How Much Is a Petabyte? Find Out In The Cloud

The Rapid Expansion of the Cloud Space
The Rapid Expansion of the Cloud Space infographic

From gigabytes to terabytes to petabytes, the cloud is expanding and F-Secure is a leader in with 5 data centers on 3 continents. We secure content for millions of customers around the globe and our cloud is expanding every minute of every day.

We’ll be at the 2013 GSMA Mobile World Congress in Barcelona from February 25 through 28 to show off all of our solutions including F-Secure Content Anywhere, our flagship solution for mobile and broadband operators. F-Secure’s Personal Content Cloud enables consumers to store, sync, access and share their photos, videos, documents and other files safely anywhere, from any device.

68% of consumers are concerned about third parties gaining access to their content due to vulnerabilities in cloud storage providers’ technology, and 42% feel they are losing control of their content.*

That’s why over 100 operators around the world turn to F-Secure for security and content cloud solutions. They know they with us customers private content stays private and protected.

The content we store is scanned only for malware — never for marketing analytics and profiling.

We believe that by providing the safest personal cloud possible, F-Secure will help millions more of the 61% of broadband users who looking forward to being able to store, sync, access and share their digital lives through the cloud.

Cheers,

Sandra

*The F-Secure broadband survey covered web interviews of 6,400 broadband subscribers aged 20–60 years from 14 countries: France, the UK, Germany, Sweden, Finland, Italy, Spain, the Netherlands, Belgium, USA, Canada, Brazil, India and Japan. The survey was completed by GfK, 25 May–1 June 2012.

More posts from this topic

757935_76802214ss

What if I lose my smartphone?

Its summer and most of us are active. We are out having fun, attending events and going to new places. Its high season for losing things, like your smartphone for example. I’m not going to repeat the story about tracking services that can lock, wipe and locate your lost phone. That has already been covered. I’m also not going to talk about the black market for stolen phones, and the hilarious cases related to that. But I have started to think about how to manage if I lost my smartphone when away from home. How to recover and how to manage the situation without ruining the holiday? Here’s some of the problems that you may face if the phone is lost. You lose access to your contact register. At a time when you probably need some of the phone numbers badly. You may lose access to all your important communication channels at once, phone calls, mails, chat etc. You can’t look things up on the net and get help that way. You may have stored crucial info in the phone, like the address of your next hotel or electronic tickets. You lose your navigator that could take you where you need to go. Are you using two-factor authentication? That’s a good idea, but it makes your phone even more critical. You need it when logging in from a new location, like a hotel or an Internet cafe for example. And last but not least. Facebook!!! Hmm, yes. We seem to be quite dependent on these small gadgets. Sometimes I wish we could turn back the clock. Trash the gadgets, relax and let the journeys take weeks rather than hours. And ask strangers on the street instead of looking for directions in Google. But I guess that’s impossible so we have to accept that our smartphones are critical devices and mitigate the risk instead. Most systems that attempt to protect owners of lost devices focus on locating misplaced phones, protecting your privacy by wiping content or making the device less attractive for thieves by locking it. None of these systems are of any help when you need the services that the phone used to provide. One very old method to secure systems is redundancy, ie. have a spare if the primary fails. Maybe we have reached the point where we need two personal smartphones? One primary phone and an emergency backup phone. How would that work? If you have upgraded to a newer model, you may have the old phone lying around. And there’s already cheap smartphones on the market. So getting the spare phone do not need to be expensive. Then you have to sign up for a subscription. Choose a plan with low or zero monthly fee, a limited data plan and higher fees for the calls. That makes the cost (close to) zero when the backup phone is unused. Next you attach this phone to all your critical accounts and cloud services, like mail, Facebook etc. The synchronization features will make sure that you see your latest data when opening it in an emergency. And finally, if you use two-factor authentication you have to add the number of this phone to the services you use. Now you can turn off the phone and make sure that you can get to it when needed. If you don’t carry it with you, make sure it’s in your car, luggage or some other handy place. And make sure its battery is charged! It’s of course also good if the same charger fits both your ordinary phone and the backup. Alternative strategies could be to use family members’ phones as backup. You can register their phone numbers in your cloud services to be used for two-factor authentication or account recovery. In this case you must make sure that you remember the login and password for all your services, as you need to connect a family member’s phone to your accounts while on the road. Another strategy would be to have one common backup phone for the whole family. Just remember that this becomes a privacy problem if you connect it to all the personal accounts. Anyone who use the phone could read the others mail, make funny posts in Facebook etc. And finally. This backup phone strategy relies heavily on the benefits of cloud services. Most modern smartphones are really built to make utilization of the cloud easy. All your contacts, mails, photos and documents are available on some server, and that’s why the device really is insignificant. You can replace it and have all your data available in minutes. The downside of this is privacy. Anyone who is using, or planning to start using cloud services should do some reading first. I have written an article about this related to the PRISM affair. I’m not saying that you should avoid them, just that there is a hidden downside that you should be aware of. Safe surfing, Micke

