adequate in number and quality;

– Check that the updates are done on a regular basis and all softwares are up to date;

– Check vulnerabilities of servers : Their location, their age, the risk of damage etc.

In a wider audit plan, there are hundreds of factors that are to be assessed by high risk, medium or low risk. It is necessary to determine a schedule for each of these items and vote a budget to solve them instead of seeing the list grow in number.

The problems often come at the worst time. The failure to conduct security audit not only exposes you to hackers and data loss but also the contingencies and misfortunes.

If you are vulnerable at all points of view, you will certainly not fulfill your short or medium term mission.

Internet Cloud Canada conducts comprehensive security audits for all types of organizations. Our solution allows you to develop your business and ensure the quality of data processing!

 

 

Open Solutions for audit check

Every origanizations have differents goals, budget and views of security audits. There’s open solutions available. They do not give the full state of your business vulnerabilities, but it’s better than nothing at all!

For LINUX, the following testing and auditing tools can inform you about some flaws in your systems.

You can also use the free or near-free online scan solutions to identify some vulnerabilities.

 

 

Conclusion

Whatever the nature of your organization or its size or complexity, you have to drive minimally a security audit annually and ensure to include as much informations possible to make good decisions that will shape your future.

If you need some advices or find that open solutions do not meet your needs or are too complex, our technicians will be happy to conduct your security audits for you.

We include in our audits: DOM-Based Cross-site Scripting, Reflected Cross-site Scripting, verifying all credentials and passwords, tests of the security certificates (https), PCI standards for online merchants, correct encoding of Data in HTML, checking the physical safety of the equipment and its environment. The audit we drive will be aligned with your objectives and your budget!

Share this
17 Apr

Toxic Links, weapons of mass destruction for your SEO

TOXIC LINKS DETECTED GOOGLE

In the multitude of factors that exist to promote a website and especially to maintain and improve its SEO, toxic links have a big impact. A toxic link is a page link to or from your website that causes penalties in your ranking.

There is an entire “world” that revolves around toxic links. Most of the time, the owner of the website by ignorance or non competent skills create toxic links. On the other hand, there is what is called NEGATIVE SEO an unfair technique used occasionally by competitors or hackers to make SPAM links to your site and make you lose your SEO ranking.

Of course, it is rare to see this technique applied, but it is part of any serious analysis of a SEO strategy. Internet Cloud Canada, conducts a rigorous security analysis for customers to determine if they are victims of such attacks before and in real time.

 

So…, SEO is easy?

Absolutely not! We have mentioned several times in our posts that it is really difficult for a novice. That is why we present regular posts on factors affecting the ranking of your web sites and your pages.

 

My website have toxic links?

There are some factors that can tell you if your website has toxic links:

1. You receive a notice from Google stating that you have.

2. You see a fast decrease of your ranking in Google.

3. Your pages are not indexed.

4. Your site is attacked by a virus or malware infection.

 

 

Keep the links in your sight

You must keep the links of your website in your sight constantly. For this, the Google Webmasters tools are perfect! Simply go to the “Search Traffic” section and “Links to your site”. You can view and download the list as needed.

It will be easy to identify wich website links to your’s and if by mistake or because you suffer of NEGATIVE SEO attack you have some bad links. Google let you build a disavow links list if needed. Google established this procedure to protect you from NEGATIVE SEO ATTACKS. Always act quickly in order to do not lose your good links and ranking.

Time is a huge factor in SEO. So if you do not keep an eye on your links and discover after weeks or months, an attack, you will see the visitors ratio drop on your website and all your related potential sales too. Consider also that if you have created a list to disavow links, Google response time is also to be taken in consideration before recovering to your original SEO state.

It is always better to hire a specialist in this field, and our technicians are at your disposal!

 

Protect your links from a potential yourself!

It can happen that “Spammers” pretend to be you and try to destroy your good links by contacting the operators of the referrers websites. So protect your links ensuring you always contact the websites giving you very good links via an email address under your own domain name and not with a free email such as Hotmail, Yahoo, Gmail etc.

Also keep an updated list of your links, allowing you to find them if they ever disappear.

The “Spammers” also use the technique “copy /paste” of your website as a weapon of mass destruction by toxic links. Visit Copyscape and see who copy the content of your website!

 

 

I created toxic links!

It is possible to avoid creating toxic are links to your website by taking a few precautions:

A. Check the PR (Page Rank) of the website that will refer you. Although PR is not ever used by Google in the overall optimization, there is a gray area where we believe the PR always plays a role to some degree. The higher the “PR”, the higher the site is trusted.

B. Look at the contents of the site that will refer you and take care to see if it contains content related to your field.

C. Never pay for directory links or other web site.

D. Do not link you to websites that are already penalized by Google.

E. Do not make enemies on social networks or blogs or otherwise. We never really know with whom we deal.

F. Do not publish low-end content as a visitor on external blogs by linking your website.

Use these tips to protect yourself from attacks of NEGATIVE SEO and to improve the quality of your links on the Internet. Building a good SEO takes longer but gives the expected results! Avoid shortcuts because they are often trapped by penalties.

Share this

© 2018-2023 Internet Cloud Canada.Tous droits réservés. (Sitemap).