Recent Updates Toggle Comment Threads | Keyboard Shortcuts

  • dropmysiteblogger 5:48 pm on April 28, 2015 Permalink | Reply
    Tags: , , ,   

    Forget Clinton: State Department Hack is Unprecedented (Now About Clinton…) 

    The focus on Hillary Clinton’s private server loses sight of a bigger problem: Russian cybercriminals have their fingers in the American pie.

    The scandal over Hillary Clinton’s emails should bother Americans for more reasons than one. Sure, it’s weird that Clinton was keeping her emails on her own designated website, aptly named (and not, as previously reported by Fox News). It seems at least appropriate, possibly illegal, and probably irresponsible.

    Strangely enough, though, storing her messages on her own private server may have protected them from Russian hackers. Attacks believed to originate in Russia “have bedeviled the State Department’s email system for much of the past year and continue to pose problems for technicians trying to eradicate the intrusion,” reported CNN.

    In fact, FBI leaders, intelligence community experts, and policymakers familiar with the specifics of the continuing assault on the State Department say it is the “worst ever” breach perpetrated against a United States government office. The intruders are actually attacking the federal government from all angles, compromising email at the White House and additional prominent offices as well.

    These hackers are believed to be sponsored by the Russian government, just as the FBI says the Sony and Anthem intrusions were perpetrated by government hackers from (respectively) North Korea and China.

    Who cares – let’s talk about Clinton

    As CNN points out, Clinton has been roundly criticized for using her own private server, for three main reasons:

    • It fails to back up records in the federal system, as demanded by record-keeping law.
    • Her home server could not possibly have as strong of security as the federal government does.
    • It is just plain crazy and weird, and… she did what again?

    The first point seems valid. However, according to an analysis by trial lawyer Aivi Nguyen, Clinton did not break the law. Nguyen notes that the applicable law is the Federal Records Act of 1950. That law was updated in November 2014 by President Obama to insist that anyone who uses a private account for any formal communications has to cc their federal address as well. In other words, said Nguyen, “At the time Clinton was actually in office, personal email addresses were allowed and there was no requirement that private account email records be stored on government servers pursuant to the Federal Records Act.”

    It seems that the security argument is not as strong as it should be. Russia stuck its finger into this particular American pie in 2014 (per an ongoing federal investigation), an attack so tenacious that the agency turned off its email one week in November to beef up its protections and eject the Russian riffraff.

    As for the third point, it remains difficult to understand why a high-ranking federal official would think it was reasonable to keep all their electronic business communication on a personal system detached from the federal infrastructure. Hillary: explain yourself.

    Clinton’s explanation

    On Tuesday, March 10, Clinton held a press conference at the United Nations in which she discussed the private email server. She said that she had trashed approximately 50% of the messages from her years as the Secretary of State (hey, 50 cents on the dollar, not bad).

    She claimed that she had transferred everything that was relevant to her work to the White House and had gotten rid of messages related to her personal life, reported the New York Times. According to Clinton, trashed emails included information about yoga, preparations for Chelsea’s wedding, and communications related to Hillary’s mother’s death. Speculation is running high that she also cleared out dozens of drunken emails from Bill requesting a divorce because she wasn’t supporting his saxophone career.

    Clinton held the press conference to try to calm concerns that she operated in a rogue style by buying her own domain and communicating off the federal grid.

    She said that she made the wrong decision to operate her own server but that her actions were always within the bounds of federal regulations, and that she was attempting to make things right by authorizing the State Department to push her emails to the public domain.

    “No one wants their personal emails made public,” said Clinton, “and I think most people understand that and respect that privacy.”

    Well, you know, this situation is a little different, Hillary. It’s not an average Joe’s email account we are talking about here. Plus, there seems to be a little hypocrisy involved. According to the Times, in 2007, Clinton criticized George W. Bush’s team for using an unofficial email system for some of their communications.

    The birth of

    Sadly, there is no “About Us” page available at (Heck, there isn’t even an online store to buy commemorative T-shirts!) However, when the Washington Post took a peak into the registrar details for the email site, they found that the domain was first purchased on January 13, 2009 – which is, coincidentally enough, the day Clinton’s confirmation was initially discussed in the Senate.

