bCard glob sm wt

When someone uses the term web site design quite often folks have different perceptions of what this means. Some are thinking of the technical features on the front end such as slide shows, accordion content or tabs while others are thinking of the creative elements, colors or graphics. The whole concept of design in the end is subjective in nature in either case. In the past 10 years of helping folks build beautiful and powerful web sites with Joomla, I have found a simple high level process for getting on the right page with what a client wants or thinks they want and what they actually need or should do. Since there is an ever growing collection of so many great templates and frameworks out there for building the front end design of a web site, I personally feel there is no need to reinvent the wheel in most situations.

Where to begin
The first thing I do is try to understand where the client is starting from. Do they have a current brand, style guide or identity that needs to be matched or improved? Do they have tastes in line with their target audience? Are they realistic with their expectations as they relate with their available budget to implement? This helps me determine design priorities and where they should direct their resources for maximum impact. Once I get past these types of general questions and have a good sense of realistic expectations, I like to take an exploration through various templates and template frameworks to see what the client likes and dislikes. After all they have to be happy with the overall look and feel since they are paying for it. Here is a simple 4 point high level process:

1. Framework
Features, administration and future needs

2. Style
Brand, identity, colors and graphics

3. Placement
Modules or main vs landing vs detail

4. Content Priority
Mobile vs desktop

Going through these elements in detail helps me first identify which template framework to begin building in or if the client does indeed need a custom design. Once I determine the best framework, I narrow down the style, content elements and placement priorities. I will typically, even with a custom design, build on top of an existing framework since this will reduce costs in the long run for maintenance and security.

With smaller sites that have a narrow or specific audience profile this high level design process can be as simple as a few conversations and reviewing some sites of various template venders or competitors. However, with larger sites that involve more stakeholders and complex audience profiles this process can become a bit more of a laborious yet a very important exercise. On smaller low profile sites often you can work in real time and experiment until you get it the way you want. In larger sites you may need to build several prototypes and make comparisons through A/B testing strategies. If sites are live with high traffic you need to build staging platforms and the whole process can be much more time consuming and complex.

Either way, the high level process requires the same questions to be asked and answered. Whether you take a formal or informal approach to designing your web site, large or small, it is the most important step for being in sync with your goals, expectations and the audience that you are trying to reach.

In a post Edward Snowden era it is no secret that all of our communications are being monitored and assimilated in a vast collection of “big data”. Often this data is then fed into predictive software and advanced calculators to determine predictive behaviors and associations with other data or data sources.

This information you do not always agree to share is then kept permanently and stored in big facilities around the world such as NASA’s Utah Data Center is, over 1.5 million square feet and four stories tall shown above. While this is not always made publicly available, every system can be penetrated and most likely will be at some point in the future. NASA is not the only collectors of "Big Data" there are many large copmpanies dedicated to coolecting and processing. In fact many have contracts with the government to supply data for ay number of purposes.NASA Big data center sm

Some data we freely give out such as that which we post to google, facebook, instagram, twitter, bing and many others collect through using their online tools, email systems and search engines.

While we often chose the convenience, proliferation and usability of the many new cloud based tools there is a trade off.

Here are a few tools you could use to protect your privacy while interacting online:

šTor Browser: https://www.torproject.org/
This system masks your location while you surf the internet.
šOff The Record - Chat Proxy: https://otr.cypherpunks.ca
This system adds a proxy to your chat conversations.
š
Mobile Chat:
You can avoid ads and mask your location by using a VPN app on your phones and these tools below can also encrypt your mobile text messages.
šIOS - Signal: https://itunes.apple.com/us/app/signal-private-messenger/id874139669?mt=8
šAndroid – SMS: https://whispersystems.org/
šhttps://play.google.com/store/apps/details?id=org.thoughtcrime.securesms

Email:
This takes a bit to set up but once you have this in place you can send encrypted emails between trusted parties.
šThunderbird: https://www.mozilla.org/en-US/thunderbird/download
šEnigma: https://www.enigmail.net/download/download-static.php
šhttps://whispersystems.org/

