(817) 439-3051

Monthly Archives: May 2018

5 Sections You Might Want to Include in Your Cloud Computing Policy
5 Sections You Might Want to Include in Your Cloud Computing Policy

Having a cloud computing policy is important if your business uses cloud services. Here are five sections that you might want to include in it.


If your business uses cloud services, it is a good idea to have a cloud computing policy. It can help ensure that the cloud services are being used appropriately and productively.

With so many different types of clouds (e.g., public, hybrid, private) and cloud services (e.g., data storage, email, backups), there isn’t a one-size-fits-all policy that companies can use. The requirements and expectations that need to go into this policy will depend on the types of clouds and cloud services being used, and a company’s IT and security practices.

Similarly, there is no single right way to present the material. The information just needs to be presented in a logical manner. One approach is to follow the organizational structure used in your acceptable use policy, adapting it where needed. When following this approach, you might want to include the following five sections in your cloud computing policy:

1. Overview Section

Some employees might not be familiar with cloud services, so you might want to begin your cloud computing policy with a section that gives an overview or background information on them. This section needs be easy to understand, even for technically challenged people. Keep it short and avoid using technical jargon.

The overview section is also a good place to state the purpose of the policy. If you are not sure of what to say, check out the purpose statements in these policies:

2. Scope Section

A cloud computing policy should include a section that notes its scope. In other words, this section should specify to whom the policy applies. Besides pertaining to employees, the policy might also apply to other groups, such as temporary workers or contractors if they use a cloud service to carry out their duties.

Some businesses also specify the types of clouds to which the policy applies. For example, they might state that the policy pertains to all types of external cloud services.

3. Policy Section

The cloud computing policy must have a section that lists the requirements and expectations associated with using cloud services. Here is a sampling of the types of requirements and expectations you might find in this section:

  • Processes that must be followed when evaluating and selecting cloud service providers
  • Legal requirements (e.g., cloud service usage must comply with all current laws and regulations, including data privacy regulations)
  • IT requirements (e.g., cloud service providers must comply with the company’s IT security and risk management policies as well as any other policies that might apply)
  • Practices that employees must follow (e.g., need to get prior authorization to open a new cloud service account specifically for business purposes)
  • Unacceptable practices (e.g., employees cannot share their cloud service passwords or use their personal cloud services for work)

4. Guidance Section

Some cloud computing policies include a section that provides guidance on how to meet the outlined requirements and expectations. For example, this section might discuss what kind of assessments must be done when evaluating and selecting a cloud service provider (e.g., conduct security and risk assessments of potential providers) and who is to perform them.

Similarly, the guidance section might discuss the process employees should follow to get a cloud service authorized for use. Companies sometimes even provide a list of pre-approved cloud services.

5. Policy Compliance Section

The compliance section is often the shortest one. That does not make it any less important, though. Besides describing how to handle policy exceptions, this section spells out the consequences associated with not complying with the cloud computing policy.

Data on Millions of Individuals and Businesses Scraped and Left Unprotected
Data on Millions of Individuals and Businesses Scraped and Left Unprotected

A data firm used web scraping to collect the data it needed to create in-depth profiles on millions of people and businesses. Discover what web scraping is and why it can both help and hurt your business.


The data firm LocalBlox is in the business of building and selling profiles of people and companies. The firm uses web scraping to collect data from various websites, combines it with other data (e.g., purchased marketing data), and then stitches the information together to create comprehensive profiles of businesses and individuals.

For example, an individual’s profile might include the person’s name, age, addresses (IP, physical, and email), phone number, job title, current employer, income level, and lifestyle information (e.g., pet owner). A company’s profile might include its name, addresses (IP, physical, and email), phone number, annual sales, year of establishment, industrial classification (NAICS), and number of Facebook Likes. LocalBlox sells these profiles to anyone interested in using them for targeted advertising, political campaigning, or other purposes.

The firm had stored the profiles — and the 48 million data records used to create them — in a storage container (aka bucket) in the Amazon Simple Storage Service (Amazon S3) public storage cloud. Even though this bucket was unlisted, a cyber risk team found it and discovered that it was not protected with a password. As a result, the team was able to access the data, which was in human-readable format. After the team notified LocalBlox about the issue, the firm secured the bucket.

Anyone could have downloaded the buckets’ contents when it was unsecured, just like the cyber risk team did. It is unknown whether or not any hackers took advantage of this situation. In either case, this incident highlights the importance of companies password-protecting any data they store in the cloud. It also calls attention to a common practice that businesses need to be aware of: web scraping.

Web Scraping 101

To collect publicly available content from websites, people use a process called web scraping. Typically, it involves using bots and other automated technologies to extract data from sites. Search engines use this process to return and rank search results.