    Don’t go the way of Clinton

    The Post comments that the use of an outside system is not isolated. For example, the former director of the Environmental Protection Agency, Lisa Jackson, used email for official business during her time on the federal payroll as well.

    The real issue with Clinton’s emails is that they are not backed up within the federal system. There is only one copy: hers. Essentially, her email is like an unpublished novel. A fire in the house would burn away official federal information.

    Don’t make yourself similarly vulnerable. If the State Department can get hacked, you can too. Back up your email. Get serious data protection for seriously low prices today.

    By Kent Roberts

  • dropmysiteblogger 11:11 pm on April 24, 2015 Permalink | Reply
    Tags: announcements, email hacked, , news, USA   

    Why Clintons Private Email Server Was Such a Security Fail 

    • Record-keeping vs. security
    • Who was snooping on Hillary?
    • Why
    • Was it encrypted?
    • Back it up.

    Record-keeping vs. security

    If you hold a high position in government, keeping your own server would be tempting. It could be an effective way to keep your data out of the hands of reporters while maintaining compliance with the Freedom of Information Act, as indicated by Gawker. However, security professionals agree that it makes your communications much more vulnerable.

    On Monday, March 2, the New York Times reported that Hillary Clinton used a private email address rather than communicating via during her tenure as Secretary of State. On the 4th, the Associated Press noted that the email account was operated through a server at Clinton’s New York home and used a domain she owned herself,

    The focus of substantial discussion has suggested that Clinton may have broken public record and accountability regulations, although the law still doesn’t forbid private accounts and didn’t require backing up email  by Ccing an official government address until 2014.

    “[As] the controversy continues to swirl,” explains Andy Greenberg ominously in Wired, “the security community is focused on a different issue: the possibility that an unofficial, unprotected server held the communications of America’s top foreign affairs official for four years, leaving all of it potentially vulnerable to state-sponsored hackers.”

    One key consideration is whether or not her emails were encrypted, as discussed below.

    Who was snooping on Hillary?

    The fact that Clinton was using her own server for email is a revelation to the American public in 2015, but spy agencies of other countries likely were aware of what Clinton was doing, just as the NSA is aware of top leaders in Spain and India who use consumer email, says Chris Soghoian of the ACLU.

    Building one’s own private email system is a ridiculously bad idea from a security perspective, Soghoian argues. First of all, you don’t have the same level of expertise watching over a random private server as you would at the State Department, unless Clinton was personally investing heavily in security – and it seems that would have been mentioned.

    The State Department has technologists on staff checking for unauthorized activity on a continual basis. The NSA also guards the infrastructure. One of the defense mechanisms State had available – a tool in place at several major agencies – is the Einstein  initiative, a Homeland Security effort that benefits from NSA information and security practices.


    The domain name chosen by Clinton makes her decision especially problematic, says Greenberg. Unlike the federal websites, was listed with a private registrar.

    Greenberg elaborates, “The domain (and thus its registrar) was certainly known to at least one hacker: The notorious celebrity hacker Guccifer first revealed it in 2013 when he spilled the emails of Clinton associate Sydney Blumenthal.”

    Since the account was with a private registrar, a hacker could get into the registrar, Network Solutions, and grab email going in either direction or send it to an outside address. They could even send bogus emails that looked as if they were coming from Clinton. Well, is Network Solutions safe? Not exactly. Hundreds of its sites were invaded while Clinton held her Cabinet position.

    Even if the account were only used for nonessential communications, the fact that someone could hijack messages and write false emails from a top United States official is deeply disturbing in the eyes of Soghoian. Personal details are considered valuable by spy agencies, he says, giving the example of NSA surveillance of the private phone of German Chancellor Angela Merkel.

    Was it encrypted?

    A specific important question regarding Clinton’s data is whether or not it was encrypted. Why is encryption so incredibly important for her emails or for your own?

