Bitcoin’s Biggest Increase in Value in 3 Years Fuels Renewed Optimism

The growing optimism for the future of the web-based crypto-currency ‘Bitcoin’ received another boost this week as the value of 1 Bitcoin jumped above $1,000 (£815) for the first time in three years.

Performed Better Than Central-Bank-Issued Currencies.

On Sunday, the digital currency’s 2.5% increase in value helped it to not only reach a three-year high but its 125% boost in value for 2016 also meant that it performed better than all other all central-bank-issued currencies.

No Central Authority.

Bitcoin has no central bank control and this makes it attractive to individuals, organisations and governments who want to move funds across the globe quickly and anonymously, and who want to get around any capital controls.

Since its introduction (in 2009), Bitcoin has cut out the need for central banks which has led to allegations and suggestions that it would be particularly attractive to the criminal element of society. The fact is, however, that Bitcoin is now looking like a viable alternative to cash for countries that have a shortage of it (e.g. India, which had high denomination bank-notes removed from circulation in November).

Doing Well Until Hack.

The last great high of Bitcoin’s value was back in late 2013 where it reached $1,163 (Bitstamp exchange). At this point, the currency had experienced a tenfold increase in its value in only two months. Unfortunately, a hack caused the value to topple again on the Tokyo-based Mt. Gox exchange to less than $400 in the following weeks.

Same Value as a FTSE 100 Company Now.

Bitcoin has experienced a big boost in its value in recent months to the point where its total worth of $16 billion is around the same value as that of a FTSE 100 company.

It is estimated that at this record-high point in its growth, 12.5 Bitcoins are added to the system every 10 minutes. Despite its current value, some currency analysts say that Bitcoin’s biggest daily moves of 10% 2016 make it still a bit of a volatile currency compared to many others.

Why the Rise in Value Now?

Currency experts attribute the big rise in Bitcoin’s value to a big increase in demand in China due to the fall in the value of the Yuan in 2016. This has been the Chinese currency’s weakest performance in more than 20 years.

What Does This Mean for Your Business?

For businesses, Bitcoin has many attractive advantages such as the speed and ease with which transactions can take place due to the lack of central bank and traditional currency control.

Using Bitcoin also means that cross-border and global trading is simpler and faster and the ‘crypto’ aspect of the currency makes it secure. Bitcoin’s decrease in volatility in recent years plus the widening of popularity and potential uses for its underlying technology ‘Blockchain’ mean that Bitcoin looks likely to look increasingly attractive to businesses and governments in 2017.

Obama Retaliates By Expelling 35 Russian ‘Spy’ Diplomats

The outgoing US President Obama has commenced the public aspects of retaliation for the alleged Russian hacking of (and interference with) the US presidential election by expelling 35 Russian diplomats from the country.

What Happened?

The US government under President Obama claim that Russia took part in state-sponsored interference in the US presidential election, with the apparent intention of helping Donald Trump make it to the White House. Suspicions of the activities were voiced back in August 2016, even though more details of the alleged hacking didn’t appear until October.

One of the main alleged state-sponsored data theft and disclosure activities was the hacking of Hillary Clintons’ emails. Additionally, the (alleged) state-sponsored activities included hacking of emails from the account of Mrs. Clinton’s campaign chairman, leaked emails forcing the D.N.C. chairwoman to resign, leaked documents stolen from the Democratic Congressional Campaign Committee, and outlets created by hackers on the internet to make the Democratic documents public.

Statement Orders Actions.

A statement by President Obama was posted on the White House website on 29th December outlining some of the actions that the U.S. plans to take in response to what has been described as “malicious cyber activity and harassment”.

In the statement, President Obama talks about data theft and disclosure activities that he believes “could only have been directed by the highest levels of the Russian government”, as well as describing the harassment of U.S. diplomats in Moscow by Russian security services and police in recent times.

The Expulsion.

In Obama’s statement, he outlined the sanctioning of 9 entities and individuals. This was followed by the expulsion from the US of 35 “intelligence operatives” who were declared “persona non grata” and then given 72 hours to leave the country.

The Response.

In addition to Mr Trump’s denial that his campaign was helped by Russian interference, one apparent response has been the closure of the Anglo-American School of Moscow which serves children of US, British and Canadian embassy personnel. Its closure means that it would more difficult for the US to post diplomats and their families in Moscow.

Lame Duck.

