Evidently Facebook uses our phone number to more effectively target advertising to us!
Two days ago, I suggested that you check out Steve Dotto’s video on using Google Authenticator for Facebook. Well… Steve added a follow-up video that you should watch!
I’m honored to be one of this year’s speakers at
@WordCampDFW . If you use WordPress, @WordCamp is a great place to meet other users, and developers. Don’t be intimidated! There’s something for everyone! Last year was my introduction to WordCamp; I learned a lot and met some new friends who are very active in the local WordPress community.
Note: This is the only WordCamp this year in the state of Texas. Don’t miss it! Sign up!
Well, by now, you are probably aware of the latest breach of Facebook that affects 50 MILLION users.
Yes, it’s time to update your security on that Social Media platform, regardless of whether or not you were notified that you were affected.
Steve Dotto released a really good video a couple of days ago that discusses this breach what to do about it. He suggests changing your password and setting up 2-Factor Authentication. I wholeheartedly agree! And when you change your password PLEASE don’t use a password you have ever used on any other service or form.
There are some really good tools that will generate a “strong” password for you; you only need to have a way to retrieve the password the next time you log in. The tool I use is LastPass. Yes, LastPass has had its own security issues, but because passwords stored in LastPass are encrypted – and the way they are encrypted – no one’s passwords have been stolen. LastPass is one of the best options for managing passwords.
So watch Steve Dotto’s video and change your password!
For more information about the breach, please check out CNet’s report.
I tried to attend a webinar a few minutes ago. Unfortunately, the webinar required Adobe Flash. My current computer has never had Flash installed on it. And I will not install it. Hence, I was unable to watch the webinar I was looking forward to.
Flash is old. Flash is not secure. Flash will be abandoned by Adobe soon in favor of current standards.
Now, if Adobe is abandoning its own product, why would any website developer still use it? I suspect it’s because either the developers don’t want to abandon a platform they know well; maybe they’re too lazy to learn newer things. Or perhaps the people who are paying them don’t know any better.
We know better. We care about security. And we care about the security of our clients and the people who visit their websites.
We don’t use Flash.
Are you hesitating to build your organization’s website on WordPress because you don’t think it’s secure enough or it’s too lightweight?
Think again! Here are some heavy-hitters that are using WordPress for their organization’s websites.
Security? How about the US White House!
Give us a shout and let us design a custom WordPress solution for your organization!
You may have wondered why some website addresses start with “http” and some begin with “https”. The short answer is that websites that begin with https encrypt the information between the website visitor and the computer that’s hosting the website. Web browsers (Edge, Firefox, Chrome, Safari, etc.) are beginning to flag the http websites with “This website is not secure” warnings in either the address bar or in place of the web page.
Beginning this July, with the rollout of version 68 of Google’s Chrome Browser, Google will list *all* websites still using http as “Not Secure”. Websites that still use http will still be online, but visitors will have to acknowledge that the website they want to visit isn’t “safe” before they’re allowed to access the website. Nobody wants their website to not be “safe”, am I right?
Many web hosts charge from a few dollars to several hundreds of dollars a year for the security certificates (SSL/TLS) that make the encryption possible. Since many websites are not heavy e-commerce websites that processes thousands of dollars every month, not all websites need the guarantees offered by the more expensive certificates.
Note: Some of you are already configured with a security certificate. To find out if you’re affected, just go to your website and look at the address bar. If you have a Green Lock icon and/or https://, you already have https configured for your website.
Note: For more information about security certificates, please see https://security.googleblog.com/2018/02/a-secure-web-is-here-to-stay.html)
Note: This is another “service after the sale” that we will not bill for our current clients. However, if we incur additional costs for the certificates, I will have to pass those costs along to you.
In somewhat related news, on May 25, the European Union will begin enforcing the General Data Protocol Regulation (GDPR). The goal of the GDPR is to protect the privacy of residents of the European Union. That’s good, right? So what does that mean for a small organization operating in the United States… like yours?
