Best Practices in Online User Authentication: an Analysis

Total Page:16

File Type:pdf, Size:1020Kb

Best Practices in Online User Authentication: an Analysis BEST PRACTICES IN ONLINE USER AUTHENTICATION: AN ANALYSIS AND SURVEY by Fatema Bannat Wala A thesis submitted to the Faculty of the University of Delaware in partial fulfillment of the requirements for the degree of Master of Science in Electrical and Computer Engineering Summer 2015 © 2015 Fatema Bannat Wala All Rights Reserved ProQuest Number: 1602374 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. ProQuest 1602374 Published by ProQuest LLC (2015). Copyright of the Dissertation is held by the Author. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code Microform Edition © ProQuest LLC. ProQuest LLC. 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, MI 48106 - 1346 BEST PRACTICES IN ONLINE USER AUTHENTICATION: AN ANALYSIS AND SURVEY by Fatema Bannat Wala Approved: __________________________________________________________ Dr. Chase Cotton, Ph.D. Professor in charge of thesis on behalf of the Advisory Committee Approved: __________________________________________________________ Kenneth E. Barner, Ph.D. Chair of the Department of Electrical and Computer Engineering Approved: __________________________________________________________ Babatunde A. Ogunnaike, Ph.D. Dean of the College of Engineering Approved: __________________________________________________________ James G. Richards, Ph.D. Vice Provost for Graduate and Professional Education ACKNOWLEDGMENTS To Chase Cotton: Dr. Cotton has given me the great opportunity to work in the cyber-security domain under his supervision, which is my field of interest. He has provided the right direction to my research and guided me throughout my master’s. I feel lucky and, I am grateful to have him as my Advisor, He helped me to choose the courses relevant to my field of study and always provided answers to my queries. When I started, I had very little knowledge in cyber-security, but Dr. Cotton helped me to grow my knowledge base and because of his incredible experience in cyber- security domain, I have learned a lot from him down the road. I would not have been able to achieve what I have achieved without him. He is an amazing mentor and a great person. To Fouad Kiamilev: Dr. Kiamilev always provided moral support and the boost required to achieve what I wanted to. The meetings with him were always focused on how to overcome weaknesses and improve the overall performance in the work environment. The weekly feedback always enhanced my quality of work, and the motivation provided always kept me going. To Willett Kempton: I would like to thank him for giving me the opportunity to work in one of the brightest research groups in the department and to be a part of a group of great individuals, who go out of their way to help anyone out. He helped me to sharpen my programming skills in parallel with my course work. It was an unforgettable experience working with the V2G group. This work was supported in part by NSF CNF FIA funding #1040614. iii TABLE OF CONTENTS LIST OF TABLES ................................................................................................... vii LIST OF FIGURES ................................................................................................. viii ABSTRACT.............................................................................................................. ix Chapter 1 OVERVIEW................................................................................................... 1 2 COMMON ATTACKS ................................................................................... 7 2.1 Motivation ............................................................................................. 7 2.2 Common Attacks ................................................................................... 9 2.2.1 Brute Force............................................................................... 10 2.2.2 Denial of Service (DOS) ........................................................... 12 2.2.3 Phishing Attack ........................................................................ 13 3 SECURITY BEST PRACTICES SURVEY .................................................. 15 3.1 Category: Password Selection .............................................................. 15 3.1.1 Applicable To ........................................................................... 15 3.1.1.1 Best Practice: Minimum Password Requirements ....... 16 3.1.1.1.1 Minimum Length Restriction .................... 16 3.1.1.1.2 Special Character Inclusion ....................... 17 3.1.1.1.3 Number Inclusion ..................................... 19 3.1.1.1.4 Upper & Lowercase Letter Inclusion......... 21 3.1.1.2 Best Practice: Disallow Common String ..................... 24 3.1.1.3 Best Practice: Account Activation Check ................... 27 3.1.1.4 Best Practice: 2FA For Login ..................................... 30 3.1.1.5 Best Practice: CAPTCHA While AccountCreation ..... 34 3.1.1.6 Best Practice: Show Password Strengthbar ................. 36 3.2 Category: Bad logins Protection ........................................................... 38 3.2.1 Applicable To ........................................................................... 38 3.2.1.1 Best Practice: Restrict Maximum Bad logins .............. 39 iv 3.2.1.2 Best Practice: Slowdown With CAPTCHA ................ 41 3.2.1.3 Best Practice: Slowdown with timeout ....................... 