One public and derisory response also came from the Russian Embassy in London which tweeted a picture of duck with the word LAME written across the bottom and it described President Obama as “hapless”. The tweet stated “President Obama expels 35 (Russian flag) diplomats in Cold War déjà vu. As everybody, incl (US flag) people, will be glad to see the last of this hapless Adm".

What Does This Mean For Your Business?

One thing that this story should do for businesses is to act as reminder of the importance of keeping IT, cyber and data security measures up to date. Although these were allegedly ‘state sponsored’ hackers, it demonstrates that not even governments and secure state institutions are completely safe from cyber crime. State-sponsored cyber attacks could also take the form of other disruptions to business and the economy.

Why Water Resistant Mobile Device Sales Are Up

A report by IDC has revealed that the fact that water damage is common and yet it is not covered by insurance policies is the reason why sales of water resistant mobile devices have increased so significantly in 2016.

Water Damage = No Payout.

IDC’s European Quarterly Mobile Phone Tracker report has lifted the lid on an experience that is surprisingly common among mobile device users i.e. you are relatively likely to drop your mobile device in water / get your mobile device wet and then not receive an insurance payout if it is damaged as a result.

Big Increase in Sales For Water Resistant Devices.

The IDC report shows that sales of water resistant devices were up a massive 45% year-on-year in the first nine months of 2016. In fact, water resistant devices actually accounted for a substantial 23% of devices sold last year.

During the same period, sales of devices without the feature were found to be down 17%. This second statistic dispels the idea that it’s just a case that more phones are now water resistant, and it is an indicator that consumers place a possible deal-breaking value on the feature.

Accidental Water Damage Very Common.

Figures show that water damage to mobile devices is surprisingly common. IDC estimated figures show that as many as 100,000 smartphones are destroyed by liquid damage every single day in Western Europe. The cost to consumers (and potentially insurers) is therefore likely to be more than $10.7 billion (£8.5 billion) a year!

IDC figures also show that the vast majority (95%) of damage to smart phones is accidental anyway.

Most Manufacturers Offer Feature in One Model.

The response to an increase in customer demand for a water resistant phone is the fact that most major smartphone manufacturers now appear to offer at least one model with that feature.

For example, Samsung and Huawei do, and the iPhone 7 and iPhone 7 Plus have an IP67 rating. With this rating the first number (6) indicates protection against solids, and the second number (7) indicates that the phone is capable of withstanding water immersion between 15 cm and 1 meter for 30 minutes.

Technical commentators have pointed out that advances in nano-technology and improvements in industrial design could mean that liquid damage to smartphones may soon become a thing of the past.

A Value-Adding, Differentiating Feature.

Mobile market commentators have noted that whereas some manufacturers compete on price, other manufacturers are finding that differentiating by improving the user experience i.e. resistance to liquids is a profitable strategy because more buyers now place real value on this feature.

What Does This Mean For Your Business?

As more businesses move to a model with a cloud-based centre, with communication and collaborative work undertaken in real-time via staff using mobile devices, the fitness for purpose of those devices and their ability to withstand real and common challenges appears to be increasingly important to business customers.

Spending a little more for important features such as water resistance could mean cost saving in real terms over time through avoiding the purchase of replacements due to water damage. For manufacturers and companies selling mobile devices it is an important lesson in the need to listen to and respond to real-life customer experiences and requirements in order to achieve competitive advantage and increase profits.

Could Your Smart IoT Christmas Present Be A Trojan Horse?

With the massive amounts of household, leisure items and toys that have a ‘smart’ element to them, could any of the IoT presents that you receive or give this Christmas be taken over and used by hackers in 2017?

A Big DDoS With IoT.

Back in October this year, cyber criminals were able to take over many thousands of household ‘Internet of Things’ (IoT) devices, and use them together as a botnet to launch an online distributed denial of service (DDoS) attack (Mirai) on the DNS service ‘Dyn’ with global consequences. The devices included things like white goods, CCTV cameras and printers, and the major platforms that were put out of action by the attack included Twitter, Spotify, and Reddit.

Only 2 months down the line many of us will be giving and receiving IoT devices as Christmas presents that are just as vulnerable to being taken over and used by hackers for attacks in the coming year.

Which Devices?