    Email encryption is a form of data security that makes it more difficult for anyone other than the intended recipient to read a message. Sending email without the security function leaves users vulnerable. Encryption scrambles all the information within your messages so that you can only see their contents if you have a private key. Encryption has grown in adoption since the Snowden disclosures on the NSA.

    As Debbie Jones of Teach-ICT explains, the concept has been evolving for millennia – if you consider it just a way to hide information from unauthorized parties. In ancient Greece, a general wanted to send a message to another city and didn’t want anyone to be able to detect it. He wrote a message on his soldier’s shaved head. When the soldier’s hair grew out, the message was concealed. For the recipient of the message, the “private key” was to shave off the hair to access the communication.

    Now, encryption of emails and other data is a bit more complex. A private digital key is created out of a huge number of possibilities. As Jones notes, the algorithms used to achieve encryption are extraordinarily advanced. Industrial-grade options, typically composed of 128 or 256 bits, represent a nearly impossible hacking proposition.

    Indeed, “[t]he current standard specification for encrypting electronic data is the Advanced Encryption Standard (AES),” explains the information security team at Indiana University. “Almost all known attacks against AES’ underlying algorithm are computationally infeasible — in part due to lengthier key sizes (128, 192, or 256 bits).”

    If Clinton’s data wasn’t encrypted, it would be extraordinarily easy for third parties to read if they ever breached her server. Imagine the intelligence that Clinton’s outbox could have provided to foreign governments or military personnel. Or, if someone were to copy the SSL certificate Clinton used, they could eavesdrop on incoming data.

    Back it up

    With more and more high-profile hacks occurring, businesses and consumers alike are becoming increasingly aware of the vulnerabilities associated with the Information Age.

    What if your email is hacked? What happens next? Will they be destructive? Will your data be lost? Get email backup and archiving today.

  • dropmysiteblogger 8:20 pm on April 22, 2015 Permalink | Reply
    Tags: email marketing   

    10 Tips for Email Marketing Success 

     10 Tips for Email Marketing Success
    There is much more to email marketing than sending a mass promotion to everyone on your list. By taking the time to get to know your target audience, you will be able to ensure that your campaigns are personalized, relevant, and timely. Here are 10 tips for email marketing success:1) Have a mobile strategy that helps you collect email addresses
    2) Offer incentives
    3) Confirm and double optin your email subscribers
    4) Keep communication to the point
    5) Let the user decide how often they would like to hear from you
    6) Use data to make decisions
    7) Give people options
    8) Automate automate automate
    9) Make sure your automated processes work flawlessly
    10) Test, test, test!

    Read More: Click here
  • dropmysiteblogger 3:31 pm on April 21, 2015 Permalink | Reply
    Tags: , , , , , , , , , , , , ,   

    How to Recover When Hackers Invade Your Email 

    Hacking is everywhere in the news these days, and for good reason: it is becoming a bigger problem. Just ask Anthem, the United States’ second-largest health insurer. Anthem announced in February that it had suffered a major breach. Although no electronic medical records were compromised, sensitive user information was: names, addresses, and Social Security numbers. In fact, 79 million individuals’ data– current and former customers, employees, and even non-customers – was taken. State-sponsored Chinese academic researchers are widely believed to be responsible.

    Just as with Sony (which experienced a slash-and-burn attack the FBI says came from North Korea), the hackers are believed to have been inside the Anthem system for months. Not wanting to be rude to its houseguests, Anthem left all of its user account information unencrypted (reportedly because encryption is inconvenient).

    It can happen to anyone

    In November, Suzanne Kantra of Techlicious received an email from a personal acquaintance asking her in broken English to go to a certain website. Upon further research, Kantra realized that she was receiving the message from a server in Russia that wanted her to come check out its sexy new malware.

    “When I checked in with her another way,” Kantra explained, “she already knew about the problem—the hacker’s message had gone out to her entire address book—and she was quite concerned.”

    Kantra, the former technology editor for Popular Science, gave her friend the following checklist to enhance her email security and recover from the breach.

