How clean is your phone?

iPhone waiting for a "Siri" voice commandIt’s with us up to 24 hours a day but have you ever given any thought to mobile phone hygiene?

Just think about everything you touch during the course of an average day, keys, door handles, keyboards, pens, credit/debit cards, cash and so on. How many other people have touched those things? How hygienic are they?

Have you ever checked your phone in a bathroom or public toilet? Don’t worry, you’re not alone if you have, apparently most people have checked their phone in a bathroom which goes some way towards explaining why 1 in 6 phones have faecal matter on them.

Green Bacteria possibly from a dirty mobile phoneAccording to research, the average mobile phone has 18x more harmful bacteria than the handle on the door of a public toilet.

Se we go to the loo and then use our phone and pop it into our pocket or handbag, somewhere that’s nice and warm, in other words an ideal breeding ground for bacteria.

A little later, we take our phone out of it’s bacterial breeding ground and hold it to our face to use it. Some of the bacteria transfer to our hands, some to our face where it can cause acne, some of the bacteria is now on our hands so we can transfer it to others when we shake hands, touch money or other door handles

Because few of us bother to really clean our phones (wiping the screen doesn’t count) the germs keep building up and they include E-Coli (great for upset tums), influenza and MRSA (causes rashes and skin infections)

So, the next time you have a spot or rash on your face or go down with an upset tummy or the flu, don’t look at who you’ve been in contact recently, take a long hard look at your mobile phone

So, what should we do? Well, you can buy anti-bacterial wipes specifically designed for electronic devices, or you could use standard rubbing alcohol and a soft cloth or paper towel. Use cotton buds to get in to those nooks and crannies and, finally, don’t forget to take your cover off and clean that too.

Got Stagefright? You probably have if you own an Android phone

Android Robot logoIf you have a SmartPhone and it’s not an iPhone, not a Windows Phone and not a Blackberry then you probably do, and this puts you at serious risk.

Simply put, using a flaw that’s been called “StageFright” hackers could easily steal contact information, personal details, track your location and install malicious apps without your knowledge.

All they have to do is send you an infected MMS, effectively a text message with a picture, and just receiving the message is enough to infect your phone.

Security provider, Lookout, has developed a free test that will check whether your phone is at risk, there are probably other tests but I use, and trust, Lookout which is why I’ve made this recommendation.

If you are vulnerable, Lookout will advise you as to how you can minimise the risk, but you can do this without running the test, if you wish.

Open your Text Message App, go to “Settings” and disable “Auto Retrieve”. You might have to do the same for Google Hangouts and Facebook Messenger too, if you use them.

Now, Google is working hard on a fix but it’s not going to be rolled out for a little while due to a whole range of complexities”

Has Anti-Virus software reached its “Best Before” date?

CrowbarFor many years, the security mantra has been

  • Mac good, invulnerable to viruses and hacking.
  • Windows bad, very vulnerable to viruses and hacking

The reason was two-fold, whilst it’s true that the Apple operating system IS harder to infect with a virus, the main reason was popularity (or lack thereof). When 97% of the world was using Windows, why bother writing viruses and other malware for the extreme minority.

The traditional Windows solution was to install an anti-virus program from one of the many vendors and, for real belt-and- braces safety, protect your internet connection with a firewall. Hopefully all would be well and good, so long as you paid your annual anti-virus subscriptions and ensured that the virus definitions were regularly updated so your anti-virus program could identify the threats and keep you safe. (Free anti-virus programs for home users did a similar job, again provided they were kept up to date)

Significantly Increased Risk of Infection

However, the upsurge in Apple popularity over recent years means that Apple devices are also targets of the cyber-criminals. And it’s not just Apple computers and iDevices that are at risk, the virus writers are also targeting Android devices, Microsoft phones and tablets and devices running Linux devices.

Anti-Virus is dead!

Brian DyeLast year, Brian Dye, Senior Vice-President for Information Security at Symantec (the company behind Norton Anti-Virus solutions) said, in an interview with The Wall Street Journal, that “Anti-Virus is dead”. What he meant was that cyber criminals were now able to write malicious software faster than Norton could be updated.

Whilst Norton, and all the other anti-virus programs, are not yet ready for the scrapheap they only detect around 45% of all attacks. As well as that rather disturbing stat, research by FireEye (A cyber-security provider)  indicated that 82% of malware detected by their security solutions stays active for just one hour and 70% of threats surface just once before disappearing and being re-written to avoid detection by the AV companies.