Firms like LocalBlox also use web scraping to collect data for marketing, data mining, and other business uses. Based on the types of information found in the profiles, LocalBlox likely scraps data from businesses’ websites, social networks (e.g., LinkedIn, Facebook), and other types of sites.

Is It Legal?

Web scraping is usually done without the knowledge or consent of the people whose data is being collected. Although this might sound illegal, there are no laws against it in many parts of the world, including the European Union and the United States. However, any company scraping EU citizens’ data needs to comply with the General Data Protection Regulation (GDPR). The requirements include getting citizens’ consent to collect, process, and store their personal data. Plus, companies must provide an easy way for people to withdraw their consent. Since bots scrape large amounts of data automatically, meeting GDPR requirements might prove very difficult.

In the United States, there have been a few court cases dealing with using scraped information for data mining. In a notable 2017 case, a small firm, hiQ Labs, sued Microsoft when the software giant ordered the company to stop scraping the data publicly posted by LinkedIn users. The judge ruled that Microsoft must let hiQ Labs scrape this LinkedIn data — a decision that Microsoft is appealing.

Web Scraping Can Be Both Helpful and Harmful

Web scraping can be beneficial. It lets your business be included in search engine results. However, it has the potential to cause harm as well. Firms might use the data they collect for illegal or unethical purposes, such as stealing copyrighted data or undercutting prices. In addition, cybercriminals might also scrape websites to get information for use in cyberattacks. Thus, it pays to take a few precautions:

  • Be mindful about what you post on your business’s website and on social media sites (e.g., your company’s LinkedIn or Facebook page). Assume any information you provide on your website and on social media sites will be gathered, sold, and possibly used for illegal or unethical purposes.
  • Create a social media policy to help guide employees on what is acceptable when it comes to talking about your business on their personal social media pages. Asking employees to use common sense when posting online can go a long way in helping protect your company while preserving their legal rights.
  • Consider using technology to guard against malicious web scraping. Solutions are available that can analyze web traffic to identify malicious bots by looking at their IP addresses, their behaviors, and other indicators. We can help you determine whether such a solution is warranted for your business.
What You Need to Know about Progressive Web Apps
What You Need to Know about Progressive Web Apps

Progressive web apps (PWAs) give businesses a third option when it comes to interacting with mobile devices users. Discover what PWAs are and the advantages of using them.


If you haven’t heard much about progressive web apps (PWAs) yet, that’s about to change. Although Google introduced them back in 2015, these apps are only now being thrust into the limelight, thanks in part to Microsoft’s official support for them in the Windows 10 April 2018 Update. Here is a quick rundown of what PWAs are and the advantages they offer.

PWAs Explained

Until a few years ago, businesses that wanted to connect with mobile device users had two choices: offer a native mobile app or create a mobile website. Nowadays, there is another option: provide a PWA.

PWAs are basically mobile apps delivered through web browsers, according to mobile solution experts. They include advanced technologies, the most notable of which is the service worker. According to Google, a service worker is a script that web browsers run in the background, separate from a web page. This script is what makes many of the PWA’s unique features possible.

The Google Chrome web browser has supported service workers for quite some time. Microsoft Edge also now supports them, thanks to the Windows 10 April 2018 Update. And Apple quietly added service worker support in Safari in the March 2018 release of iOS 11.3.

The Benefits of Using PWAs

Because PWAs use service workers and other advanced technologies, they offer several advantages, including:

  • PWAs have app-like qualities even though they run in a browser. For example, PWAs run in a separate window like native mobile apps do.
  • They can run offline.
  • PWAs usually load much faster than native mobile apps or mobile websites.
  • The same PWA typically works on any browser that supports the PWA’s underlying technologies (e.g., service workers).
  • You do not need to download and install a program from an app store to use a PWA.
  • PWAs update themselves much in the same way a web page updates when it is refreshed. As a result, users do not have to update PWAs like native mobile apps. This makes PWAs easier to use and often more secure, as many mobile device users to do not regularly update their apps.

How Your Business Can Take Advantage of PWAs

Because of the benefits they offer, the popularity of PWAs is expected to increase rapidly. Companies such as Twitter, Forbes, and Google Maps already offer them. Even if you do not want to create a PWA to use to engage your customers, you might find them to be a useful tool in your own operations. For instance, you might use Twitter’s PWA, Twitter Lite, to post and respond to tweets about your business.

How to Troubleshoot Google Service Outages
How to Troubleshoot Google Service Outages

When a cloud service suddenly stops, people often wonder “Is the whole system down?” The G Suite Status Dashboard can answer this question when a Google service is interrupted. Here is where you can find this dashboard.