    Use a different password

    Your #1 priority is to prevent the intruder from continuing to access your email. You want a hyper-secure password that is completely dissimilar to the previous one. For example, if your hacked password is beetlejuicebeetlejuice, your new one should not be beetlejuicebeetlejuicebeetlejuice. Plus, if Beetlejuice is listed as your favorite movie on Facebook, it probably should not be your password.

    One way to approach the password is with a strong random password generator, which I highly recommend. The one issue with randomizing is that your passwords become virtually impossible to remember. An alternative is to base your password on a sentence. “For example,” offered Kantra, “ ‘I go to the gym in the morning’ turns into ‘Ig2tGYMitm’ using the first letter of each word in the sentence, mixing uppercase and lowercase letters and replacing the word ‘to’ with ‘2.’”

    Get back ownership

    Your hacker may have changed the locks on you, leaving you out in the cold. To get access back, you can typically go through the password retrieval system, accessible through the login page.

    Set up 2FA

    You may be familiar with two-factor authentication, which some of the hip older kids are calling 2FA. This protection requires you to be authenticated twice, typically via a code that is delivered by text message or through a mobile app.

    Look through the account settings

    A cybercriminal will often care so much about you that they want to help you back up your email within their very own email account via forwarding. However, you may prefer that your hacker not be reading all your mail. Turn off the forwarding.

    Look at your signature as well, where the hacker may be advertising to everyone.

    Finally, check that your auto-responder hasn’t been co-opted by the hacker.

    Delete their software

    You also need to get rid of any malware. Run your current program or do a full scan with Malwarebytes, which has a free version.

    Kantra gives the application a strong thumbs-up: “I recommend running Malwarebytes even if you already have another anti-malware program; … Malwarebytes has resolved problems for me that even Symantec’s Norton Internet Security wasn’t able to resolve.”

    Don’t forget about your other devices – anywhere you check your accounts. Run your anti-malware program there as well.

    If you find malware, quarantine it (through the anti-malware app). Then switch to another password (since the malware may have detected your first password change).

    Follow the trail of hacking

    Kantra mentions her mother-in-law, who used to keep her login details for all her accounts in a specified message folder. She was hacked, and the intruder was able to wreak additional havoc by using her own filing system.

    You probably have emails with these sensitive details. Search for “password.” Switch out anything that hackers might have seen. Look over your statements if you think they might have accessed any financial accounts.

    If you have reused the identical login credentials on other sites, change those ones as well.

    Notify your contacts

    Check your outbox to see what the hacker has accomplished for you in terms of correspondence. If you disagree with their recommendations to take advantage of a sale at an Indonesian shoe site, follow up with friends to let them know that you are actually not part of an international footwear pyramid scheme.

    Enact preventive measures

    As suggested above, it’s a wise idea to use a random password generator and to diversify your passwords.

    Kantra’s friend used a variety of complex passwords, and she didn’t even have malware on her PC. However, she wasn’t being careful about the devices she was using, accessing her email through a computer in the lobby of a hotel.

    Hotel lobby computers are typical targets for hacker tools called keyloggers that record each keystroke you enter. Kantra stresses that PCs in public places “are often poorly secured and get used by dozens of people every day who don’t think twice about logging into their email or bank accounts or entering credit card information to make a purchase.” Expect a public computer to be contaminated. Wear a surgical mask and gloves.

    Furthermore, do you back up your music collection? Is your music collection really more important than your email? If your account is compromised, all of your emails could be destroyed or corrupted. Check out our user-friendly automated email backup plans.

    By Kent Roberts

  • dropmysiteblogger 4:51 pm on April 13, 2015 Permalink | Reply
    Tags: , ,   

    Is LinkedIn an Email Hacker’s BFF? 

    This article on +CIO by Information Security professional Trevor Christiansen explains how easy it is for a #hacker to build an employee #email list, simply by searching for an organization on #LinkedIn, that he/she can then target with a #phishing #scheme to access usernames and #passwords. This information can then be used to breach the #network and steal valuable credit card or other #data – and your company’s worst nightmare has just begun.

    So what is a company to do? Quit using LinkedIn? In today’s socially connected workplace, that hardly seems a viable option.