44 3.2.1.4 Best Practice: Bad Login ErrorMessage ..................... 47 3.2.1.5 Best Practice: No Timing Difference Loading Pages .. 51 3.2.1.6 Best Practice: Notification Of Bad Logins .................. 52 3.3 Category: Password Recovery .............................................................. 55 3.3.1 Applicable To ........................................................................... 55 3.3.1.1 Best Practice: 2FA For Password Reset ...................... 55 3.3.1.2 Best Practice: Use Of Recovery Email Address .......... 58 3.3.1.3 Best Practice: No Password Hint In Recovery Email .. 61 3.3.1.4 Best Practice: No Account Info In Recovery Email .... 64 3.3.1.5 Best Practice: No Personal Security Questions For Recovery .................................................................... 67 3.3.1.6 Best Practice: No Random emailId/Phone For Recovery .................................................................... 70 3.3.1.7 Best Practice: Timeout The Recovery URL ................ 73 3.3.1.8 Best Practice: No Part Of Email/Phone Shown While Recovery .................................................................... 76 3.3.1.9 Best Practice: Password Reset Notification ................ 79 3.3.1.10 Best Practice: Recovery EmailID/Phone Change Notification ................................................................ 80 3.4 Category: Service Authenticity............................................................. 83 3.4.1 Applicable To ........................................................................... 83 3.4.1.1 Best Practice: User Personal Security Image and Caption ...................................................................... 83 3.5 Category: Suggested New Best Practices .............................................. 85 3.5.1 Applicable To ........................................................................... 85 3.5.1.1 Best Practice: Uncommon Username For Login ......... 85 3.5.1.2 Best Practice: Mandatory Upgrade Of Password After New Password Policy ........................................ 87 3.5.1.3 Best Practice: Mandatory Password Hash Salting. ...... 90 3.5.1.4 Best Practice: Periodic Password Reset ...................... 92 4 ONLINE SERVICE PROVIDERS – A SURVEY ........................................ 94 v 4.1 The Comparison Table as of 1/20/15 .................................................... 95 4.2 Discussion on findings ........................................................................107 4.2.1 Online Cloud service providers ................................................107 4.2.2 Social Media service providers ................................................109 4.2.3 E-commerce service providers .................................................111 4.3 A Discussion on Timeout Versus CAPTCHA (study from the survey) 113 4.4 A Discussion on 2-Factor Authentication (Dropbox case study) ..........115 5 CONCLUSION ...........................................................................................117 5.1 Summary of Best Practices ..................................................................119 6 FUTURE WORK ........................................................................................123 6.1 Tool for Automated Auditing ..............................................................123 BIBLIOGRAPHY ...................................................................................................126 Appendix CURRENT PUBLISHED BEST PRACTICES ............................................129 vi LIST OF TABLES 4.1 Comparing online services with best practices: PasswordSelection ............... 95 4.2 Comparing online services with best practices: Bad P/w Attempts ................ 98 4.3 Comparing online services with best practices: Password Recovery .............101 vii LIST OF FIGURES 3.1 Minimum password requirements .......................................................
Recommended publications
  • Photos Copied" Box
    Our photos have never been as scattered as they are now... Do you know where your photos are? Digital Photo Roundup Checklist www.theswedishorganizer.com Online Storage Edition Let's Play Digital Photo Roundup! Congrats on making the decision to start organizing your digital photos! I know the task can seem daunting, so hopefully this handy checklist will help get your moving in the right direction. LET'S ORGANIZE! To start organizing your digital photos, you must first gather them all into one place, so that you'll be able to sort and edit your collection. Use this checklist to document your family's online storage accounts (i.e. where you have photos saved online), and whether they are copied onto your Master hub (the place where you are saving EVERYTHING). It'll make the gathering process a whole lot easier if you keep a record of what you have already copied and what is still to be done. HERE'S HOW The services in this checklist are categorized, so that you only need to print out what applies to you. If you have an account with the service listed, simply check the "Have Account" box. When you have copied all the photos, check the "Photos Copied" box. Enter your login credentials under the line between the boxes for easy retrieval. If you don't see your favorite service on the list, just add it to one of the blank lines provided after each category. Once you are done, you should find yourself with all your digital images in ONE place, and when you do, check back on the blog for tools to help you with the next step in the organizing process.