So, what should you be doing?

Security-padlockWell, I’ve said it before, but it’s always worth reiterating, security starts with education. Then you add as many layers of additional protection as you feel necessary, depending on how you use your devices and the level risk you feel you are faced with.

  • Never open an attachment unless you are expecting one and you know, and trust, where it came from.
  • Keep your Anti-Virus software up to date and continue to renew your subscriptions, it may only block 45% but that’s nearly half of all threats stopped before they have a chance to install.
  • Install a security App on your phone and tablet
  • Explore the new offerings from the traditional anti-virus vendors that look to protect your web browsing and protect you against spam, phishing attacks and other cyber crime threats.
  • Be alert for anything that doesn’t feel “right” and if something looks too good to be true,  that offer of a full version of Microsoft Office on CD for £50.00 for example,  remember, it probably is!
  • Use a different, complex, password for each website that you have to log in to. An App such as LastPass will help you create passwords, securely store them and auto-complete the log-ins when you log in to those websites. (other password tools are available)
  • Ensure your Social Media accounts privacy settings are set to an appropriate level
  • Look at Bitdefender Safego,a free anti-scam service for Facebook and Twitter
  • Remain cautious when using any internet connected device

How to set expectations and fail to deliver

Old petrol pumpI don’t like filling my car with fuel, but not for the reason you might think!

It’s not the cost, that’s just an unchangeable part of life, no it’s the temptation when I go to pay. Chocolate bars, crisps, sweet drinks, gadgets and all those essential “must haves” strategically placed between the door and the till to tempt you.

That’s why I much prefer “pay at pump” options and can’t wait for the day when all garages offer this.

I needed fuel recently so imagine my delight when I saw that Shell are partnering with PayPal to enable “pay at pump” simply by scanning a code on my phone, telling the App how much I wanted to spend and then just filling up without going in to the shop.

Shell call this “Fill up & Go” and it’s being rolled out across the UK later this year.

Shell Fill and GoI discovered this by reading a card attached to the pump that I was using, it had a picture attached to it, not unlike the one here with the added message that there was more information “in store”

When paying for my fuel, and successfully avoiding temptation, I picked up a leaflet that answered a lot of my questions and which told me “If you want to be one of the first to use it, visit our website to register your interest, www.shell.co.uk”

So, when I reached my destination, I went to www.shell.co.uk and was instantly, and automatically, sent to www.shellsmart.com where I learned I could get a Shell loyalty card, find out more information about Shell’s “Partners” and other information but NOTHING about paying at the pump via PayPal

So, I scrolled down the ShellSmart page and found a link to Shell.co.uk and finally managed to reach the Shell website.

I expected to see information about “Fill up & Go” front and centre, but it wasn’t.

Where was it? I still don’t know, I scrolled down the page, I clicked on some links, I read some text and finally gave up in frustration. What a waste of time.

Why couldn’t Shell have had info right in front of my eyes or used a dedicated URL on their leaflet, www.shell.co.uk/FillAndGo for example?

Not difficult, not even clever but it would certainly have saved me from frustration and meltdown with yet another corporate entity which has a good idea but fails in the execution.

Are you watching Meerkat through your Periscope?

Meerkat and PeriscopeOver the past couple of weeks there’s been quite a lot of chatter in a variety of media channels about two relatively new Apps, called Meerkat and Periscope.

They both do the same thing, enabling you to broadcast live video (streaming) from your iPad or iPhone. Meerkat has an Android App under development and I’m sure Periscope won’t be too far behind with Microsoft and Blackberry probably following later.

One way of thinking about both Apps is as though they offer live video selfies although there’s a lot more to them than that.

Although Meerkat was first to market, Periscope was quickly snapped up by Twitter and so quickly generated a great deal of interest. Both apps are available through the iTunes store and are easy to download.

So, what are they, who are they, how do they work and what do they do?

Once you have downloaded your App and signed in through Twitter – yes, you have to have a Twitter account because that’s where your broadcast is published, all you have to do is to point your camera at your topic of interest and start broadcasting.

As soon as you start broadcasting, a Tweet is sent to all your followers so that they can tune in and watch your stream.

What do people stream?

Business tips, health tips, recipes and cooking, news and updates, views from around the world and TV broadcasts – the recent Pacquiao / Mayweather bout was live streamed by someone pointing their iPhone camera at the TV and causing great angst among the Pay Per View broadcasters because they were charging £20 in the UK whilst App users could watch it for free.