    Christiansen recommends investing in a training program to help your employees learn to recognize and resist phishing scams. He also suggests that a simple statement that clearly defines how your company handles network security information, such as “we will never ask for your username and password” will go a long way toward preventing employees from falling victim to such scams.

    Finally, having a clear reporting process for suspicious activity before it becomes a full-blown network attack will go a long way toward keeping your business-critical data safe and sound.

    Read More:

  • ridleyruth 1:37 am on January 14, 2015 Permalink | Reply
    Tags: APS, , , , integration, new package, PA 2.0   

    Dropmyemail Archive APS Package approved and published on APS Standard 

    Your favorite email archiving solution is now available for all Parallel Automation users on APS Standard Catalogue.  This release allows service providers and hosters the opportunity to easily sell and customers to seamlessly buy and use the service.

    Dropmyemail is an award winning email backup solution. It launched its email archiving solution in mid 2014. The service has already been adopted by a popular service provider in Australia. With features such as advanced search, unlimited storage, admin panel, alert configuration, download and restore, DME Archiver has successfully captured all requirements of a fully compliant email archiving service which includes legal discovery and investigations, regulatory and compliance and business continuity. Advance features such as insights (resorting and AI), email migrations, user access level management, infinite storage and attachment managers give its users something extra for their money.

    Resellers and partners are the core of the dropmyemail business. With that philosophy in mind, the new APS package equips its high end partners with this powerful email archiving solution while reducing the product integration time.

    The APS solution has been specifically design for simplicity. Once integrated the partners can activate their users with just a click of a button and also ensure correct billing, order provisioning and automatic fulfillment with much ease and elegance. Features such as  Single-Sign-On (SSO) makes the entire setup process invisible to end customers as they are now able to use the archiver service from day one.

    Tens of thousands of users have already signed up to the Dropmyemail Archiver solution. Soon other products such as dropmyemail email backup, dropmysite website and database backup will also be available on APS Standard as Dropmysite Pte Ltd continues to reach newer heights every month.

  • Udit 1:44 pm on January 13, 2015 Permalink | Reply
    Tags: partners, , reseller,   

    Dropmyemail Launches new portal for resellers 

    Your favorite email backup / archiving solution provider Dropmyemail recently launched its new reseller portal. Through this reseller portal, partners of dropmyemail will now be able to perform user / account management, plan management, pricing, order provisioning, order fulfillment and many more.

    New reseller portal

    Within the 1st month of its launching, this new reseller portal has seen new partners and launches from India, Singapore, Dubai, South Africa, New Zealand and The United States. This portal will now be used to communicate between dropmyemail and all its partners and soon many new features will be added to it. This reseller portal forms an integral part of the company’s Automated Reseller Provisioning Platform (ARPP). By using ARPP, smaller resellers can integrate with dropmysite and dropmyemail without any plugin / API installation.

    As part of this platform partners / resellers are able to:

    1. Access to Dropmyemail reseller portal
    2. A co-branded / white labeled domain though which the partner’s end users can login and access their backup dashboards.


    About DropMySite and DropMyEmail

    Dropmysite is an industry leader in cloud backup technologies offering secure and easy to-use services to SMBs around the globe.  Dropmysite was launched on in 2012 at DEMO Asia, the leading event for the best and brightest companies to launch to a global audience, and awarded the “DemoGURU” and “Freedom” Award.  Its two primary products are:

    1. Email backup service is specifically designed for personal and small businesses users and they use POP3 / IMAP Protocols to backup emails once a day. The solution works with any mailbox server. Simplicity is achieved using a 2 step sign-up process, which does not require any technical expertise. Advanced features such as attachment managers, download, restore and migration are offered to all end users.
    2. Email Archiver is specifically designed to cater to archiving needs of small and medium businesses with advanced business and compliance requirements. Using this service, SMBs can not only archive all their company emails but also manage access controls to archived emails across departments. With rich features such as advanced search, unlimited storage, admin panel, attachment manager, alert configuration, download, migration and restore, DME Archiver has successfully captured all requirements of a fully compliant email archiving service which includes legal discovery and investigations, regulatory and compliance and business continuity.