    [Show full text]
  • Marianne Van Den Boomen Trans Coding the Digital How Metaphors Matter in New Media
    MARIANNE VAN DEN BOOMEN TRANS CODING THE DIGITAL HOW METAPHORS MATTER IN NEW MEDIA A SERIES OF READERS PUBLISHED BY THE INSTITUTE OF NETWORK CULTURES ISSUE NO.: 14 MARIANNE VAN DEN BOOMEN TRANSCODING THE DIGITAL HOW METAPHORS MATTER IN NEW MEDIA Theory on Demand #14 Transcoding the Digital: How Metaphors Matter in New Media Author: Marianne van den Boomen Editorial support: Miriam Rasch Design and DTP: Katja van Stiphout Publisher: Institute of Network Cultures, Amsterdam 2014 Printer: ‘Print on Demand’ First 200 copies printed at Drukkerij Steenman, Enkhuizen ISBN: 978-90-818575-7-4 Earlier and different versions of Chapter 2 has been published in 2008 as ‘Interfacing by Iconic Metaphors’, in Configurations 16 (1): 33-55, and in 2009 as ‘Interfacing by Material Metaphors: How Your Mailbox May Fool You’, in Digital Material: Tracing New Media in Everyday Life and Technology, edited by Marianne van den Boomen, Sybille Lammes, Ann-Sophie Lehmann, Joost Raessens, and Mirko Tobias Schäfer. Amsterdam: Amsterdam University Press, p. 253-266. An earlier and different version of Chapter 6 has been published in 2006 as ‘Transcoding Metaphors after the Mediatic Turn’, in SPIEL 25 (h.1): 47-58. Contact Institute of Network Cultures Phone: +31 20 5951865 Email: [email protected] Web: http://www.networkcultures.org This publication is available through various print on demand services. For more information, and a freely downloadable PDF: http://networkcultures.org/publications This publication is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-SA 4.0). TRANSCODING THE DIGITAL 3 TRANSCODING THE DIGITAL HOW METAPHORS MATTER IN NEW MEDIA De transcodering van het digitale Hoe metaforen ertoe doen in nieuwe media (met een samenvatting in het Nederlands) PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit Utrecht op gezag van de rector magnificus, prof.dr.
    [Show full text]
  • Building a First Aid Kit for Data Breaches 06
    Summer 2018 (vol. 12 issue 3) | www.csae.org EXCELLENCE BY ASSOCIATION BUILDING A FIRST AID KIT FOR DATA BREACHES 06 10 AI IN YOUR FUTURE Colorado 12 BACKING UP YOUR DATA Society of Association 22 SPOTLIGHT: ALEXANDRA MERRICK Executives TAKE YOUR ASSOCIATION TO NEW HEIGHTS. Book by December 31, 2018 and choose your reward. 50 - 150 Room Nights Choose One Reward 151 - 250 Room Nights Choose Two Rewards 251 - 350 Room Nights Choose Three Rewards 351 - 450 Room Nights Choose Four Rewards BOOK JUST ONE MEETING AND MAXIMIZE YOUR REWARDS BY BOOKING TWO RECEIVE GREAT REWARDS* OR MORE MEETINGS THROUGH 2025* • 3% credit to master on actualized room revenue • 5% credit to master on actualized room revenue • 5% discount on F&B • 10% discount on F&B • 1 per 45 lodging rooms comped • 1 per 35 lodging rooms comped • 25% off resort fee • 50% off resort fee • 3 Complimentary round trip airport transfers • 5 Complimentary round trip airport transfers • Complimentary WiFi in meeting space • Complimentary WiFi in meeting space • Complimentary one-night-stay gift certificate • Complimentary two-night-stay gift certificate • Complimentary catered happy hour or coffee break • Complimentary catered happy hour or coffee break • Complimentary board meeting with F&B break • Complimentary board meeting with F&B break for up to 12 people for up to 12 people • Complimentary one-hour yoga class per guest • Complimentary one-hour yoga class per guest Visit vailresortsmeetings.com/associationpromotion to learn more VAILRESORTSMEETINGS.COM | 970.496.6557 | [email protected] VAIL | BEAVER CREEK | WHISTLER | BRECKENRIDGE PARK CITY | KEYSTONE | LAKE TAHOE | JACKSON HOLE MEETINGS & EVENTS *Offer valid for bookings contracted through December 31, 2018.
