No Internet Censorship in China?

A senior Chinese official known as the “gatekeeper” of the country’s internet has denied that the country censors online information.

Lu Wei, chief of the State Internet Information Office, said China does not censor but “manages” internet content in Zhejiang on Wednesday. Lu was answering a CNN reporter’s question in a press conference ahead of the Second World Internet Conference to be held in Zhejiang’s famous water town Wuzhen next week.

“It is a misuse of words if you say ‘content censorship.’ But no censorship does not mean there is no management. The Chinese government learnt how to manage the internet from Western developed countries, we have not learnt enough yet,”

What is 360 Safe Browser?

If you have ever used one of your Chinese colleagues computers, you have probably encountered a web-browser that looked like Internet Explorer, but definitely was not. Developed in 2011, it quickly became a favorite among Chinese users and in Nov. 2012 surpassed Microsoft IE as the most used browser in China (57% of China Internet surfers). Advertised as a safer alternative to Internet Explorer, it comes bundled with a number of other free software (Anti-Virus, Chat, Etc) and advertising platforms (Adware).

While not intentionally malicious the software brings with it frequent advertising pop-ups, online activity trackers, and is very difficult to remove after it has been installed. For IT Professionals the software causes conflicts with Paid-for Anti-Virus Clients, and the bundled software can remove security features common to Corporate Networks (Active Directory)..

Shadow IT and the CIO Dilemma

Shadow IT is nothing new. It’s a threat long wreaking havoc on CIOs and IT administrators.

But only recently have we begun to realize the magnitude of the issue.

For years, we’ve known that employees and lines of business are bypassing IT departments to
get the cloud services they want to get their jobs done—whether it’s the streaming music service
that curates the ultimate focus playlist, or the cloud storage apps that keep documents in a row.
More recently, the acknowledgement of rogue IT has been quickly followed by a conversation
around the unintended and potentially dangerous consequences: increased security risks,
compliance concerns and hidden costs.

To shed new light on the issue, Cisco mined data from Cloud Consumption Service
engagements with hundreds of large enterprise customers across United States, Europe,
Canada and Australia. The data came from actual customer use discovered over the network,
not surveys. The findings were eye opening, to say the least…