AXEL Network Products:

AXEL GO - share and store files securely.

LetMeSee - photo sharing app.

  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

AXEL.org

  • Network
  • Technology
  • Applications
  • Blog
  • About
    • Team
    • Press
    • Careers
    • Patents
  • Contact Us
  • Login
    • AXEL Go
    • AXEL Cloud

Security

March 7, 2018

Looking Ahead: You Own Your Vehicle, But Who Owns Your Vehicle-Generated Data?

If we pause for a moment and think to the future of smart cars, half of us probably start daydreaming of zipping around in sleek flying machines while the other half starts eyeing their plastic model of the Batmobile hanging from the rearview mirror.

But have you ever stopped to think about what’s actually happening with the technological developments of cars? Already we have vehicles with cameras to help you back out of the driveway, touch screens installed into the dash, and the capability of calling your husband to start cooking that pizza before you get home.

We also have connected cars, which have embedded mobile broadband chips and the ability to communicate with other cars in a way that drastically reduces the number of roadside accidents.

And beyond that, we have cars that drive themselves.

As our vehicles are getting smarter, they’re also producing more data. This means your data privacy concerns are not only limited to your personal computer and the apps that your teenage daughter is using—your data privacy concerns now have to do with the car sitting in your driveway that has the capability of generating, recording, and sharing data.

It is projected that there will be over 380 million connected vehicles by 2021.

Your Valuable Data

Cars have evolved beyond basic machinery and are now becoming vehicles of data, capable of sharing where you’re going, how fast you got there, how many people went with you, and what kind of music you listened to.

With sensors and cameras being incorporated into the makeup of vehicles, they can now collect more data than ever before, and this data can be used and analyzed to make more money.

So your vehicle-generated data is the type of information that companies will want to know in order to learn how to better market their products to you, and it’s information that you want to be aware and in charge of.

As the number of data-gathering cars increases, consumers will want to become more aware of what kind of data their car is generating, as well as who keeps that type of private information.

Who Has That Information Now And Who Wants It?

Currently, data-generating vehicles are still in their early years, and it will be a number of years until most vehicles are as up-to-date, so the tug between data ownership is most heavily on the side of the car manufacturers.

But for how long? Who knows.

Without regulation, companies have access to everything within a very large sphere of people’s lives. Think of the amount of data!

And who might be eyeing your vehicle-generated data like a burger fresh off the grill?

Well, really any industry that would gain from learning about a consumer’s driving habits such as speed and regular routes, phone calls, radio or phone usage…even your personal conversations.

For example, this could include radio stations that want to better know what everyone’s listening to. It could include companies who develop car stereo systems and want to know how to cater to their technological-advancing drivers, or insurance companies tracking how many times you use your phone while driving so they can adjust your rates accordingly. It could even include car seat manufacturers who want to do a study on how fast or how carefully most parents drive, and then use that information to design their car seats and market them in a specific way.

Companies like these will want to know things like how you drive, your age, your income, what you buy, or if you have kids. This is the type of information that is pure gold for businesses because it enables them to “know” you and improve the way they market their products to you.

These days, private information is currency, and industries want it for their own gain.

Industries want to make money, and so they want your information.

Suddenly there is yet another massive data mine that consumers need to be aware of as they go about their lives. Just as you would protect your information as you use your phone or computer, now it’s incredibly important to begin thinking about where your vehicle-generated data is going and how you need to protect it.

Today, self-driving cars can generate one gigabyte of data per second, which means just five minutes of driving will produce more data than your iPhone could handle. With this amount of data being gathered, all kinds of business opportunities are arising, and before long the moneymaking data vultures will begin circling above your car.

So the next time you’re driving to work, think about the data that is being generated with every mile, every Bluetooth connection, and every radio station change—those little things we all do without thinking twice. The data your car is generating is valuable and coveted and needs to be secured and protected.

Hack Attack

Worried about your computer getting a virus? Well, what if your car was at risk too?