What are the drawbacks

Well, it’s another Social Media channel that you might have to pay attention too, but more importantly there’s the potential cost. If you are streaming on Wi-Fi then you’re OK but if you’re broadcasting on 4G then you might find that you eat through your data allowance pretty quickly and, if you are not careful, even run up some hefty data charges

So, is it a game changer?

It’s really too early to say, the Apps have only been around a couple of months. A lot of tech journalists have used them to stream from major tech shows, product launches and demos, just like live news broadcasts and just like any live broadcast you have to watch it live or miss it.

In my opinion, it’s certainly one-to-watch and if you have any questions, please don’t hesitate to get in touch

When “now” is too late!

Fire Escape SignLast week saw an underground fire in Holborn, London, lead to the cancellation of a number of West End shows, costing theatres thousands in lost revenue.

More than 1,900 homes and businesses were left without electricity when the power had to be cut for safety reasons, directly affecting around 5,000 people who were forced out of their homes and offices whilst the underground fire was brought under control.

A small number of larger businesses were able to continue functioning because they had suitable contingency plans in place to cover precisely this type of eventuality. These were the ones that had back-up generators to ensure a continuity of electricity supply which enabled them to continue their activities whilst all around ground to a halt.

A small explosionSo what provisions have you made for business continuity in the event of an incident that leads to you having to vacate your offices?

Remember, this fire, although disruptive, was not classed as a “major” incident and similar issues could happen almost anywhere, at any time. Would your business cope, could it survive should you have to be evacuated, without warning.

What would be the impact on your business if you couldn’t access your office for hours, days or even weeks?

How do you manage the data and documents that are critical to the survival of your business?

Would your business be able to move seamlessly to a different location, would your key staff be able to work from home or elsewhere?

How do you manage and store the documents that are essential to the running of your business? Are they stored on your laptop/PC, on a server, back-up, in the cloud or a USB stick?

Are your clients and business contacts in a Customer Relationship Management application, on a spreadsheet, on your phone or in your head?

How about your financial records, are they saved in Excel or a dedicated software application?

Bits and BytesThere are many ways to store and manage your essential data, you just have to be sure that you can access the business critical information from a location away from your office.

Companies most reliant on data may have back-up locations, complete with computers and data connectivity that they can move key personnel to, ensuring that service and continuity continues with the shortest of interruptions.

Smaller businesses might have file servers storing their data attached to their network with back-up devices regularly creating copies with the back-ups being taken off-site.

Micro-businesses and sole traders could make effective use external hard-drives, whether attached by USB or shared on a network, automatically cloned to one of the numerous, and inexpensive, cloud data services.

Remember, it’s too late to do anything about business resilience once an incident has started.

We all need more visits to our websites…..

It’s true isn’t it – we all need more visits to our website because more visits = more opportunities which equate to more inquiries which lead to more sales – right?

Wrong
Before looking to bring in more visitors to your website, take a long, hard look at your website, if it’s not generating inquiries for you today, bringing in more visitors does not mean that they’ll increase tomorrow, they’ll just do what every other visitor does.

You need to….

  • …make sure that your content focuses on your visitors – that’s less “me” and more “you”
  • …stop talking about the things you do – you should be talking about the benefits a client will gain from engaging with you (tip – it’s the latter that people use when making their buying decisions)
  • …make sure your website is easy to navigate
  • …ensure that your site is easy to read – copy and paste key content in to read-able.com to make sure that the average reading age is no higher than 13
  • …have clear calls-to-action on every page so that visitors know what is expected of them. “Buy Now” and “Browse for More” work really well on e-commerce sites whilst “Call“, “Email“, Subscribe Now” work for more serviced focused businesses.
  • …make sure that your pages open quickly – you only have about 3 seconds to capture a visitors interest so you have to be on the ball. Google Analytics and Pingdom are valuable tools to help assess the speed of your site.
  • …make good use of your USP – that special magic that you do that sets you apart from your competition?

If you’ve nailed all of the above – then it’s time to start looking for more web traffic and I’ll be looking at this in a later post although you can get ahead of the game by exploring my website or attending one of my workshops –

What is “Negative SEO” and how could it affect my business?

Negative SEOMost of us with a website are aware of the term SEO, AKA Search Engine Optimisation – the “stuff” that you have to do to, and with, your website in order to appear as high up in the Search Engine Results Pages (SERPs) as possible, and ideally on Page 1.

In fact SEO forms a major part of my business – helping your business be easily found online.