Fotosearch k21352061 300x300One of my favorite site for showing how prevalent cyber attacks are and note who is attacking or being attacked is to visit the Norse interactive real time threat map. http://map.ipviking.com

If you watch this long enough you can get a pretty good visualization of the threat landscape. Keep in mind this only show where the illicit traffic is going to or coming from. It does not show if these were successful or the results from potential penetration. Important though is that the traffic is significant and the odds are very much against you that somewhere along the line someone will eventually find a way in to your site or IT infrastructure.

The key here is to take as many proactive measures as possible to protect and fortify your systems.

Step one: Regardless of where you are in your organization learn about the various kinds of threats and how they could potentially impact your organization.

Step two: Identify the best tools and talent for protecting your assets and reducing risk if an attack on you is successful.

Step three: Have a recovery and response plan. Make sure there is a clear authorization, communication and accountability plan for resolving incidents effectively and efficiently. Remember most often a response will be required in the least convenient times for you and your response team.

Step four: Have a clear follow up plan so you can implement proactive preventative measures in the future and have documentation of lessons learned.


It is imperative if you are a business owner or manager that you you remain involved in the strategic planning and prioritization of security in your business plan. However, most often you are busy running your business and supporting your customers. This means you just need your site to run smooth and have someone looking after and monitoring the state and condition of your web site and IT infrastructure. This is where a carefully matched service provider can assist you in getting the best protection and response plan in place. They can monitor and help you maintain your online assets to protect from costly downtime, intrusion liability, potential public embarrassment or interruption of service to your customers.

In conclusion I would highly recommend that you take the time to carefully craft a security response plan and hire a professional team to help protect and maintain your online programs. Like they say it is always quietist before the storm so it is better to plan ahead vs having to figure this out in response to a crisis.

Joomla is standing tall as the most secure open source platform and the community continues their proactive response to keeping this a priority. Today Joomla released an important security patch and all Joomla users should immediately upgrade. This is a security release for the 3.x series of Joomla which addresses a critical security vulnerability. All of us here at CNP and throughout the Joomla community recommend that you update your sites immediately. This release only contains the security fixes; no other changes have been made compared to the Joomla 3.4.4 release.

Joomla! 3.4 - Do More

What's in 3.4.5

Version 3.4.5 is released to address three reported security vulnerabilities and includes additional security hardening of the UploadShield system.

Security Issues Fixed

  • High Priority - Core - SQL Injection (affecting Joomla 3.2 through 3.4.4) More information »
  • Medium Priority - Core - ACL Violations (affecting Joomla 3.2 through 3.4.4) More information »
  • Medium Priority - Core - ACL Violations (affecting Joomla 3.0 through 3.4.4) More information »

Please see the documentation wiki for FAQ’s regarding the 3.4.5 release.

Our Clients

  • State of Washington
  • City of New York
  • Environmental Protection Agency
  • National Forstry Service
  • The United Nations
  • International Labour Organization
  • Survival Alliance
  • Columbia University
  • Eat Right Missouri
  • Seattle Police Department
  • General Dynamics
  • Kindred Readers
  • Baskin Robins
  • Truth Out
  • Puget Sound Partnership
  • MA Cheese Guild
  • Fire Your Shrink
  • Dick n Sons
  • American Society of Microbiology
  • Zion Adventures
  • Green Collar Media
  • All Pets Emporium
  • Calafornia Association of Non Profits
  • Bay Area Video Coalition
  • Wedding Style Magazine
  • Xcentric Records
  • Prolink
  • Your Training Place
  • Salus training Solutions
  • A&H Training
  • C&C Group
  • Mindset Works
  • The New School
  • Hospice & Palliative Care of Greensboro
  • The Venus Project
  • North American Wilderness School
  • Safeway Medical
  • Advisor Resource Pages
  • Element Reality

And many more...

Joomla Portfolio