Yet another source of concern is the safety of your vehicle-generated data from attackers. As vehicle technology continues to evolve, the security of your car desperately needs to adapt with the times. Attackers will move on from mobile phones and laptops to the car sitting in your garage or parked on the street.

Vehicles have become gold mines, and this makes them valuable targets for hackers and malware.

No one with a smart phone or computer wants their device to be targeted for private information and details to be stolen. The same goes for today’s vehicles.

The Cost Of Convenience

Imagine this: your check engine light just turned on and you take it to a mechanic for repairs. Your repairman has access to the data stored on your car and it tells him exactly what’s wrong with it. This would revolutionize the auto-mechanic industry. It expedites the mechanic’s job and therefore saves the consumer money.

But at what cost?

We need to be aware of what we are giving away in the name of convenience.  Are the small perks worth the encroachment of privacy? Are they worth the monetization of your data?

Are they worth the very real possibility of someone analyzing every word of every personal conversation and phone call you’ve ever had in your vehicle, including that one with your spouse after celebrating your anniversary, or that one you had with your daughter after picking her up from school?

A Step In The Right Direction

In a recent proposal by a California senator, the contest between vehicle data ownership was confronted and a new bill was unveiled that would allow vehicle owners to see their car’s data and decide whether or not they wanted to share it.

This is an encouraging step in the right direction. But so much more is needed.

As consumers we need to be aware of what is happening in the ever-changing world around us. We need to be realistic in terms of how the marketplace views our data and us: money.

Protecting Your Data

It is our responsibility to hold both the automobile industry and lawmakers accountable for the protection of our rights. We need to mandate transparency from our automakers and require advancements in security and privacy. Additionally, we need to stay current with the knowledge of our rights and our legal protection as new bills are put into place.

The vehicle industry has previously had practically nothing to do with technology and little-to-no need for the security of such. Having no prior experience in this field, automakers need to begin bringing in software analysts, networking engineers, and data scientists to begin shaping the security and privacy we as consumers need.

But we also need consumers to be aware of what is going on.

We need to be aware that our vehicles are becoming data-generating machines on wheels, we need to be aware of what we are sacrificing in the name of comfortable convenience, and we need to be aware of the steps we need to take in order to protect ourselves.

Filed Under: Cybersecurity Tagged With: cars, cybersecurity, data mining, data privacy, information security, Privacy, Security, smart cars, tesla, vehicle

February 14, 2018

We’re Wearing Our Data – What Wearables and the Internet of Things Mean for Data Privacy

Dave is an average US worker.

His day starts when his smart watch buzzes gently on his wrist, and ends when it tells him he needs to get some shut eye to rack up the eight hours he needs.

Throughout the day, his smartwatch tracks his blood pressure, his heart rate, and how many steps he takes. Some days Dave doesn’t get enough sleep and he feels groggy, and other days he does more than his recommended daily amount of exercise and he feels great.

Dave likes knowing this information, just like millions of other consumers out there who have invested in wearable technology.

But while Dave and his fellow consumers might like knowing this information about themselves, they don’t want it to be captured and kept by large corporations.

Understandable, right?

However, that becomes particularly difficult when wearables rely on collecting user data in order to provide personalized programs and enhance user experience. Take Fitbit, for example, which collects data on health levels and uses that information to improve its algorithms and offer individual fitness programs.

Now, alongside the ever-increasing news about government-backed surveillance programs and data breaches, consumers are getting more and more paranoid about who has access to their data.

And, as we begin to dive into a world of wearable technology that’s with us all the time, the worry that has been simmering away is starting to bubble over.

So What Do Wearables Mean for Our Data Privacy?

Popular wearable products like the Apple Watch and the Fitbit have shifted the industry from heavily health-centered into the realms of popular culture. And, while this means that wearables can be used for a whole lot more than tracking our heart rate, it also means that the healthcare industry rules and regulations around data protection become hazy.

Sure, consumers all over the world are clamoring to get their hands on fitness trackers and smartwatches, but the vast majority of them don’t know what these devices mean for their data security.