What you might not be so familiar with is “Negative SEO” but you should be – Negative SEO is something that your competitors could do to your website, and the worst case scenario is that your site is deleted from Google’s database which would make your internet presence virtually invisible.

So, what is “negative SEO”?
BacklinksOne of key ways that Google judges the importance of your website, and where it appears on the SERPs, is based on the number of websites that link to your site and the quality of those originating sites that have published the links.

In a simplistic way, Google sees each link as a “vote” for your site and the more “votes” you have, the more popular your site must be and so it must be deserving of a higher position on Google’s results pages.

However, if any of these links come from sites that are of poor quality, are totally irrelevant or Google doesn’t like then Google will apply a penalty to your site.

Negative SEO hurts your rankingsA minor indiscretion could see any changes to your site ignored by Google, meaning that your site will slowly drift down the results as other businesses improve their sites.

An “intermediate” issue could see Google apply an active penalty – pushing your site down by 5 pages or more.

For something far more serious, such as buying links from a Link Farm (a website that sells nothing but links purely for the purpose of improving your search results) is likely to see your website deleted from Google – buying links in general, and buying from a Link Farm specifically are SEO tactics that Google simply hates.

How do I know whether I’ve been penalised
There are two key ways to know whether you’ve been penalised – the “Locking the stable door after the horse has bolted” method is simply the realisation that the inquiries that you had become used to receiving from your site have dwindled away to nothing, or that you can no longer find your website in the Google results – no matter how many results pages you look at.

Manual ActionsThis is too late, the smarter site owner/manager will be regularly logging in to the Google Webmaster Toolkit to check, among other things, the “Manual Actions” tab that can be found in the “Search Traffic” section. This is where Google will post notifications of any forthcoming penalties and also provides an opportunity for the site owner to take action and notify Google of that action

What should I be doing?
Webmaster ToolkitThe smart website owner will be regularly logging in to their Google Webmaster Toolkit and will be keeping an eye on the latest links report that can be found by navigating to “Search Traffic/Links to your Site”, clicking on the “More” option in the “Who links most” section and downloading the “Latest Links” to make sure that there’s nothing that they are unhappy with.

To be extra safe, they’ll also carry out a full Link Audit using the full list of sites which have back-links leading to their site, contacting any that are suspicious looking and asking for them to be removed. In Google Land it’s far far better to have fewer high quality links than loads of low quality links.

Alternatively, you can drop me an email, andy@enterprise-oms.co.uk or give me a call on 01793 238020 and I’ll lift all of the worry of Negative SEO from your shoulders.

The Google “Red screen of Doom”

I had a telephone call from a former client a month or so ago. He was in a bit of a panic because he was suffering from the Google “red screen of doom”. Having been in IT for a while I’m familiar with Microsoft’s “blue screen of death” but this was something that was new to me, or so I thought and so I asked for more information.

He asked me to do a search for his company on Google – which I did – and his company came top of the search results, which was good. What was less good – much less good – was the stark warning, inserted by Google, that “This site may harm your computer” .

This site may harm your computerAha, Google was warning that the website had been hacked and was now serving malware to visitors.

I switched to my Chromebook – which is impervious to all known computer malware – and clicked through to the website – only to be blocked by the “Google red screen of doom”

Google's red screen of doomAlthough there was nothing to buy on my client’s site, it did host a range of technical papers and specification sheets that were vital for his clients and this attack was already having an impact on his business. Action was desperately needed.

The site was originally built 7 years ago and nothing much had changed, including the access data required to log-in to the host. So, I logged in and saw that a number of .js files had newer dates on them than the rest of the content, confirming that the site had been hacked and a small number of files altered so that they could be used to force malware downloads on to the computers of unsuspecting visitors.

The next step was to delete all of the website files, just to be on the safe side, and create a new, simple, home page with contact details and links to the most popular PDFs so that clients would be able to access the information they required.

Next was to see what Google had found by logging in to the Google Webmaster Toolkit account for the website- www.google.com/webmaster.

There were a number of warnings relating to suspicious activity on the site that had gone unread, simply because my client had changed email addresses, was unable to access the original email account and had not updated his Webmaster Tools account with the new address.

Webmaster Tools advised of the type of threat that had been set up on the site and provided other, valuable, information along with a reporting tool that enabled me to advise Google of the actions taken to remove the threat.

Clicking “Send” was quickly followed by a confirmation message from Google that they would look at my message within 18 hours – a time frame that I thought was commendably fast. They were as good as their word and within 18 hours had checked the website to make sure it was clean and had removed all warnings and red screens of doom – my client was back up and running.