    [Show full text]
  • On Quality of Experience for Cloud-Based File Storage Services
    4th International Workshop on Perceptual Quality of Systems (PQS 2013) 2-4 September 2013, Vienna, Austria Need for Speed? On Quality of Experience for Cloud-based File Storage Services Philipp Amrehn1, Karel Vandenbroucke2, Tobias Hoßfeld1, Katrien De Moor2,3, Matthias Hirth1, Raimund Schatz4, Pedro Casas4 1University of Wurzburg¨ (Germany) 2iMinds-MICT-Ghent University (Belgium) 3ITEM-NTNU (Norway) 4Telecommunications Research Center Vienna FTW (Austria) [email protected], [email protected] Abstract (i.e. performance) and the possibility to utilize a service at all (i.e. availability of services) [2]. Yet, their relative impact on Cloud computing is receiving growing attention by researchers QoE and the role of other influencing factors, are to date poorly from a variety of disciplines. However, so far only a few studies understood. It has also been argued that in order to estimate exist that investigate the Quality of Experience (QoE) of cloud QoE for cloud storage services and applications, it is necessary services, including the category of personal file storage services to monitor network environment and conditions, terminal capa- like Dropbox or Livedrive, from an end user perspective. bilities, SLAs and service and application-specific information The contribution of this paper is a methodology and the re- [3]. However, not only such purely technical and QoS-related sults of four different user studies towards a situational QoE parameters influence QoE. It has been shown that human and model for file storage services. In order to obtain insights in context-related factors may also play a major role. In the con- existing usage practices and to detect possible QoE influenc- text of Web QoE for instance, memory effects, i.e., the psycho- ing factors and relevant features, we conducted an online sur- logical influence of past experiences [4] bear a strong influence.
    [Show full text]
  • Consumer Law Compliance Review: Cloud Storage
    Consumer law compliance review: cloud storage Findings report 27 May 2016 © Crown copyright 2016 You may reuse this information (not including logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit www.nationalarchives.gov.uk/doc/open-government- licence/ or write to the Information Policy Team, The National Archives, Kew, London TW9 4DU, or email: [email protected]. Contents Page 1. Summary .............................................................................................................. 2 2. Introduction ........................................................................................................... 8 3. The review .......................................................................................................... 13 4. Findings .............................................................................................................. 15 5. Compliance with consumer law .......................................................................... 26 6. Next steps ........................................................................................................... 44 Appendix A: Ipsos MORI consumer omnibus survey data tables ............................. 46 1 1. Summary 1.1 The Competition and Markets Authority (CMA) is committed to looking at online markets and the digital economy. The CMA’s Strategic Assessment1 highlighted cloud computing as a specific area of interest. The cloud storage services sector is a dynamic
    [Show full text]
  • EU27 Mobile Data Cost Competitiveness Report
    Still not convinced that some EU telcos are trying to foreclose the mobile cloud storage market? Rewheel/Digital Fuel Monitor public research note, 6nd June 2014 In April 2014 Digital Fuel Monitor published a list of potentially anti-competitive zero-rated apps by 8 incumbent telcos in 9 European member state markets. Zero-rated apps are telcos’ own or their partners’ applications (e.g. Orange cloud, Facebook, Spotify, etc) that enjoy a special price discriminatory treatment. The mobile data volume generated by these apps does not deplete the end-user open mobile internet volume allowance (unlike any other 3rd party apps and services). Focus on zero-rating mobile cloud storage apps In this insight we take a closer look at telcos’ own zero-rated mobile cloud storage apps in Europe. What makes the mobile cloud storage market interesting from antitrust point of view is the fact that it is a well established, growing market with billions of Euros in annual revenues. A number of big internet companies like Google, Microsoft, Apple, Amazon and a plethora of start-ups such as Dropbox, Box, SugarSync, Mozy, CloudMe, justcloud, Carbonite, livedrive, Tresorit, Hightail, TeamDrive, Infinit, etc. are fighting for consumer attention in a competitive open market. However, the mobile cloud storage market in Europe is just about to stop being open and competitive. Some European incumbent telcos are forcing consumers away from 3rd party mobile cloud storage apps (Dropbox, Google Drive, etc) by applying end-user based price discriminatory practices. While the volume generated by 3rd party mobile cloud storage apps depletes the consumers’ monthly mobile volume allowance like any other app used over the mobile network, telco’s own mobile cloud storage apps enjoy a special treatment: consumers could use the apps free over the mobile 3G/4G networks and transfer tens of gigabytes or unlimited volume.