In fact, a study released by the Center for Digital Democracy and the School of Communication at American University claimed that the health privacy regulatory system in the US doesn’t give consumers the protection they might expect when it comes to wearables.

As the wearable trend expands from people’s personal lives into their working lives and other verticals, users are becoming increasingly skeptical. Now, 82% of workers that use wearables as part of their job believe that it’s invading their privacy, while 86% think it makes them more susceptible to data breaches.

Why Wearables are Challenging Consumer Views on Data Privacy

In a report put together by the University of London and Rackspace, it was discovered that wearables boost user productivity rates by 8.5% – so yes, there are many positive points surrounding the industry.

But the increased usage of them has an impact on data privacy for two reasons.

Firstly, wearable devices increase the popularity of apps – because, well, the majority of them need an app to deliver the information from wrist (or clothing) to a screen. The problem with this is that apps are more susceptible to data breaches than general web browsing because they collect data and store it all in one place.

Secondly, wearable devices are used in real-time. They don’t need to be used in a certain place at a certain time; they can be used, wherever and whenever, which is one of their biggest draws.

This means that the devices are processing greater volumes of information at every moment the user is wearing it. This is great for the user, because they get loads more data on-the-go, and it’s also great for the wearable provider, because they’re also constantly getting their hands on data to improve and refine.

But where is the line? Where is the line between being beneficial to the user and the provider having too much information?

Let’s take a look at an example.

One of the biggest benefits of wearables is that they can be used discreetly – for the most part, they double up as fashion accessories and can blend in with any outfit.

This image has an empty alt attribute; its file name is Google_Glass_detail.jpg
Credit: Antonio Zugaldia (Wikimedia) Creative Commons Attribution 2.0 Generic

A number of casinos in Las Vegas are tapping into this benefit with a system that buzzes staff member’s wearables when a high roller walks past. When they check their smartwatch, the staff members can gather information about the high roller so they can then greet them by name.

While it can be argued that this improves the customer experience and it helps the casino get more money by targeting high rollers, who is the process more beneficial for?

And Then There Are Cyberattacks…

With any new technology the risk of cyberattacks increase. And, when wearables often connect to wireless networks, it can be a struggle to keep the system safe.

Let’s look at the numbers.

At the end of 2015, there were around 200 million wearable devices on the market. By the end of 2018, there is predicted to be around 780 million – a considerable increase in just a few years.

This shows the industry is continuing to blossom regardless of whether users are concerned about their data or not, but it also gives hackers more opportunity to steal sensitive data for their own gain.

Chief consumer security evangelist at Intel Security, Gary Davis, says that “the information that’s contained on your wearable that’s stored either on your smartphone or stored downstream on a cloud is worth ten times that of a credit card on a black market.”

This is because credit card companies are well-versed at detecting and dealing with fraud, and can make it go away pretty quickly. On the other hand, data stored on wearable devices is permanent – people can’t change their Social Security Number or their date of birth.

It’s Not All Doom and Gloom

But while there are undoubtedly increased data security risks from wearables (any kind of new technology is vulnerable to this), there are plenty of ways wearables are improving certain industries, whether it’s just enhancing customer experience in a shop or going all out and improving medical treatments for serious illnesses.

In the retail sector, store employees are increasingly tapping into the power of smartglasses to find key information about products on-the-spot. This improves the customer experience, but it also optimizes employees’ time. And, in the medical industry, smartwatches are able to monitor blood pressure and even examine a baby’s heart rate in the womb.

Which begs the question: do the benefits outweigh the data risks?

But perhaps the more pressing question is whether anything is being done to quash consumer paranoia?

In most industries there are a set of accountability laws and regulations. In the health industry, there’s the Health Insurance Portability and Accountability Act (HIPAA) which puts rules in place for what medical companies can and can’t do with data.

But the key problem is that this act, for example, only covers healthcare providers like doctors and hospitals, and doesn’t stretch as far as health-conscious wearables.

What’s the Future Like for Wearables and Data?