However, we didn’t leave it there. The original site was old, used old code and the web hosts weren’t the most responsive – telephone calls to their support line either went unanswered or, when answered, were as much use as the proverbial chocolate teapot and so the decision was made to move the hosting to a more secure provider and to work on a plan to develop a new website.

The moral of this tale is simple. Make sure that you use the Google Webmaster Toolkit!

It’s the only way to let Google know what you’ve done should your site fall victim to an attack, keep your Toolkit account up to date and only use a web host that you know provides good security and a decent level of support.

And please don’t think that you’re immune – small businesses are the most targeted, the presumption being that their security is weaker than measures put in place by larger organisations and there are a number of websites that I keep an eye on that are attacked many times a day. However, being hosted on a secure platform with monitoring in place means that I am kept aware of the threats and can take remedial action, if required, very quickly.

To date, none has been required.

If you are worried by the security of your website, or your IT systems, please give me a call on 01793 238020 or email me, andy@enterprise-oms.co.uk for a confidential, impartial, and free chat about your security concerns

RIP HTC One

HTC One M7About 3 weeks ago my phone, an 18 month old HTC One, just died. There were no hints, no clues it just died. The battery was nearly full, I’d not added any new apps or done anything different or unusual, it had just chosen that particular time to shuffle off this mortal coil.

I swore a little and went to Google for help and tried various arcane combinations of button presses but the phone was totally and irretrievably dead, deceased, it was no more, it was an ex-phone.

I called my mobile phone company to “explore my options”. I knew it was out of 12 month warranty and I couldn’t use “un-merchantable quality” (which I have used for a variety of out of warranty items in the past) because I’d dropped the phone a couple of times and it was showing its age.

I was informed that I was eligible for an “early upgrade”. I got a little excited and asked what that meant. It meant that I could actually buy myself out of the remaining 6 months of my contract for ” just £240″, pay “just £20” for a new phone and another £2 per month on my, now new, 24 month contract. A quick calculation showed that I’d pay more than £300 more over the life of the contract.

So, I decided t go for Plan B but I didn’t have a Plan B so turned to eBay instead.

My thoughts were to find a cheaper phone and then go back to my carrier at the end of my contract and go for a free upgrade, as we all do when contract renewal comes around..

I quickly hit a speed bump – all the phones that did what I needed them too do cost pretty close to the £300 so there wasn’t anything to gain.

Blackview CrownHowever, I did spot a lot of relatively inexpensive non-branded phones from Chinese manufacturers. There were the direct iPhone clones, Samsung Galaxy clones and even phones from a brand called HDC – guess what they did? I steered away from these and focused on phones that had a spec that matched my needs and ended up paying just over £100 for a Blackview Crown.

And it’s worked out pretty well. It has no major drawbacks or performance issues. Battery life is shorter than I am used to but I have a car and portable charger so the reality is that its not an issue. Its not 4G, but my HTC wasn’t either. The screen isn’t as good as the HTC, if you look at the specs, but its good enough in the real world and that’s what counts.

It will do until my contract is up for renewal which is when I’ll probably switch back to a more recognised brand at zero cost. The big benefit to me is that I’ll be able to choose the time that I upgrade which means that I can wait until the 2015 models are released and take my pick from one of those.

If you are really interested, here’s a detailed comparison here is a side by side comparison table.
Blackview Crown HTC One M7 Comments
NFC No Yes Did not use
4G No No
Battery Life Lasts less than a day Last a day
Camera 13Mp 4Mp More pixels does not equate to better, but it’s good enough
Screen Size 5″ 4.7″
Resolution 1280 x 720 1920 x 1080
Screen Glass Toughened Gorilla Glass I just have to make sure I don’t drop it
Touch sensitivity OK Really good
Looks Looks average Looks good
Peripheral availability Very Poor Pretty Good
RAM 2Gb 2Gb
Storage 16Gb 32GB
Micro SD Yes – to 64Gb No
Android Version Stock 4.4 4.4 with HTC Sense It’s unlikely that the Crown will be upgraded to the latest version of Android
Processor ARM Cortex A7 1.7Ghz MT6592 Quad Core 1.7Ghz Krait 300 It’s not as good as the HTC but in the real world it’s more than fast enough
Sim Dual Sim, unlocked Single Sim, locked
Sound Average Excellent speakers
Headphones Really poor Beats – Excellent
Weight 158gms 143gms
Feel OK Feels solid and well put together