The kinds of smart devices that are part of the IoT and could potentially be exploited include fridges, kettles, toasters, and systems used to heat and monitor your home remotely. While smart devices and the IoT have many great benefits and great potential, they also bring security risks that are not yet fully understood.

Why Are These Devices Vulnerable?

Technical experts and commentators believe that it is not easy for manufacturers to make internet-enable devices secure because:

  • Adding security to household internet-enabled ‘commodity’ items costs money. This would have to be passed on to the customer in higher prices, but this would mean that the price would not be competitive. Therefore it may be that security is being sacrificed to keep costs down – sell now and worry about security later.
  • Even if a security problem is located in a device, the firmware (the device’s software) is not always easy to update. There are also costs involved in doing so which manufacturers of lower-end devices may not be willing to incur.
  • With devices which are typically infrequent and long lasting purchases e.g. white goods, we tend to keep them until they stop working, and we are unlikely to replace them because they have a security vulnerability that is not fully understood. As such these devices are likely to remain available to be used by cyber criminals for a long time.

What Does This Mean For Your Business?

If your business manufactures or sells smart devices, be aware that if recent months are anything to go by, consumers will begin to understand the value of security protection of their IoT devices, and it may become part of the purchase criteria in the near future.

For businesses and individuals, one simple step that we can all take to make sure that our ‘smart’ Christmas presents and other smart items are protected is to make sure that, if they have a default username and password, these need to be changed as soon as possible. Make sure that the new username and password are very secure and very unlikely to be discovered easily.

WinShock: are you protected?

We’ve already blogged on some of the recent highly publicised security threats to computer systems, such asHeartbleed and Shellshock.

One thing that brought security breaches like Heartbleed to widespread attention was the fact that they were just as potent a threat to Macs as to Windows PCs.It’s easy to panic in the face of these stories, but many of these bugs have only limited impact. Others can be potentially serious, but for a variety of reasons there are only limited opportunities to exploit them.

Now it’s Windows’ turn again; a new vulnerability has come to light which does appear to warrant pre-emptive action, and it affects many functions across Windows. Located in a fundamental component of Windows called sChannel, this new security weakness can affect both workstations and servers. There is a patch, but it has to be installed, and without it PCs remain highly vulnerable. The significant points raised in the linked article are the ‘attack surface’, which covers pretty much any unpatched Windows computer, and the proofs of exploit that have been published by web security giants BeyondTrust and IT Immunity.

Because of this, at Modalit we have decided to ensure that all of our customers’ servers are completely up to date. We started last week and we hope to be finished by the end of next week; all the work is being done out of hours. There is a small risk that the updating process will cause problems on some servers, which is something that can happen any time – but in this case the benefits outweigh any difficulties that might arise. We are taking every care to minimise any disruption.

At the same time, we strongly suggest that everybody reading this checks their Windows PCs over the next few weeks, to make sure everything is up-to-date. It appears from our monitoring that PCs are updating automatically, but this should be verified by checking manually. To do this, check Windows Update:
• Go to Start > Control panel and select Windows Update
• Click on Check for Updates and install any updates that are marked as important or critical.
• Restart the computer and repeat to make sure.

We advise our clients to get in touch if they need any help you need any assistance with this.

Stand to work: a not-so-radical solution

When you work in IT designing systems for other people to use, you are either very aware of the physical side of the experience or not at all. Becoming increasingly aware of research that blames computer use for the health problems caused by excessive sitting, our Director Iain Stewart has applied some of this awareness to his own working day, by installing a sit/stand desk.

In case you haven’t been reading the same articles, this is an adjustable desk that allows you to stand up for some of the time, and sit down when you need to. They are slowly filtering into the mainstream, and are said to reduce the risk of heart disease, contribute to the body’s need for exercise – which most of us are not getting nearly enough of – and even help to control our blood sugar levels. And it’s not a new-fangled idea: devotees of working standing up have apparently included Winston Churchill, Ernest Hemingway and Ben Franklin. Iain made his desk by buying a sit/stand stand, and fixing the top of his old sedentary desk to it.

Iain says:

The motivation to try it came from feeling it couldn’t be good to sit for the best part of eight, ten, or even 12 hours a day. Reading about it, most people who were using sit-stand sounded very happy with the change. They report being more energised, more focused. Physical improvements like reduced back pain, better posture and even reduction of chronic pain were cited frequently.

I had always felt comfortable reading the newspaper or using a laptop while standing at a bench, for example in cafes, and had often thought about introducing this to my work space. Earlier this autumn I decided I had to try it.