If predictions are right, the wearables market is only set to explode further in the next couple of years but, like with any fast-growing tech arena, it looks like there needs to be some serious thought put into how data is collected and used.

Like other industries, we might see a new rules and regulations act pop up that devotes itself to monitoring and laying down laws for the wearables industry, regardless of whether a smartwatch is being used for health reasons or to boost productivity in the workplace.

What we can be certain of is that consumer paranoia about wearables and data privacy is completely justified, but the next few years are vital for the industry to prove that it has its users at the front of the mind.

Filed Under: Cybersecurity Tagged With: apple watch, cyber attack, cybersecurity, data breach, data privacy, fitbit, Privacy, Security, smartwatch, wearables

October 11, 2017

How The Government Just Killed Your Online Privacy

You aren’t valuable. Not to online companies. From a financial point of view, you just don’t hold much value to them. The money they make from having you as a user is relatively inconsequential.

It’s shocking to hear this, but it’s a fact of how online businesses operate. And once you understand how they operate you understand your true value in this world.

You see, you as an individual are not valuable…but…the data about you is valuable.

That’s what online companies are after. Whether it’s Facebook, Google, Twitter, or the Internet Service Providers (ISP), they all want data about you.

The more data the better.

They don’t care if your name is Max Jones. They care about your hobbies and interests. They care if you have a wife and kids, and the age and gender of each kid. They care about your education, what you do for a living, and how much money you make. They care about your political beliefs. You get the idea.

Your value isn’t in you as a person but you as a compilation of data.

This is how online companies make money. They compile as much data as possible on all their users to sell to advertisers. When Nike wants to advertise online, Facebook can tell them exactly which of their users are active athletes.

If this economy were a prison then your data would be the carton of cigarettes.

Needless to say, this setup should worry you. Whether you guard your privacy like a hawk or you openly share every detail about your life, it’s disturbing that your value is based on what people know about you.

And it’s about to get worse.

ISP-y on you without your consent

ISPs are, to put it kindly, not well regarded in the consumer world. As a matter of fact, they’re the most hated companies in the country. When you overtake airlines on the hatred scale, you know you’re something special.

The FCC understood the nature of ISP’s so they previously put restrictions on them with regard to your data. The restrictions required ISP’s to explicitly get your consent before they sold your data.

It was a good idea to do this so, of course, it didn’t last long.

Now, thanks to legislation passed in Congress, ISP’s will have an easier time selling your data.  All the previous restrictions that were placed on them have now been lifted.

Yup, the most hated companies can now take your data without your consent and sell it to the highest bidder.

Who says democracy doesn’t work?

ISP’s were able to successfully argue that since Google and Facebook don’t have restrictions on selling data that neither should they. This logic doesn’t hold up well for many reasons.

For starters, Google and Facebook are free services, while ISP’s are already taking a good chunk of your money.

There’s also the slight detail that ISP’s are essentially monopolies.

If you use a website (such as Facebook) and disagree with their privacy rules then you can choose not to use them or to use another website. But that doesn’t work with ISP’s. So you’re stuck with what you’ve got.

They know you don’t have a choice and they’re taking advantage of their monopoly. No wonder they’re so hated.

Privacy advocates are understandably upset about this whole scenario. In addition to data about you personally, ISP’s are also able to sell your browsing history, app usage, and even location information.

Your options are limited.

The one time you want to reduce your value

How ISP’s make money is their concern. Protecting your data is your concern. As it stands now, the battle is between you and them. So what can you do to fight this battle?

Well, we know your value to ISP’s is based on the data you (unwillingly) provide to them. So you can look into ways to kill your value.

If they can’t get your data then they can’t sell your data.

One of the best tricks you can use is to create a Virtual Private Network (VPN). A VPN essentially adds a layer between your computer and the internet, which hides your browsing from ISPs.

Related to VPN technology, you can also use a private browser such as TOR. TOR was created explicitly to prevent unwanted access to your browsing habits.

Search engines are another problem is this world. So many of them track your search history. If you want to use a search engine that doesn’t track you then you should try DuckDuckGo.

As you can see there are many tools available to help you protect your data.

Ultimately you can’t change how ISP’s operate, and you can’t change how your value to them is based on them violating your privacy, but you can change how much data they can access.

You can control your data.

It’s a shame that it we have to take these measures but the government is enabling this system so we need to protect ourselves. Hopefully, with enough outcry, the legislation will go back to putting the restrictions on ISP’s.

After all, why would anyone want the most hated companies in America to sell your data?

Filed Under: Cybersecurity Tagged With: congress, data, government, ISP, Privacy, Security, value, VPN

September 14, 2017

Your Unlocked Phone In A Stranger’s Hand? It Might Happen When You Fly Internationally

Belts off, shoes off, keys, and pocket change in the bin.

Most of us know the routine by heart. Before we even get to the front of the line we have a security bin in our hands. It’s all become so routine it’s second nature.

On the one hand, we know it’s a complete pain but on the other hand most of us have adopted an “it’s better to be safe than sorry” stance on this matter.

When does it go too far?

When does security cross the line from vigilance to invasion of privacy?

Is it when the TSA agents are giving you the kind of pat-down that your doctor wouldn’t do? Is it when they’re grilling you about every minute detail of your trip? Is it when an agent is rifling through the unmentionables in your luggage?…

…Or, maybe, it’s when they’re asking you to unlock your smartphone?

You read that correctly. There is a staggering increase in the amount of searches where a traveler’s phone is being accessed by agents. Does that make you feel secure or  violated?

Your smartphone is an extension of your life

Do you go around handing photos of your kids to complete strangers? How about confidential company documents? What about your personal medical documents?

Now think about what you keep on your phone. There is so much personal data on our phones. Data that we want to keep private. After all, that’s why we put passcodes and use thumbprint IDs to unlock our phones.

Our phones are more than just a device to make calls. It’s the one thing most of us use every day and carry with us wherever we go.

Think about your pictures, your emails, your documents, and even your message chats.

To say that our phones hold all the information about our lives wouldn’t be an exaggeration. Spend 30 minutes looking at someone’s unlocked phone and you will gain a lot of insight into that person.

So ask yourself, how comfortable would you feel with a stranger taking your unlocked phone into a private room for 30 minutes or more?

That’s the question many travelers are asking themselves lately.

The rules that you think are protecting you aren’t

Some of you may be tempted to dismiss this as a serious concern. After all it seems like it’s an illegal action being taken by overzealous border agents. And that’s what the constitution is for.

If there’s one thing most Americans are familiar with, it’s the constitution.

The Fourth Amendment prevents illegal search and seizure.

The Fifth Amendment prevents self-incrimination.

These are some of the bedrocks of the constitution and it protects the privacy rights for Americans. It also doesn’t protect you in this case.

Yes, that’s correct. The constitution doesn’t protect you when it comes to your phone being searched when you’re flying.

How is this possible? Well, the same way most questionable actions are legitimized…by a loophole.

Decades ago the Supreme Court created an exception for border agents with regards to the Fourth Amendment. So technically they can search whatever they want and there’s nothing to stop them.

So while it would be illegal for a police officer to stop you and ask you to unlock your phone, it’s perfectly legal for a border agent to do so.

What, me worry?

As you read about this issue another temptation might be to come up with reasons why you don’t think you should worry about this.

You might say to yourself “I’m a US citizen, this only applies to non-Americans”. But unfortunately you’d be wrong about that. American-born citizens have had to turn in their phones at the border already.

As a matter of fact, according to a recent lawsuit, NASA engineers, journalists, and even military veterans (all of whom are American citizens) have recently had to unlock their phones when entering the country.

Even phones that were government-issued and might contain confidential data were subject to being searched at the border.

So no one is immune from this scrutiny.

Another thing many people might say (wrongly) to themselves is the belief that “I’ve done nothing wrong so I’ve got nothing to hide”. But it’s never that simple.