According to the GDPR, any company (regardless of national origin) that processes data of EU residents must implement measures to protect privacy *by default*. As it applies to you and me, if your website requests any information from website visitors (including tracking analytics and Contact Forms), they must be alerted to how that information will be used and how long the data will be retained. Even if you don’t serve EU residents directly, if your website is visited by a European resident, you are affected by this new law.
I have been looking into the issue and will put measures in place before May 25 to make sure that we’re in compliance. Note: I am not charging my clients for this “service after the sale”.
Please see https://en.wikipedia.org/wiki/General_Data_Protection_Regulation or contact your attorney for more information about how the GDPR affects your organization.
Several sources reported yesterday that WordPress runs on a whopping 30% of the top 10 Million most popular websites on the entire Internet. Also, WordPress currently powers 60.2% of those websites that run a Contact Management System (CMS). One of the sources notes that my alma mater, UNC-Chapel Hill has recently moved its website to WordPress!
This means several things:
- WordPress has a very high brand recognition.
- WordPress is powerful enough to run some of the most popular websites.
- WordPress is secure enough to run some of the most popular websites.
- WordPress continues to grow in popularity.
This is great news! It’s also chilling news. Why?
Just as we have seen with Microsoft Windows over the years, being the “800lb gorilla” means that a lot of hackers are going to take aim at discovering and exploiting vulnerabilities. And just because WordPress is powerful and secure enough to run some of the most popular websites doesn’t mean that all of those WordPress installations are as secure as they can by, including running the most recent version. And there’s the rub.
Plugins and Themes are the most vulnerable vector for malware attacks. The WordPress Core is secure… very secure… at least the most recent version is. And that is true with every new version of WordPress. Automattic, the company that writes and maintains the WordPress Core pushes out minor updates of the Core files very quickly whenever a new vulnerability is discovered in the WordPress Core. So long as the website administrator has enabled automatic updating, the website will be secured when the update rolls out. That was until the February 5, 2018 release of WordPress 4.93. The day after 4.93 was released, 4.94 was released that fixed a “serious bug” in 4.93 that disabled automatic updates.
But if your WordPress website administrator hasn’t run the 4.94 update, your website will never be automatically updated! Never.
Unfortunately, many people who have written Plugins and Themes are not as diligent with their updates as Automoattic is; some developers have completely abandoned their Plugins or Themes, either because they aren’t around anymore, they aren’t writing code anymore, or they don’t care anymore. If there is any exploitable code in the Plugin or Theme, all a hacker needs to do is find the website and load it with malware.
“But why would anyone want to hack my website?” I can tell you that many of my websites — even those that have very few visitors every month — are probed for vulnerabilities more often than they receive legitimate visitors! I have witnessed this nafarious probing increase a great deal in the past few weeks on all of the websites that I maintain.
Unless you have a static HTML “business card” webite that very rarely has changes, you need to step up to the WordPress platform! WordPress allows you to make your own content changes, letting you keep more of you money since you don’t have to call a “web guy” and pay him/her anytime you need to make content updates. Please contact me! Let me save you some serious money!
If your website is already running on WordPress and you don’t know if you’re running the most recent version of the WordPress Core, Plugins, or Themes, please contact me! Your WordPress website may already be infected with Malware!
Let me take a FREE quick look “under the hood”. If I find something, it may need a quick fix, and for a small fee ($30) for the small fix, you’ll be on your way (and I’ll even install some security measures to protect your website in the future!). If it’s more involved and needs a larger fix, we’ll need to talk for a few minutes about how much (or little!) I’ll need for the larger fix. I also offer WordPress Maintenance packages that keeps things updated for an entire year. Contact me if you’re interested!
WordPress is now powering 30% of the web. How high will it go?
I came across this article that echos other insights I have posted in the past. Oftentimes, free and cheap isn’t the most cost-effective way to do things.
Let that sink in.
Take a few minutes to read this article. Then give me a shout. Let’s talk about developing (or redeveloping) your personal blog or small organization website.
Friends, don’t be fooled by Facebook’s Onavo “protection”. It’s only an app that allows Facebook to observe your activity when you’re not on Facebook. In other words, it’s Spyware!
More information is here: http://bit.ly/2C0zWQY