After quite a bit of research I decided on the Conset 501-49 frame – I already had a desk top that I liked, and this would fit it perfectly. It took me about an hour to assemble my new desk. It’s motorised, so I can go from sitting to standing at the touch of a switch. But I find I’m not using the switch very often – after six weeks of standing and never sitting, I am converted.

What’s different?  Overall I work better. I’m more focused, less tired, and much fitter. For the first couple of weeks I was a more tired by the end of the day, but that wore off quickly. Fortunately I have never suffered from significant back pain, but I have noticed that even the niggling aches have subsided, including a dodgy knee which I thought might impede my plan to stand. Also, I once read somewhere that the habit of sitting with your legs crossed is genetic, so if like me you are cross-bred, you might find this helps you kick the habit. I’m finding that the inability to spend large amounts of time in this position feels like a real positive.

If any of this makes you curious, I can only suggest try it if you possibly can. Here are some places to start:

The Cloud: part 1

1: Getting to know the Cloud

One of the most common questions we get asked by our clients is: ‘Do I need to be on the Cloud?’ When we ask them why they’re asking, it turns out that ‘the Cloud’ is a bit of a cloudy concept. We’ve all heard of it but no one’s ever seen it. As it happens, you may not have to choose whether to ‘go on the cloud’, because the Cloud is coming towards you. This blog post is part one of our introduction to the Cloud.

First, it’s not as mysterious – or as fluffy – as it sounds. The term ‘cloud’ comes from those network diagrams where the internet is depicted as a big cloud in the middle of a system of networks and computers – and this is a good way to understand how Cloud computing works, too.

Faster internet speeds and more affordable hardware are making it much more feasible for companies to use the internet to deliver services that used to take the form of boxed software or even hardware.  (Remember those CD-Rom encyclopaedias?) The internet has enabled much greater functionality, like file sharing, and syncing across devices (or subscribers). This is one of the things that is, for example, driving the trend towards more people working from home.

‘The Cloud’ includes services that lots of us use at home, like Dropbox or Google Drive for file storage, or Office 365 which includes internet access to software, or apps like Evernote – essentially a multi-media notepad, which syncs across all your devices. Most of these include a free ‘basic’ version of a service, offering simple functionality or small usage, and a business service. But what does all this mean for your business? Is it just a trend?

One feature most Cloud services will offer is the ability to share documents, folders or workflow features among a group of people; all your documents are stored in remote servers (and possibly also on your machine, so you can work offline; it syncs with the main document when you get back online). This is driving real change in how businesses work. We have clients whose staff are based in several locations and who rely on these types of services to run their businesses.

But the Cloud is also heading towards single-office-based enterprises. That annual accounting package purchase, for example, is now a flexible monthly subscription that gets automatically updated for the new financial year. Other ‘hard’ business functions are also increasingly based on the cloud – data protection, security, IP-based telephony, and synced email services are just a few.

As more providers move over to offering their services in this form, it will become less possible for a business not to be on the cloud at all; it will be more about learning how it works and what your particular needs are. More on that in our next post.

The Cloud: part 2

The Cloud: what’s in it for me?

Part 2 of our Introduction to the Cloud (see part 1 here).

Cloud computing is here to stay, at least for the duration, and with the internet getting faster, the Cloud is still getting bigger. To make the best decisions about what this means for your business, you need to understand what’s on offer and how it works. There are three main cloud service areas:

Software-as-a-service (Saas)
Instead of purchasing boxed software and licenses, you sign up for online access to it and pay a subscription based on usage or the number of users. This bit of the Cloud is making a big impact on small and medium-sized businesses – most services of this kind let you increase or decrease your package month by month, so they offer real flexibility when compared to buying extra licenses or upgrades.

Infrastructure-as-a-service (Iaas)
Rather than making a capital investment in servers and network equipment, you can subscribe to a service and pay according to the amount of resources your network consumes. The scale and cost of this kind of Iaas services make it more useful for large enterprises, but many small business are tapping into Iaas through their website hosting arrangements.

Platform-as-a-service (Paas)
This covers the operating systems, software, and anything else needed to run (for example) web, database or email services. Pricing models vary, but many are subscription-based. CRM software packages like Salesforce.com and SageCRM are good examples of platform-as-a-service, as is IP telephony (VOIP).