    For more information, visit:

  • Udit 1:41 pm on October 21, 2014 Permalink | Reply
    Tags: , , , , , regulations   

    SaaS email archiving helps you meet compliance challenges 

    There are numerous industries with regulatory compliance requirements for data. But one industry that stands above the rest in sheer numbers is health care. In the US, health care now costs $8,233 per year per person, a whopping 17.7 percent of our GDP. The Wall Street Journal shows Health Care as the industry that dominates all others in the US, having had a consistent increase since the 90’s.

    This industry processes massive quantities of data per year in support of patient health and billing. It’s recommended that doctors draw upon this information to notify their patients via emails of appointments, test results and to provide them with treatment advice. This has been proven effective in improving patient health, but it’s also highly regulated. As you’ll see, archiving health related email, especially with SaaS, may be vital to protecting both patients and providers.

    SaaS archiving provides essential data security

    When your Email contains data that requires regulatory compliance, an effective and automatic SaaS archiving solution can provide you with the data security your customers seek. Secure storage and instant updates with zero downtime can protect companies and organizations from the burdens of difficult to find data as well as from legal liability.

    Many industries require that records be kept for a specific amount of time. These include medical records, which must be retained for 6 years, and credit card records as specified by PCI-DSS, which must be retained for 1 year. In addition the first 3 months of data easily accessible. IRS recommends that employers keep all records of employment for employees and contractors for 4 years.

    HIPAA Email Compliance

    Patient health information is protected by the Health Insurance Portability Act (HHS) of 1996. The Department of Health and Human Services is responsible for the development of health regulations protecting health information privacy. This information is handled and updated by many health related organizations, including hospitals, laboratories, private health practices and third party billing agencies.

    The HIPAA Privacy Rule specifies national standards for health information privacy. It provides federal protections for health information records held by organizations covered by this rule, while extending patient privacy rights.

    There are no specific HIPAA standards for email archiving, but archiving emails containing PHI data makes ePHI more secure. The best methodology begins with risk analysis according to the Security Rule, and should be the first step in compliance. This is an ongoing process that informs an organization of risks to the confidentiality, integrity and availability of ePHI data.

    The Security Rule permits sending ePHI, such as email. It also establishes standards for access control, integrity, and transmission security that guard against unauthorized access to electronic PHI sent by email. The Rule’s transmission security requirements mandate the use of encryption, with allowance for electronic PHI to be sent over an open, secure network.

    The HITECH Act of 2010 amended previous HIPAA requirements, adding penalties for violation of a patient’s HIPAA rights. According to the American Medical Association, the current fine for HIPAA violation is $1.5 million.

    How does archiving protect companies with regulatory mandates?

    When regulated information such as email with HIPAA data in it is lost, so is notification proof and other record communication. The organization that has no archive has no control over future related proceedings. Archived email might be the proof needed in future litigation. Since HIPAA regulations are becoming stricter as time progresses, archiving email may be prudent.

    Litigation is a common occurrence in the healthcare industry. Organizations protected by e-PHI data that has been archived and is easy to access have an excellent defense that can help them avoid devastating penalties.

    Securing and retaining email in a way that’s easily retrievable allows organizations to find data quickly and protects them from serious data loss.

    One of HIPAA’s mandates is the Six-Year Retention Rule. All PHI records must be securely stored for 6 years. ePHI emails can be securely archived using the latest SaaS based internet backup technologies for emails, databases and websites. Dropmysite, a technology leader in SaaS-based internet backup, offers resellers the resources to ensure their clients’ data is archived in full compliance with regulatory specs such as HIPAA.

    Security and retention concerns apply to EU and UK data management as well. A sample of EU and UK laws that protect email security are:

    UK Data Protection Act  – It states that individuals have the right to receive a copy of their personal data that is held by others. Organizations must ensure that there is adequate security to protect personal data. Unauthorized or unlawful processing of personal data must be protected from accidental loss. Legislated document retention periods across Europe vary by country.

