F-Secure helps customers enjoy their data when, where and how they want it

208640498_bc8f77cb87Content Anywhere from F-Secure enables operators to offer branded services to store and retrieve their data and content easily, flexibly and securely – giving expanded market reach, increased ARPU, and additional branding opportunities.

Your customers win because they can store, sync, share and access their photos, videos, documents and other data securely, from any device. They get a consistent user experience across their digital life with security based on F-Secure’s proven technology. You win through additional revenue opportunities and association of your brand.

Consumers are adopt more and more devices for daily use – from smart phones to tablets to laptops and pcs. And they want those devices to share and have access to more and more content – from simple documents to photos and videos and more. Research shows that consumers want personal cloud services and that they want to know their photos, videos, documents, and data are safe, secure, and under their control. According to our research* 68 percent of consumers are concerned about third parties gaining access to their content due to vulnerabilities in cloud storage providers’ technology, and 42 percent feel they are losing control of their content. Yet, these are issues that should be of concern for everyone!

“Content Anywhere is the world’s safest cloud,” says Timo Laaksonen, Vice President, Content Cloud at F-Secure. “We are a security company with over two decades of security expertise. Our cloud is built and managed according to proven security processes. It’s not simply an afterthought like some other services out there.”

Designed with platform openness, data portability and data sovereignty in mind, Content Anywhere can easily be configured under your brand’s look & feel, while the service platform integrates directly to your authentication, provisioning and billing systems. Further VAS services can also be launched on the platform with ease – giving you the opportunity to provide your customers with access to their precious content from any device with confidence it’s private and secure because it is offered from a brand they trust: yours.

*The F-Secure broadband survey covered web interviews of 6,400 broadband subscribers aged 20–60 years from 14 countries: France, the UK, Germany, Sweden, Finland, Italy, Spain, the Netherlands, Belgium, USA, Canada, Brazil, India and Japan. The survey was completed by GfK, 25 May–1 June 2012.

[Image by ^riza^ via Flickr]

More posts from this topic

Unbenannt-3-1

How should we deal with defamation and hate speech on the net? – Poll

Everybody probably agree that the net has developed a discussion culture very different from what we are used to in real life. The used adjectives vary form inspiring, free and unrestricted to crazy, sick and shocking. The (apparent) anonymity when discussing on-line leads to more open and frank opinions, which is both good and bad. It becomes especially bad when it turns into libel and hate speech. What do you think about this? Read on and let us know in the poll below. We do have laws to protect us against defamation. But the police still has a very varying ability to deal with crimes on the net. And the global nature of Internet makes investigations harder. Most cases are international, at least here in Europe where we to a large extent rely on US-based services. This is in the headlines right now here in Finland because of a recent case. The original coverage is in Finnish so I will give you a short summary in English. A journalist named Sari Helin blogged about equal rights for sexual minorities, and how children are very natural and doesn’t react anyway if a friend has two mothers, for example. This is a sensitive topic and, hardly surprising, she got a lot of negative feedback. Part of the feedback was clear defamation. Calling her a whore, among other nasty things. She considered it for a while and finally decided to report the case to the police, mainly because of Facebook comments. This is where the really interesting part begins. Recently the prosecutor released the decision about the case. They simply decided to drop it and not even try to investigate. The reason? Facebook is in US and it would be too much work contacting the authorities over there for this rather small crime. A separately interviewed police officer also stated that many of the requests that are sent abroad remain unanswered, probably for the same reason. This reflects the situation in Finland, but I guess there are a lot of other countries where the same could have happened. Is this OK? The resourcing argument is understandable. The authorities have plenty of more severe crimes to deal with. But accepting this means that law and reality drift even further apart. Something is illegal but everybody knows you will get away with the crime. That’s not good. Should we increase resourcing and work hard to make international investigations smoother? That’s really the only way to make the current laws enforceable. The other possible path is to alter our mindset about Internet discussions. If I write something pro-gay on the net, I know there’s a lot of people who dislike it and think bad things about me. Does it really change anything if some of these people write down their thoughts and comment on my writings? No, not really. But most people still feel insulted in cases like this. I think we slowly are getting used to the different discussion climate on the net. We realize that some kinds of writing will get negative feedback. We are prepared for that and can ignore libel without factual content. We value feedback from reputable persons, and anonymous submissions naturally have less significance. Pure emotional venting without factual content can just be ignored and is more shameful for the writer than for the object. Well, we are still far from that mindset, even if we are moving towards it. But which way should we go? Should we work hard to enforce the current law and prosecute anonymous defamers? Or should we adopt our mindset to the new discussion culture? The world is never black & white and there will naturally be development on both these fronts. But in which direction would you steer the development if you could decide? Now you have to pick the one you think is more important.   [polldaddy poll=8293148]   Looking forward to see what you think. The poll will be open for a while and is closed when we have enough data.   Safe surfing, Micke  