    [Show full text]
  • Annual Icloud Storage Plans Uk
    Annual Icloud Storage Plans Uk Jessie syntonizing his papeteries conjectures forby, but ult Gershon never readvise so remarkably. Persisting and atheistic Hamlin seise, but Marven excruciatingly peptonizing her gonorrhoea. Declinable Cleland teethed very somewhat while Leonid remains Leibnitzian and Croat. Livedrive is extra usb port, the page should get some states have plans annual, software testing native vmware cloud storage providers in Use and the annual woodworking plans through a refund back up. Fi network to withdraw the best connection. Is determined where cloud storage service is fair, which use this extra storage application that storage plans uk service to connect unlimited storage to access all the. Just storage uk citizens in separate drive solution to encrypt data are subject to go public has laid its chat option to. Plus, you get quickly free GB of data download every day. Must opt for uk and meaningful way to cloud desktop app keeps pretty much memory do not agree that can do require permits or icloud storage plans uk. You are in the uk, as such as well will receive a canon dslr or icloud storage plans uk service bundles, as defined in. So they certainly simplifies things back. Premier Plan in only be wine in the US the United Kingdom Australia and Canada. Google is kind of data privacy laws are your computer, annual subscription for teams and more generous plans annual icloud storage uk, and answered your internet? Setapp uses akismet to manually power banks, uk mobile devices, trends and join the annual icloud storage plans uk and access to spend on any device must not control.
    [Show full text]
  • Global Cloud Storage & File-Sharing Service
    +44 20 8123 2220 [email protected] Global Cloud Storage & File-Sharing Service Market Report 2020 https://marketpublishers.com/r/G7AAC28D7846EN.html Date: October 2020 Pages: 116 Price: US$ 2,350.00 (Single User License) ID: G7AAC28D7846EN Abstracts At the beginning of 2020, COVID-19 disease began to spread around the world, millions of people worldwide were infected with COVID-19 disease, and major countries around the world have implemented foot prohibitions and work stoppage orders. Except for the medical supplies and life support products industries, most industries have been greatly impacted, and Cloud Storage & File-Sharing Service industries have also been greatly affected. In the past few years, the Cloud Storage & File-Sharing Service market experienced a growth of xx, the global market size of Cloud Storage & File-Sharing Service reached xx million $ in 2020, of what is about xx million $ in 2015. From 2015 to 2019, the growth rate of global Cloud Storage & File-Sharing Service market size was in the range of xxx%. At the end of 2019, COVID-19 began to erupt in China, Due to the huge decrease of global economy; we forecast the growth rate of global economy will show a decrease of about 4%, due to this reason, Cloud Storage & File-Sharing Service market size in 2020 will be xx with a growth rate of xxx%. This is xxx percentage points lower than in previous years. As of the date of the report, there have been more than 20 million confirmed cases of CVOID-19 worldwide, and the epidemic has not been effectively controlled.
    [Show full text]
  • REMOTE MOBILE SCREEN (RMS): an APPROACH for SECURE BYOD ENVIRONMENTS Santiago Manuel Gimenez Ocano University of Nebraska-Lincoln, [email protected]
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Computer Science and Engineering: Theses, Computer Science and Engineering, Department of Dissertations, and Student Research Spring 4-2015 REMOTE MOBILE SCREEN (RMS): AN APPROACH FOR SECURE BYOD ENVIRONMENTS Santiago Manuel Gimenez Ocano University of Nebraska-Lincoln, [email protected] Follow this and additional works at: http://digitalcommons.unl.edu/computerscidiss Part of the Digital Communications and Networking Commons, and the Hardware Systems Commons Gimenez Ocano, Santiago Manuel, "REMOTE MOBILE SCREEN (RMS): AN APPROACH FOR SECURE BYOD ENVIRONMENTS" (2015). Computer Science and Engineering: Theses, Dissertations, and Student Research. 86. http://digitalcommons.unl.edu/computerscidiss/86 This Article is brought to you for free and open access by the Computer Science and Engineering, Department of at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Computer Science and Engineering: Theses, Dissertations, and Student Research by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. REMOTE MOBILE SCREEN (RMS): AN APPROACH FOR SECURE BYOD ENVIRONMENTS by Santiago Gimenez Ocano A THESIS Presented to the Faculty of The Graduate College at the University of Nebraska In Partial Fulfillment of Requirements For the Degree of Master of Science Major: Computer Science Under the Supervision of Professor Byrav Ramamurthy Lincoln, Nebraska April, 2015 REMOTE MOBILE SCREEN (RMS): AN APPROACH FOR SECURE BYOD ENVIRONMENTS Santiago Gimenez Ocano, M.S. University of Nebraska, 2015 Adviser: Byrav Ramamurthy Bring Your Own Device (BYOD) is a policy where employees use their own personal mobile devices to perform work-related tasks. Enterprises reduce their costs since they do not have to purchase and provide support for the mobile devices.