Jul 19, 2013
BY Micke

5 New Year’s Privacy Resolutions for 2013

You've heard it all before. If you're on the Internet, you're probably being monitored. If you're using a free service, you're giving up some of your privacy as a payment. If you post something online, you have to assume that it could easily be shared with anyone with an Internet connection. But that doesn't mean you have to give up your privacy when you turn on your PC or phone. Here are 5 basic resolutions that will help you make sure that prying eyes can't get easy access to your data online. 1. I will have a strong, unique password for every account that contains private information. If you're super concerned about protecting your privacy, you'll use unique, unguessable passwords for all your accounts and update them 3-4 times a year. For your most important accounts, this is essential. But for your webmail, banking and Facebook accounts, if you have them, good password hygiene is a must. Here's a system to create strong passwords you'll remember. 2. I will go "Friends only" on Facebook. Sharing your digital life with your friends only won't guarantee your privacy -- ask Randi Zuckerberg. But it will help limit your potential leakage from private to public. Facebook isn't completely private, of course, ever. But if you want to share everything, Twitter or a blog are probably better options. 3. If I use Gmail, I will turn on two-factor authentication. If you use your Gmail for business, the extra-layer of security of two-factor authentication is essential. Just make sure that your phone also has some sort of anti-theft or Find My iPhone app installed in case a thief gets ahold of your device. You may also want to clear your Google history, if you're not interested in that existing. 4. I will log out of any account I'm not using and lock my PC and phone when it's not in use. This is just good common sense that I personally ignore on a regular basis. Not in 2013! It reduces how you'll be tracked, it makes it less likely your own accounts will be used against you. 5. I will keep my software updated. Our smartphones and PCs are actually quite secure if we keep them patched and protected with update system and security software. This, as you know, can be time consuming, so I'll update as they come up and for my PC, I'll use F-Secure's free Health Check. Happy 2013, Jason [Photo by Triple Tri]

Dec 31, 2012
BY Jason

How to Protect Your New PC, Tablet or Phone

If you're like me, whenever I get new PC, smartphone or tablet, the box is open and the screen is coming to life as soon as I get a chance. Here are a few suggestions to help you get off to a safe start from the moment you've got your system up and running. PC--Laptop or Desktop 1. Make sure you're running the most up to date software. There have likely been several system updates since your hardware was packaged and you opened it. Hopefully your system updated itself or prompted you to update as you installed. But it's always a good idea to double check. You can do go to Windows Update for your Windows machine. On a Mac, just click on the apple in the top left of your desktop and select, Software Update. You also want to make sure your other software is current and isn't leaving some hole that can be exploited by an online criminal. You can update each program one-by-one or use our free Health Check. 2. Install security software. Of course, as company that's been protecting computers for 25 years, we believe security software including anti-virus is crucial. But don't just take our word for it. Most, if not all, law enforcement agencies, governments and experts agree that you need security software if you're planning to use the Internet. So if you aren't going to use our award-winning Internet Security--which we invite you to try for free--please use another. 3. Choose a backup.Yes, we're also in the backup business because we believe it's essential to safe, smart computing. But if you aren't going to use our Online Backup, you can use an external hard drive, DVDs or some other backup solution. But as our Mikko Hypponen demonstrated in his TED Talk, a reliable backup can save the day. You may also want to: Uninstall all the programs that came on your PC as promotions if you know you won't be using them. If you're super security conscious, you should also disable all your Java plug-ins or make sure they never get enabled--unless you need them. Smartphone or Tablet After you've registered your accounts and synced your phone when possible, your mobile device is a lot like your PC. 1. Install mobile security. We also offer Mobile Security for Android that protects your smartphone and tablet from bad apps and scams that are even more tricky on mobile browsers. Some say Android is replacing Windows as the number one target of online criminals--if that happens, it will be the result of too many people not protecting their phones. Sorry, there's no iPhone mobile security available yet because Apple isn't allowing anyone to develop such apps and is relying on keeping bad guys out with its well-policed app store. But if you do not jailbreak your iPhone, it will likely be safe from bad apps. 2. Choose a backup. You can choose from a variety of backup services for your smartphone, which as you know soon fills up with irreplaceable content. You can also backup by dragging and dropping your content to your backed up PC whenever you dock your phone.  Set up your Android to save your settings regardless of what happens to your device. Just go to Settings > Privacy, and make sure that "Back up my settings" and "Automatic restore" are checked off. 3. Install Anti-Theft. It just makes sense that you're more likely to misplace your phone or tablet than your PC. But it's also simple to track your device and protect your data if it falls out of your hands. We offer free Anti-Theft. Apple offers a Find My iPhone app for free. 4. Stick to Official App Stores. If you get your apps from the official Google Play or ITunes store, you will likely never deal with a malicious app. Be sure to check user reviews and stick with software that has a proven record. Enjoy your new toy! Sandra

Dec 25, 2012