Again, think about all the information that you have on your phone. Is it possible that a friend of a friend on Facebook is a criminal? What about the people you follow on Twitter? Guilty by association, perhaps?

Have you ever made a comment, seriously or in jest, about the government or the President? What if you’re reading a fictional book about a government revolution or terrorist attack?

It might seem extreme but it doesn’t take much for something innocent to lead to further scrutiny. Suddenly your phone isn’t just taken for 30 minutes but for 10 hours.

Different story now isn’t it?

And for those of you that aren’t American and are shaking their heads and thinking “this would never happen in my country”, you might want to rethink that position. Similar scenarios have already happened in Canada and there are reports of it occurring in the UK and Australia as well.

They have the power, you have the control

This situation sucks. The bad (and obvious) news is that you’re left without a choice. Border agents have all the power in this situation and if you want to get back into the country you need to comply.

The good news is that you do have a choice in how much information they get. As we’ve been known to say around here, awareness about an issue is the first step. So now that you’re aware, you can prepare yourself.

Here are some options that you can take before your next flight:

  • Don’t take your devices with you: This might be easier said than done. But for many people going on vacation, is it really necessary to bring your phone with you?If you need to take pictures you can bring a digital camera, if you want to connect to the Internet then you can take something like an iPod that has Wi-Fi capabilities. There are alternatives to having to take your smartphone with you.
  • Restore your phone to factory settings: Just backup all the data on your phone so it’s saved securely, and once it is you can restore your phone to its factory setting for your trip. All your files and apps will be off your phone and anyone who looks at it will be looking at essentially a blank device. When you return you can restore your backup so your phone is back to the way it was before your trip.
  • Buy/rent a temporary phone: If you really need a phone on your trip you can leave your main phone back at home and grab a rental or prepaid phone in your new destination.You’ll get a number for people who need to contact you and many of them come with a data plan as well. You just use it for the duration of the trip and then return it once you’re done, or simply save it for your next trip.

Doors locked, oven turned off, private phone data secured

These solutions might seem a bit extreme but keeping your data private is not a joke. It’s just a fact of life that this is something you may encounter when it comes to flying.

It’s always important to be prepared and aware whenever there’s a situation where your private data might get accessed by someone you wouldn’t want. Unfortunately this is where we’re at in society.

For better or worse security has taken us here, so it’s up to us to determine how much information we want to give up.

Ultimately it’ll be up to each individual to decide if they’re comfortable handing an unlocked phone to a complete stranger or not.

If this is something you aren’t comfortable with then at least you know what you’re up against and you can take whatever steps you need.

Traveling comes with enough stress and anxiety, and the last thing you need to worry about is an invasion of privacy. By taking these steps you’ll be ensured that your vacation is smooth sailing all the way.

Filed Under: Tech Tips Tagged With: border agents, data, flying, international, phone, Privacy, protect, search phone, Security, smartphone, Travel, TSA

July 27, 2017

Too Many Cloud Companies…Too Few Good Ones

So. . .just how many cloud companies are there?

Since the advent of the smartphone (thanks Apple) cloud companies are popping up on every virtual corner, much like Starbucks did early on.

In my quest to see just how many cloud companies there are, I figured I’d start with a simple Google search.  Right?  I mean Google is the best for this type of thing!

So, I proceeded to type “cloud companies” in a google search bar. 133,000,000 results in just 0.47 seconds.  Yep…I’m that guy.  I broke Google  (sorry Google!).

Ok, so that didn’t really work.

So I moved on to the Google Play store and navigated to apps.  There, I typed in “cloud” and immediately got over 200 apps flooding my screen.  I’m not entirely sure how many apps over 200 because I simply stopped counting.

Ok. . .clearly this approach isn’t working.  So how do we determine just how many cloud companies there are? And moreover, does anyone really care?

Definitely more than 3

At this point, I’ve decided to take the “Owl and the Tootsie Pop” approach (if you’re my age, you’ve seen that commercial) and just saying who cares?

Because in the end, we don’t really care about the number of companies, what we care about is what they can do for us!

