Skip to main content

Say everything, blogs are everywhere

Our title is itself a book's and the first sentence, see that after the comma, is in its front flap by journalist Scott Rosenberg. Let's take some more words from it and share here. Blogging brought the Web's native character into focus---convivial, expressive, democratic. Bloggers have become the curators of our collective experience, testing out their ideas in front of a crowd and linking people in ways that broadcasts can't match. Blogs have created a new kind of public sphere--one in which we can think out loud together. The preceding paragraph is all in the book flap, front and back. It is the simplest answer if somebody is asking what a blog is, then and now. Although we see that as the magnanimous purpose of a blog which is really enticing and challenging. It adds choices and rooms for both sources and audiences without the regular prescriptive cadence.  What's common is the responsibility. Whether or not we do it via blog, print and online news, and whoever

Maintain business domain name intact

There is one thing that organizations must do. They have to register their own domain name, make it final, and afterwards be certain that they are managing it on their own.

Digital reputation is increasingly becoming one of, if not there already, the criteria to assess how sound a business fundamental is. Really?

Imagine if you caused, or a business keep, changing its own domain name. It is more likely that customers will have a hard time finding what they want to know about how to do business with you. There is much more than just learning the how regardless if a strictly or shabbily regulated business and industry is taken into account.

And if the domain name has to be changed, don't totally abandon it. Make a redirect to the new domain name you intend to use and keep it that way for years to come. Until such time that every customer has learned about it already, and that the internet including search engines has been pointing and crawling to the new one directly and automatically, especially with the webpages.

Managing control over it meaning you must be keeping the credentials to yourself, secure and safe somewhere, and access to the domain name via your registrar and its DNS must be coordinated and monitored, accordingly, if it should be setup and configured by your vendor or service provider. Change the password once they are finished, only if no options are available and that you have to share it to them, and if you are not authenticating access or login.

Also, you must ascertain that your DNS is keeping with the latest security protocols including cryptographic certificates, like for instance DNSSEC activation and the https in your browser must have been applied regularly now, to protect your online services, either considered as crucial or not to your operation.

How often an access to the registrar and DNS service provider should be made is depending on the size and related activity of the organization, and the need to have to constantly update and add DNS records in which case the DNS itself wherever it is hosted have to be more frequently dealt with changing configurations, without mistakes, make it the rule. 

Both the business domain name and its DNS forms the highest hierarchy and language which makes the healthy structure of enterprise technology, or the voguish word the market is using nowadays, digital, chain.

Few scenarios you may be in if the above, such as control, is contrary to your present setting. It is that your

- Vendor or service provider have registered it and continue to manage or administer it for you. Administering means they decide on every bit of it and whatever they do with the Domain Name System which is a service that powers up and enables the proper functioning of your website, email, e-commerce application and more. Sometimes, they keep the domain name themselves, a red flag for the so-called business interest.

- Colleagues or employees have registered it on their names and not your company name. When they leave, it will be a burden to recover especially if personal email addresses have been used during the registration. They must have filled the required information with the name of the organization as the registrant.

Even managed service providers who has earned multi-year contract must have prepared an important reference and baseline document that will allow the owner to know what's really happening to its own digital properties. Why mistakes and customer complaints are prevalent? Such question and many more that is considered unacceptable and is in constant violation to a service level agreement must be thoroughly explained. In fact, there is no other explanation to it except it's really a bad service. DNS is one in a dozens considered to be of critical foundation to a company's digital property and when that alone cannot be addressed with almost perfection then it will never ever be fixed to such level. There is a need to find another help who can do it which should be clear from start even before the contract is exchanged with approvals, signatures and obligations that stays and cannot be repudiated, unless settled financially which is the bottom line for serious businesses, no matter the condition of the agreement.

From experience, we always have to coach clients to ask for it and get it. That the credentials including username and password if it's still being utilized, M|2FA and whatever the latest method being used like hardware key most especially, and everything related to their use of, as well as services attached to, their domain name must be turned over to them.

Don't lose it. Otherwise, somebody will, take advantage of it or, be waiting to snatch it for the different side of business which may or may not be pleasant to your business and stakeholders.

Comments

Popular posts from this blog

Philippine telcos blocking entire SMS text with internet addresses in it

If you are sending SMS texts to your friends, family or colleagues and they contain internet or web address including IP and email addresses, and even a period or dot separating, regardless of, your words and numbers, they are automatically blocked and not going to be received by your waiting recipient. Cooler heads must prevail here especially if an important message is urgently being expected. IP version 6 address is fine. However, an IPv4 including localhost address (given automatically to every computers and network interfaces as their own alone designed for troubleshooting purposes), and your money in the billion figure using dot as separators would be blocked.  If you send "local.business, naman.naman etcetera" or any words that made you use dot in between them, as part of the text, they will be blocked. There are some, that isn't blocked in this category. Like check.iclassed, some.ent, whatever.local etcetera, that is because they do not form any domain name at all

How functional and secure AES is

How functional and secure AES is? The Philippine electorate will once again go to polls and decide who will lead the nation in the next six years of their lives. This important event which will elect new president, vice president and 12 senators for national posts, and seats are also being contested for provincial, city and municipal levels, is expected to be counted unofficially in 24 hours, concluded or canvassed officially in a few days or so but authorities and observers expected it to be done in less than a week. Last presidential election, it was known three days after close of election precincts. This is especially true for nation states, not only the Philippines, that conducts their elections using automated election or computerized-and-networked voting systems. In PH, the past automated elections were encumbered with technical issues and fraudulent results, uttered and written everywhere by many concerned and affected individuals and institutions alike. This time, we could say

Philippine cyber campaign

Are Philippine institutions being targeted or simply being probed? We don't know for certain. It could be either or both. Whichever comes first? What we can understand, with the success of such attacks, is that they have found their way. Really.   How hard or easy? The attacker knows, but probably, also, those being attacked. Inclination should be there no matter how sophisticated our security systems are. In cybersecurity, we do a very focused job. Making sure we disappoint whoever is trying to gain access to any resource without permission and authority regardless of the environment we are in. What happened is that every asset deemed to have every variant of resource built-in, operating, that makes up the entire system working whatever it is trying to employ, in that case the primary purpose. Meaning, we have to know if we are running our system in a manner that is really secure, provisioned properly during design stage and managed continuously afterwards, post-implementation. No