    EU Directive 95/46/EC is known as the Data Protection Directive.  It specifies that data not be retained for longer than necessary for purposes indicated and must be stored safely.

    Our cloud platform helps businesses and resellers securely backup, recover and protect email data. Employing the latest cloud delivery model lessens management complexity, eliminates high capital expenditure and reduces on-going costs. Resellers are our core business and we support them with a multi-tiered reseller program that provides technical support, sales and marketing support, dashboards, tools and more. Our comprehensive understanding of evolving technological trends and the customer needs makes Dropmysite the best backup solution suite for mobile, websites and emails.

  • Udit 1:39 pm on October 21, 2014 Permalink | Reply
    Tags: , mobile backup   

    Dropmymobile the most secured mobile cloud solution 

    It wasn’t long ago that “the cloud” was looked at as a somewhat mysterious new technology that aimed to change the way we use devices of all types. At its core, cloud-based technology allows users to have access to all of their information from any device on Earth with an Internet connection. Do you need to take a document with you home from work to finish editing it? Put those CDs or flash drives away and just upload it to the cloud. Are you collaborating with classmates on a particular project and want to be able to easily track changes and make sure that everyone has access to the latest information? The cloud can do all of that and more.

    Instead of storing files locally on the user’s hard drive, cloud-based technology stores these devices on a series of servers that are always connected to the Internet. Not only is this a great way to expedite file sharing and free up space on local hard disk drives, but it’s also a great way to make sure that all of your information is safe and secure. In the event that your hard drive crashes, for example, you don’t have to worry about it having taken weeks or even years of precious documents along with it. They’re all safe and secure in the cloud where they belong.

    Many cloud technology providers even offer military grade encryption features that are designed to prevent anything from happening to important and personal information. Apple was one of the biggest companies to take a bold step in the direction of a cloud-based world, having integrated a service called iCloud into all mobile devices running iOS 7. When paired with a Mac OS X device running the latest version of that operating system, the benefits were clear. Any time you added a new piece of information to the “Contacts” application on your MacBook, for example, you didn’t have to then switch over to your iPhone and make the same adjustment. So long as you were syncing everything with your iCloud account, all information is always in all places at the same time.

    The same held true for pictures. You didn’t have to worry about syncing your iPhone with iTunes to back up all of those great personal pictures that you’ve taken with your device over the years. Simply log into iCloud on both your iPhone and your computer and the pictures are in both places automatically. iCloud truly appeared to be a safe, secure way to make sure that you always have access to your important information wherever you go.

    That is, until recent events have thrust the iCloud service and Apple in general into the news for all of the wrong reasons. With a Smartphone as popular as the iPhone, it is not unreasonable to believe that a huge number of different types of people all use the device on a daily basis – from regular Joes to celebrities and everyone in between.

    In early September of 2014, it was revealed that a lengthy hack had been taking place of Apple’s iCloud servers for quite some time. The nude and risqué photographs of dozens of celebrities, including actresses like Jennifer Lawrence of “X-Men: Days of Future Past” and “The Hunger Games,” were leaked onto the Internet through a website called 4chan. These pictures weren’t stolen along with the celebrities’ cell phones. The celebrities didn’t give someone unauthorized access to their hard disk drives and ended up paying dearly for it. The hack was the result of lax security protocols in the iCloud service that people had previously put so much of their trust in.

    The hack itself proved to be quite intricate in nature. For starters, there was no one “mystery hacker” that was distributing all of the pictures onto the Internet. Though not all information is available, it seemed to be the results of dozens of people all working in tandem over a period of several months or even years. These individuals would gain access to iCloud accounts through “brute force” methods – in general, they simply guessed the passwords that celebrities used to protect their accounts using challenge questions and publicly available information on the Internet.

    If your challenge question is “What was the name of your favorite pet?” and you’re just a regular person, you probably don’t have too much to worry about. When you’re a celebrity, the chances are high that you’ve been asked and have answered that question many times in interviews over the years.

