Creating a New Business – Part 2

June 1st, 2020 by Shaun McNerney 2 comments »

Note: This is Part 2 of a 3 part seriesPart 1 | Part 2 | Part 3

One of the hardest things to do is to come up with a compelling idea for a new technology business. Here is the process I use to help uncover hidden opportunities.

» Read more: Creating a New Business – Part 2

FTP – Just Say No!

June 1st, 2020 by Shaun McNerney No comments »

FTP = Frustrating, Time wasting Protocol

I can remember when FTP was cool. That was back in 1999 when I was using FTP to download 1 MB files. Now I need to securely share 100MB files. When I think of FTP today I think of failures, no privacy, difficult to secure, no audit trail, and a frustrating user experience.

» Read more: FTP – Just Say No!

Email Has No Security

June 1st, 2020 by Shaun McNerney No comments »

Never think email is secure. Don’t use email to send confidential messages / files. The risk of loss is too great. There are many better alternatives to email. One alternative is Secure Messages from Bit Weld.

What are Secure Messages?

Secure Messages are an easy way to send and receive confidential messages and files (any type, large or small). Secure Messages can be sent to anyone with an email address. Secure Messages enhance email and are sent and received using a web browser and are available as an online business service from Bit Weld. So, what are the differences between email and Secure Messages?

Feature Email Secure Message
Privacy no YES
Security no YES
Certified Delivery no YES
Return Receipt    no 1 YES
Track & Confirm Delivery no YES
Large Files no YES

Security
Security is all about controlling access. Security access controls are applied to the sender and the recipient(s) and include the following:

 

   Email     Secure Message
Sender Access Controls
   Create
   Track
   Delete (cancel delivery)
 
   YES 2
no
no
 
YES
YES
YES
Recipient Access Controls
   User Identification
   Deny
   Allow
 
   YES 3
no
YES
 
YES
YES
YES

 

Email Security
Create
Limited. When you start up your email client (e.g., Microsoft Outlook) you usually have to login. Many people think email is secure because you have to login. The truth is that email has very little security. Spam is proof that there is no security when it comes to sender access controls.

Track
No. Email does not support tracking.

Delete
No. You cannot cancel delivery of an email message once it has been sent.

User Identification
Limited. Emails are delivered only to the specified recipient email addresses.

Deny
No. Access to email messages can not be blocked. If you can access the message, you can view it. When you send an email message, it is delivered across the Internet through multiple computer systems. Each system stores a copy of the message. Most of these systems are out of your control. This means access to copies of your email message are not controlled. Anyone with access to those systems can read your email.

Allow
Yes. If you can access the email message, you can view it.

Secure Messages

Create
Yes. You must login to send a Secure Message.

Track
Yes.

Delete
Yes. Secure Messages can be cancelled (deleted) at any time.

User Identification
Yes. Signatures and passwords

Deny
Yes.

Allow
Yes.

Summary
Businesses need a way to securely send confidential messages / files. Secure Messages simplify the task of sending confidential messages / files. Incorporate Secure Messages into your business today.

Shaun McNerney

Notes:
1.
Email return receipt is optional. The email recipient can choose to cancel sending the return receipt.
2. While you may need to login to create an email message, the truth is that anyone can spoof your email identity and create an email message using your address.
3. User Identification access control for email is only partially supported.
4. I am an investor in Bit Weld, Inc.

Control Your Internet Image

June 1st, 2020 by Shaun McNerney No comments »

My Internet Image

Q. What is displayed when you Google your name?
A. Your Internet image.

Wouldn’t it be nice if you could control your Internet image? (here’s mine: Google, Yahoo!)

If you’re like most people, when you search for your name you see links to sites you don’t control and information about other people with the same name.

» Read more: Control Your Internet Image