Sep 8, 2014
BY Micke
My_collection_of_passport_stamps

Another scam variation – advance travel payment

We all know that there are scammers on the net, actually a lot of them. The common forms of scams are already well known, Nigerian letters and advance payment scams for example. But scammers do develop their methods to fool more people. I recently saw a warning about an interesting variant where the scammers ask for advance payments for travel services. This warning involved booking.com so you should be extra careful if you have used them recently. But the advices I share here are generic and not specific to booking.com anyway. The warning I refer to is in Swedish but I’ll provide the main points here in English. Here’s what happened according to the story. Someone books a trip on-line. Booking information leaks out to scammers somehow. This could be because of a hacking incident at booking.com, a crooked employee or maybe also through a hacked customer mail account. Now the scammers contact the customer. They claim to be the hotel and require advance payment for the stay. This can be quite convincing as they know what hotel has been booked and at what dates. The payment must be a wire transfer, credit cards are not accepted. Sadly, some customers fall for this and do the payment. They never see the money again and still have to pay the full price for the hotel. Here the key differentiator from ordinary scams is that the scammers have info about a valid purchase done by the customer. This enables them to be very convincing and impersonate the hotel (or some other provider of services) in a believable way. Fortunately it is quite easy to defeat this, and many other scam attempts, with some simple rules. Always pay your on-line purchases with a credit card. Period. If this isn’t possible, shop somewhere else instead. The credit card company acts as a buffer between you and the recipient of the payment, and adds a significant amount of security. Never use wire transfers of money. Period. This is the standard method for scammers as it is next to impossible to get transactions reversed. If someone claims that no other method is available, it is a very strong signal that something is wrong. If you have selected to pay by credit card, as you always should do, then it is a strong warning signal if someone tries to deviate from that and ask for money using some other payment method. Remember that it is next to impossible to verify the identity of the other part if someone contacts you. If you get contacted like this and have any kind of doubts, you can always contact the company you bought from to verify if they really have contacted you. The risk with credit cards is that your card number may be shared with several companies, like airline, car rental and the hotel, in the case of travel booking. Each of these may charge your card. Incorrect charges may occur either by mistake or deliberately. Always check your credit card bill carefully and complain about unauthorized charges. This is some extra work, but the customer will usually get unauthorized charges corrected. And a last hint not really related to scammers. Be careful with the grand total of your on-line purchase. Travel bookers are notorious for not showing the real grand total until at a very late stage in the purchase process. It is very easy to make price comparisons on figures that aren’t comparable. If possible, prefer honest sites that show you the real price upfront. Memorize these rules and the likelihood that you will be scammed is very small. The best way to fight scam is to not take the bait. So by being careful you not only save your own money, you also participate in fighting this form of crime as you make it less profitable. If you want to do even more, share the info and help others become aware.   If you liked this post, you may also like the story about when I sold my boat.   Safe surfing, Micke   PS. The story I base this on was seen on Facebook. It is not verified, but I find it to be believable. It doesn’t really matter anyway if the story is true or not. The story is plausible and forms an excellent warning about Internet scams, which unfortunately is a widespread and very real form of crime.   Image by Ho John Lee  

Aug 22, 2014
BY Micke
alice

1,2 billion passwords stolen, but does it affect me?

You have heard the news. Russian hackers have managed to collect a pile of no less than 1,2 billion stolen user IDs and passwords from approximately 420 000 different sites. That’s a lot of passwords and your own could very well be among them. But what’s really going on here? Why is this a risk for me and what should I do? Read on, let’s try to open this up a bit. First of all. There are intrusions in web systems every day and passwords get stolen. Stolen passwords are traded on the underground market and misused for many different purposes. This is nothing new. The real news here is just the size of the issue. The Russian hacker gang has used powerful scripts to harvest the Internet for vulnerable systems and automatically hacked them, ending up with this exceptionally large number of stolen passwords. But it is still good that people write and talk about this, it’s an excellent reminder of why your personal passwords habits are important. Let’s first walk you through how it can go wrong for an ordinary Internet user. Let’s call her Alice. Alice signs up for a mail account at Google. She’s lucky, alice@gmail.com is free. She’s aware of the basic requirements for good passwords and selects one with upper- and lowercase letters, digits and some special characters. Alice is quite active on the net and uses Facebook as well as many smaller sites and discussion forums. Many of them accepts alice@gmail.com as the user ID. And it’s very logical to also use the same password, it sort of belongs together with that mail address and who wants to remember many passwords? Now the evil hackers enter the scene and starts scanning the net for weak systems. Gmail is protected properly and withstands the attacks. But many smaller organizations have sites maintained on a hobby basis, and lack the skills and resources to really harden the site. One of these sites belongs to a football club where Alice is active. The hackers get access to this site’s user database and downloads it all. Now they know the password for alice@gmail.com on that site. Big deal, you might think. The hackers know what games Alice will play in, no real harm done. But wait, that’s not all. It’s obvious that alice@gmail.com is a Gmail user, so the hackers try her password on gmail.com. Bingo. They have her email, as well as all other data she keeps on the Google sites. They also scan through a large number of other popular internet sites, including Facebook. Bingo again. Now the hackers have Alice’s Facebook account and probably a couple of other sites too. Now the hackers starts to use their catch. They can harvest Alice’s accounts for information, mail conversations, other’s contact info and e-mails, documents, credit card numbers, you name it. They can also use her accounts and identity to send spam or do imposter scams, just to list some examples. So what’s the moral of the story? Alice used a good password but it didn’t protect her in this case. Her error was to reuse the password on many sites. The big sites usually have at least a decent level of security. But if you use the same password on many sites, its level of protection is the same as the weakest site where it has been used. That’s why reusing your main mail password, especially on small shady sites, is a huge no-no. But it is really inconvenient to use multiple strong passwords, you might be thinking right now. Well, that’s not really the case. You can have multiple passwords if you are systematic and use the right tools. Make up a system where there is a constant part in every password. This part should be strong and contain upper- and lowercase characters, digits and special characters. Then add a shorter variable part for every site. This will keep the passwords different and still be fairly easy to remember. Still worried about your memory? Don’t worry, we have a handy tool for you. The password manager F-Secure Key. But what about the initial question? Does this attack by the Russian hackers affect me? What should I do? We don’t know who’s affected as we don’t know (at the time of writing) which sites have been affected. But the number of stolen passwords is big so there is a real risk that you are among them. Anyway, if you recognize yourself in the story about Alice, then it is a good idea to start changing your passwords right away. You might not be among the victims of these Russian hackers, but you will for sure be a victim sooner or later. Secure your digital identities before it happens! If you on the other hand already have a good system with different passwords on all your sites, then there’s no reason to panic. It’s probably not worth the effort to start changing them all before we know which systems were affected. But if the list of these 420 000 sites becomes public, and you are a user of any of these sites, then it’s important to change your password on that site.   Safe surfing, Micke  

Aug 7, 2014
BY Micke