    The leak itself has still not officially stopped. There is currently a third wave of pictures that are hitting the Internet and the pace shows no signs of slowing down. There is no telling exactly how many pictures were stolen and the total number of people they were stolen from until the proverbial dust truly settles.

    The recent iCloud hack is just one example of why services like Dropmymobile are so important. Dropmymobile is the exact type of service that is designed for people who have ever worried about losing their phone, keeping track of multiple devices or even falling prey to prying eyes. is a product that allows you to back up all data of Android devices to a secured server not only so that you have quick and immediate access to it in the future, but so that you don’t have to worry about the types of security breaches that iCloud celebrities fell prey to. Information is stored with military grade encryption to ease concerns.


    Dropmymobile even has a “Paranoid Mode” which gives the user a secret key to access all of their important information that is known only to them. The key is not saved anywhere except in the user’s head, making it impossible for a hacker to find out about it.

    Dropmymobile currently has a special promotion that allows users to get 10 gigabytes of cloud-based data for free for ten full months using code DMM1010. This is in addition to the five gigabytes of space that new users already get when downloading the product in the first place.

  • Udit 1:34 pm on October 21, 2014 Permalink | Reply
    Tags: , OC Widget, Open Xchange, OpenXchnage, OX, SSO, widget   

    Dropmyemail is now OX ready 

    Dropmyemail were the proud gold sponsors of the Open-Xchange summit 2014 that was help in Munich this year. At this event, CEO Charif Elansari and COO Ridley Ruth launched the new OX DME plugin developed by the dropmyemail team.

    OX summit

    “We are very excited about the release of our new Open Exchange plugin which allows a seamless integration of our email back up and email archiving products into the Open Exchange email platform”, says Ridley Ruth, the new COO of Dropmysite, “The plugin makes our products easy for small and medium sized businesses to add users by automatically retrieving all of the email credentials while at the same time reducing the support cost and burden for our partners.”

    Dropmysite is the industry leader in cloud backup and archiving. Their cloud platform helps SMB’s and prosumers securely backup, recover and protect all their website, email and mobile data.

    OX Plugin Snapshot

    OX Plugin Snapshot

    Their product “Dropmyemail” (DME) is one of the best cloud based email backup and archive solution available today specially designed for SMBs and they can archive and backup any email from any mail server. Features such as multiple user access levels, attachment manager, advanced search and eDiscovery, alert management and email migration enhance the user experience and empowers the user not only to safeguard but also to effectively manage their emails. The product has already some great success in APAC.

    The company Open-Xchange, started with development of a Linux-based email solution now develops, markets and sells web-based communication, collaboration and office productivity software. More than 80 m users use these OX services through a network of over 80 cloud and hosting providers, telcos and local internet services.

    Through its OX plugin, dropmyemail aims to provide their highly reliable email backup and archiving solution to all users of OX Suite via partners all over the globe. “Partners are the core of our business”, says Udit Berlia, Business Development manager for Dropmysite “and with the new OX plugin we will be able to offer our service to a much wider audience globally. We already have cPanel, WHMCS, Plesk, APS 2.0 and APIs for our services. OX Plugin will complete our integration offerings to our partners.”

    The plugin is design to be simple and intuitive. Features such as single sign-on will provide the seamless access of the DME application from the OX control panels. This will eliminate the need to configure email settings for users as they will be able to use DME immediately after they sign up for the service. This plugin will be available in both braded and white labeled formats to all the partners.

    Dropmysite was launched on 1 March 2012 at DEMO Asia, the leading event for the best and brightest companies to launch to a global audience, and awarded the “DemoGURU” and “Freedom” Award. Since then, Dropmysite has been featured on Angels’ Gate, Wall Street Journal, VentureBeat, Business Times and CNBC. The company was selected amongst the Top 20 startups by Singapore Business Review. Dropmysite has offices in 4 countries (US, India, Japan, Singapore).

Compose new post
Next post/Next comment
Previous post/Previous comment
Show/Hide comments
Go to top
Go to login
Show/Hide help
shift + esc

Get every new post delivered to your Inbox.

%d bloggers like this: