Business Roundup Week Ending April 5

Google’s Universal Analytics Shutting Down for Good on July 1

  • Google is emailing users of its analytics products confirming that Universal Analytics will shut down as planned on July 1, 2024.
  • After that date, UA data will no longer be accessible via the Google Analytics front end or through its API.
  • Although Universal Analytics stopped tracking data in July 2023, many organizations still refer back to the old data for comparisons.
  • After July 1 of this year, that will no longer be possible.
  • If you want to save your historical UA data, it can be exported into Google’s BigQuery data warehousing service.
  • Google has a help document to step you through this process, and this Medium article is also helpful.

You May be Violating the California Invasion of Privacy Act (CIPA) Without Knowing It

  • The California Invasion of Privacy Act (CIPA) protects California residents from privacy violations when communications are recorded without knowledge or consent.
  • Passed in the 1990s to protect consumers against eavesdropping on phone conversations, the 9th Circuit Court has ruled that the law also applies to Internet communications.
  • In the last 2 years, hundreds of class action lawsuits have been filed alleging that website analytics, session recording tools, chatbots, and tracking pixels violate CIPA.
  • The recording of phone calls and Zoom calls also falls under this law, which applies if one party to the communication is a California resident, even if the business is not located in the state.
  • To comply with CIPA, businesses must disclose the practice in their Privacy Policy, or obtain consent through other means.
  • CIPA violations can result in fines of $2,500 to $10,000 per violation and up to a year in county jail.
  • Read more about CIPA from Termageddon.
  • Here are some additional helpful articles from law firms focused on the issue: BakerHostetler, JDSupra, and NixonPeabody.

Old School Hacking Tactics Still Plague WordPress Sites – How to Protect Your Clients

  • What are some common old tactics that hackers still use successfully to compromise WordPress sites?
  • Why is performing root cause analysis important when dealing with a hacked WordPress site, as opposed to just removing the malware and adding more security plugins?
  • How can analyzing access logs help identify the source and methods used in a WordPress site compromise?
  • What evidence in access logs distinguishes between a normal admin login and a hacker logging in with stolen credentials?
  • Why do hackers sometimes intentionally logout of WordPress after compromising a site, and what traces does that remove?
  • Get the answers to these questions and more in Thomas J. Raef’s recent article after performing a site cleanup.

Worth a Look

This article, Business Roundup Week Ending April 5, was published at Post Status — the community for WordPress professionals.

Leave a Reply

Your email address will not be published. Required fields are marked *

Leave a comment

Your email address will not be published. Required fields are marked *