As consumers, we all have our “lists” of things we seek in pretty much every aspect of our digital shopping.  My cloud list is relatively short and focuses on (1) ease of use (2) availability of my stuff (3) keeping my stuff safe and (4) being able to share and stream my stuff.

While most of these things seem relatively simple, this is where the list of cloud companies starts to get smaller.  Let’s take a brief look at these four aspects.

The cloud SHOULD be easy…so why isn’t it?

Ease of use is a key for all of us.

How many times have you gone to your app store and downloaded an app that seemed to suit your needs, only to find that you simply have neither the time nor the energy to figure out exactly how to use it?

Or, how many times have you wanted to share some photos with your grandmother and you wind up being her tech-support guru because she’s literally lost as to how to access the files you shared.

You’re not alone.  This happens to all of us.

I’m pretty much a classic tech-nerd (sans the tape on my glasses) and even I get frustrated with some of the choices out there.

Where is that file again?

And what about the availability of our files and images?

This one gets a bit tricky too because it isn’t always as simple as creating a cloud account or installing an app.

Does your app require you to upload all of your files to a single point of storage in the cloud?  Do you need to put everything on an external NAS device connected to your router at home?

Availability is mandatory for all of us, yet, achieving it can sometimes be laborious.

I mean sure, at first you tell yourself “it’ll be great to put all my files in one place, so I may as well just break down and do it”.  But soon you’re back to your old ways and you’ve got files all over the place, spread across every device you own.

Once again, you’re not alone.  I’m notoriously bad at organizing my digital life.

I have some “special” pictures…if you catch my drift

So what about keeping our stuff safe?

I’m not a snapchat or Facebook sort of guy (cause I’m in the witness protection program) but If I was, I’d want to know that I can maintain ownership and control over my images.

Let’s say you’re out taking pictures and you capture some amazing photo of a sunrise or stars reflecting off a lake.  All your friends and followers are suddenly enamored with your photographic prowess and you suddenly become a bit concerned about your ownership of your content.

Again, you’re not alone.

That’s why you see companies watermark their images all the time.  So protection of our digital content is an important aspect of our personal cloud.

If sharing is caring, then I’m a very caring person

And finally, what about the ability to share and stream?

These are hallmarks of social media.  Without the ability to share your files, the very aspect of social goes right out the window.

The ability to get those pictures to grandma safely and simply is just as important as sharing your favorite song with your best friend.

And let’s not forget the frustration of being the tech-support guru for the friends and family you share with.

Quality over quantity

Ok. . .so what’s the point of all this?

It’s simple really.  We’ll never ever know how many cloud companies are out there because as soon as we count them all, more will pop up.

But what we do know is what we need.

Make your own list of priorities for your digital lives as I did above.  Pick and choose the aspects that are important to you and you’ll find that you can quickly eliminate a great deal of companies with just a few simple searches.

And don’t forget to read the user comments in the app stores.  These folks are just like you and me.  They’re seeking something that can help them solve a need, so there’s a good chance that they’ll share something you’re also interested in.

And above all, stay safe.

Make sure you take a little time to vet the companies you choose to share your precious digital lives with.  This is your stuff, not theirs.  Make certain you get to maintain your rights to it!

Filed Under: Industry Related Tagged With: access, cloud, cloud computing, cloud storage, cybersecurity, data privacy, personal cloud, Privacy, Security, sharing, streaming

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 7
  • Page 8
  • Page 9

Primary Sidebar

Recent Posts

  • AXEL News Update
  • AXEL Events
  • Biggest Hacks of 2022 (Part 2)
  • Biggest Hacks of 2022 (Part 1)
  • The State of Government Cybersecurity 2022

Recent Comments

  • Anonymous on Five Simple Security Tricks

Footer

Sitemap
© Copyright 2024 Axel ®. All Rights Reserved.
Terms & Policies
  • Telegram
  • Facebook
  • Twitter
  • YouTube
  • Reddit
  • LinkedIn
  • Instagram
  • Discord
  • GitHub