    [Show full text]
  • Malware Check at Provider?S Site Before Replicating And
    International Journal of Engineering Research & Technology (IJERT) NCDMA - 2014 Conference Proceedings ISSN: 2278-0181 Malware Check At Provider’s Site Before Replicating and Synchronizing in Storage Clouds Hemanth Kumar.K Haribabu Valleti Department of CSE Department of CSE KMM Institute of Technology and Sciences KMM Institute of Technology and Sciences Tirupati, India Tirupati, India divided cloud computing into further part i.e. Service Abstract:- Cloud storage provides features like copying, models, Cloud Component for more understanding about backup and restore, synchronization and file sharing. cloud. As the service providers and the number of users B. Types of Service Models in Cloud increases the security issues also increases. As an Cloud computing providers offer their services example, a user may upload a file containing bad sector according to three fundamental models Infrastructure as a or some malware. There may be a chance that the service (IaaS), and software as a service(SaaS) where IaaS uploaded malware could affect the entire cloud or if it is is the most basic and each higher model abstracts from the shared file that could cause damage to other cloud details of the lower models. users. When coming to replication and synchronization 1) Software as a Service (SaaS): The capability provided to among multiple clouds while mining these affected the consumer is to use the provider„s applications clouds, that will be hazardous. In this paper, we are runningon a cloud infrastructure. The applications are proposing a two-side malware check to prevent attacks accessible from various client devices through either a thin from user uploaded data.
    [Show full text]
  • User Manual Cloudevo Table of Contents
    User manual Cloudevo Table of contents Table of contents ..................................................................................................................................... p. 2 Introduction .............................................................................................................................................. p. 3 Use cases ........................................................................................................................................ p. 3 Setup ............................................................................................................................................... p. 3 Create account ................................................................................................................................ p. 3 User interface .................................................................................................................................. p. 4 Cache .............................................................................................................................................. p. 5 Cloud storage services ............................................................................................................................ p. 5 Supported services .......................................................................................................................... p. 6 Add cloud storage accounts ............................................................................................................ p. 6 Parallel
    [Show full text]
  • Download Your Free Software Essentials Guide
    NEW 2019 EDITION INCLUDES A GUIDE TO GDPR COMPLIANCE SUPERFAST BUSINESS WALES SOFTWARE ESSENTIALS 03000 6 03000 businesswales.gov.wales/superfastbusinesswales ABOUT US Who are Superfast Business Wales? We are a free advisory and training service that helps businesses make the most of the latest online technology. Backed by the Welsh Government and European Regional Development Fund, we’ve already put on 550 workshops and events, and delivered over 20,000 hours of help for businesses in Wales. To date, we’ve worked with over 4,000 businesses, helping them to reach more customers and simplify their work processes. We plan to support more than 6,000 SMEs during our five-year programme. Register online today to embrace digital transformation, discover new business tools and get tailored 1:1 support (including a website review). Together, we can keep your business growing. DISCLAIMER: This directory provides an illustrative sample of software products that are available to help you run your business and exploit the new technologies that are associated with super fast broadband. The information has been collated and published by the Superfast Business Wales Programme, a service that is not affiliated with any of the software providers referenced within this directory. All information is correct at the time of publication (December 2018). Please see supplier websites for latest details. 02 03000 6 03000 CONTENTS Introduction 04 Infrastructure 56 Project Management 06 Security 62 HR & Finance 12 Control 70 Sales 20 GDPR and You 82 Productivity 30 Communications 40 Web 48 businesswales.gov.wales/superfastbusinesswales 03 INTRODUCTION Running a successful business, small or large, is much easier if you choose the “ right business tools for growth.
    [Show full text]