There are obvious advantages to a lot of this, but before deciding to migrate any of your business process to the Cloud, it’s a good idea to understand what you have at present, what you need, and what’s out there. You’ll want to assess potential pitfalls as well as potential advantages, before making a decision.

On the plus side
On the plus side, information that’s stored remotely on a massive server is much less vulnerable in, for example, a local crash. Cloud services can be accessed any time from any computer, so long as it is connected to the internet – And with many of them you download an app so you can work locally, offline.  Lots of network technologies like Outlook Web Access and Terminal Server are already available like this; the Cloud is widening it out and putting it in reach of smaller enterprises and home users.

By working on a subscription model, cloud computing has the potential to lower capital costs – because you’re not investing in hardware – and to improve cashflow by being a predictable monthly outgoing, rather than involving expensive upgrades.

It’s also flexible. Most Cloud-based services operate on a pay-per-user-per-month basis; there is no lengthy contract to bind you something you no longer need. You can increase or upgrade services quickly and temporarily, so you can be completely responsive as your business expands or contracts. For small enterprises this can make project-based work more profitable, or even possible.

But on the other hand…
Cloud computing cannot work without the internet. If your internet connection fails, or if a Cloud-based provider goes down, you will be left with no access to files unless they’re also stored locally. You still have to back up, and have a contingency plan.

With the massive expansion of the web and its functions, new security holes open up all the time. Keeping users’ information safe is a massive priority for reputable providers, but it still pays to ask: how vulnerable is your data to being ‘mined’ or otherwise inappropriately accessed? How much data are cloud companies collecting, and how might that information be used?

Once you decide to stop a Cloud-based service, who actually owns and controls your data? Is it being stored in compliance with UK data protection laws? Can you get it back? How can you be certain that the service provider will destroy your data (after you’ve retrieved it, of course) once you’ve canceled the service? It’s important to read the small print.

In short, with the Cloud as with everything else, it’s important to do your homework before making any changes to your service provision. Some services may look good, but your business may not really need them. Think about how you work, what your actual problems are, and what’s working great just as it is. Weigh up the pros and cons of each service and decide what will work best for your business.

Migrating your functions to the Cloud is not all or nothing proposition.  Some services may change so they only exist as cloud-based options, but for others there will be alternatives. Moving everything – becoming completely cloud-based – probably won’t be the most practical step, either strategically or economically. Many small businesses take advantage of Cloud computing selectively, for example, by moving anti-virus and backup to the Cloud, or by subscribing to a cloud software service instead of buying a boxed software upgrade.

If you find that some aspect or aspects of your business will work better in the Cloud, make it as strategic a change as any other change. Make sure you have a transition plan, ensure that everything is backed up and that you have full access to your information, and have a Plan B in case it turns out not to be what your business needs.

Who is watching you?

Who is watching you?

One thing we’ve been thinking about a lot lately is the way in which you’re never alone on the internet. Whatever you are doing, digitally (and yes, your loyalty card is digital), you’re being watched, tracked, and data-harvested. Various aspects of this pop up all the time: from cookie permissions that you have to tick to get to the page, to  the ubiquitous targeted ads, to the recent development of polite requests to turn off your ad-blocking plugin, we are constantly reminded that our job is to be consumers.

As Madhumita Venkataramanan wrote last year in Wired magazine:

Even as you’re reading this — you may be sedentary, but your smartphone can reveal your location and even your posture — your life is being converted into… a data package; once it has been compiled into lists (interested in technology, subscribes to magazines, probably male, professional, high earner) by intermediaries known as data brokers, it’s sold on to data aggregators and analysts and eventually any company. Ultimately, you are the product.

This is a common statement about social media. No less august a body than the EU itself recently issued a warning: ‘Leave Facebook if you don’t want to be spied on‘. They were talking not about shopping, but about the American NSA gathering data from citizens of other countries in the name of security. And America isn’t the only country that’s doing it. Web journalist Jacob Silverman coined a phrase – ‘open-source intelligence‘ – to describe how ‘secret services around the world’ are ‘mining social media and other public forums’ for data – data which we, all of us, rush to provide.

Janet Vertesi, an expectant mum, conducted an experiment: she would try to keep her pregnancy secret from all the online marketers. Her marker of success was never to have an ad for baby or pregnancy goods  targeted at her. She quickly found out that was going to be even harder than it sounded, ‘given how hungry marketing companies are to identify pregnant women‘. Suffice to say that when she bought gift vouchers with cash one time too many, for buying things anonymously online,  she ended up being threatened with the police.