Just like in a power outage, when Gmail or another Google service suddenly stops working, your first thought is likely “Is it just me or is the whole system down?” Unlike a power outage, you cannot simply look out your window to see whether neighboring buildings are experiencing a Google service outage. You can, however, check the G Suite Status Dashboard. It provides the status of more than 20 free and paid Google services, including Gmail, Google Docs, and Google Drive.

To access the dashboard, you just need to go to https://www.google.com/appsstatus#hl=en&v=status in your favorite web browser. This URL is not easy to remember, so you might want to bookmark this page.

In the “Current Status” column of the dashboard, you will see the services listed. Next to each service is a visual indicator of its status. A green indicator means that the service is running without any issues. When the indicator is red (service outage) or orange (service disruption), there is problem on Google’s end. During a service disruption or outage, Google typically provides information about the issue and when it is expected to be resolved.

G Suite Status Dashboard also includes a history of the service disruptions and outages that occurred the past two months. This can come in handy if you are experiencing recurring problems. For instance, if you are regularly having problems staying connected to your Gmail account, you can check the history to see whether there were any service disruptions or outages on those days. If you find that there were not any issues on Google’s end, we can troubleshoot and fix the problem for you so that you can work without disruption.

5 Ways the Windows 10 April 2018 Update Can Help You Be More Productive
5 Ways the Windows 10 April 2018 Update Can Help You Be More Productive

Microsoft has released the first major 2018 update for Windows 10. Here are five features that can help you and your employees work more efficiently.


On April 30, Microsoft officially released the Windows 10 April 2018 Update (formerly known as the Spring Creators Update). It is the first of two major updates expected in 2018. Microsoft will start rolling it out through the automatic update feature in Windows Update on May 8. Microsoft also offers a way to manually initiate the download and installation process.

The Windows 10 April 2018 Update contains many new features and enhancements. Here are five features that can help you and your employees work more efficiently:

1. Focus Assist

If you have been using Windows 10 for a while, you likely have seen notifications popping up in the lower right corner of your screen. Besides being distracting, they block a portion of the screen, which might force you to stop working.

Once the Windows 10 April 2018 Update is installed, you will have much more control over these notifications. The update renames and significantly expands the functionality of the little known Quiet Hours feature. Now called Focus Assist, you can use this tool to block unwanted notifications and alerts so that you can work more productively.

You can choose what kinds of notifications you want to receive using three modes:

  • “Off” (get all notifications)
  • “Priority only” (only get notifications from the apps and contacts that you specified on your priority list)
  • “Alarms” (block all notifications, except alarms)

You also have the ability to set automatic rules. For example, you can schedule the “Priority only” mode to kick in from 1 pm to 5 pm each day.

2. Timeline

Instead of having to dig through folders to find a report you worked on last week, you can use the new Timeline feature to quickly find it. Timeline shows you what activities and apps you have used on your computer in the past 30 days and lets you resume working on them with a single click.

If you use a Microsoft account to log into multiple Windows 10 computers (e.g., laptop, desktop), Timeline will include your activities and apps across all those machines. You can even see what you were working on in Office 365 and Microsoft Edge on your smartphone or tablet and resume those activities on your Windows 10 computer by clicking them.

3. Nearby Sharing

With Window 10’s new Nearby Sharing feature, you and your employees can share files, contacts, and websites over a Bluetooth or Wi-Fi connection. To help make the process painless, Windows 10 automatically determines and selects the fastest way to share an item (Bluetooth or Wi-Fi).

You can also use Nearby Sharing to quickly transfer files between the computers you use, provided you use the same Microsoft account for those devices. For instance, you might send a file you created on your laptop computer to your desktop PC. If you want to use the Nearby Sharing feature for this purpose only, you can configure it to only share items with your devices.

4. Startup Apps Page

A new Startup Apps page in the Settings tool lets you easily specify which apps Windows 10 should automatically launch when you log in. This can be a time-saver if you run certain apps every day. For example, you might have your email app, web browser, and word processing software automatically open whenever you log in. Windows 10 is able to launch both Microsoft and third-party apps during startup.

5. Support for Progressive Web Apps

The April 2018 Update is adding support for progressive web apps (PWAs) in Microsoft Edge. Put in the simplest terms, PWAs are mobile apps delivered through web browsers, according to mobile solution experts. Examples of PWAs include Twitter Lite and Google Maps Go.

The advanced technologies integrated into these apps offer users some notable advantages. For example, PWAs typically load much faster than native mobile apps or mobile websites. Plus, PWAs update themselves, so you do not have to do it, which saves times.