For months I had joked to my family that I was probably on a watch list for my excessive use of Tor and cash withdrawals. But then my husband headed to our local corner store to buy enough gift cards to afford a stroller listed on Amazon. There, a warning sign behind the cashier informed him that the store “reserves the right to limit the daily amount of prepaid card purchases and has an obligation to report excessive transactions to the authorities.”

But what difference do your details make to anyone? There are millions of us – surely little old you can’t be that special. Vertesi’s link, above, is a chilling description of how minute the retailers’ interest in you is. John Naughton,  in the Guardian, explains how you can see it in action for yourself:

If you want to get a sense of what drives this, install theGhostery plug-in for your browser and then go and visit some of the sites you normally access. I’ve just looked up one at random – reed.co.uk, which describes itself as “the UK’s #1 job site”. It has 10 trackers at the landing-page level, but when you search for particular jobs in a particular location the number of trackers explodes. A search for “software architect” in Cambridge, for example, produces a page with 28 trackers.

There are various steps you can take to minimise your trackability.  You can tick the ‘surf anonymously’ box in your browser – but if your browser is run by a large search engine, you might wonder whether it’s really in their interests to make you truly anonymous. You can install AdBlocker or another ad-blocking browser plugin. But websites are catching onto this. We admit that we were charmed by the beautifully graphic haiku someone had thought to write for the Forbes website, but it also shows how very much they want you to let the ads in. In any case, blocking ads solves only one problem. Just because you can’t see it doesn’t mean they’re not doing it.

If you feel that simply logging out of Google isn’t quite a robust enough step, you can use a browser that doesn’t track any of your activities. Try Tor or DuckDuckGo.

And if none of this feels like enough, you can always just get rid of all your loyalty cards, pay only cash for goods, and stay completely off the web.

Good luck with that.

Web security: don’t be shellshocked

For years, it’s been assumed that Windows-based PCs were at risk of security threats, and that Linux and Mac systems were safe, because not enough people used them to make aiming viruses at them worth the scammers’ time. But the new dangers are not viruses – they’re weaknesses in web systems that all computers use. It’s this that gives them such a potentially huge impact.

The three recent security flaws to hit the news are just little corners of systems left unsecured when they were developed. The web has changed so much, in terms of both how it’s coded and how we use it, that weak spots develop as new capability develops around them.

Heartbleed was the first of the new weak spots to be discovered. It attacks the SSL algorithms that make financial data secure on the internet. Basically, it meant that websites with the hyper-secure ‘https’ prefix – the ones we use for pushing our money around the place – had a small window open in the basement. Heartbleed compromised, potentially, the users of over half a million websites, including online banks and shopping outlets. The fixes began the instant the flaw was discovered, but they are still ongoing.

The best advice we can offer is to check with all the websites you send sensitive information through – all those with ‘https’ at the beginning – and see that they’ve patched their server. Then change your passwords. To find out more, read these articles in CNET, Business Insider and Vox.

Shellshock is a flaw in the Bash shell, which is essentially the Linux or Unix equivalent of the Windows command prompt. This is a pretty basic element of the operating system; Bash has been around for over 25 years and is extremely widely used in the Linux community. The good news is this one doesn’t impact on Windows computers, but the bad news is that many of the devices that provide security defences for networks, such as firewalls, are vulnerable – along with websites. Many of these have already been patched, but businesses should check with their providers.

There are informative articles on CNET, Business Insider, and Vox.

BadUSB is the most recent flaw to emerge in the news, and it gets us where it hurts – in our phones. It’s centred on code that underlies the ubiquitous USB protocol, which malware can search for and attach itself to, only to wreak havoc when the device is plugged into another computer – your laptop, say, or a colleague’s PC. Signs are that this is an open door that can be exploited easily, and would give attackers the ability to access data on a system that’s connected to a USB. At the moment nobody really knows how to fix it, and as we all know, USB devices are everywhere. Our best advice at this stage is to limit your USB use wherever possible, especially of devices with a memory component. And remember that most devices have memory these days.

To learn more, see Business Insider and Wired.

We work hard to provide all our clients with the best possible web security. If you’re not sure yours is up to the mark, get in touch.