We bleed data daily.
Sites like Facebook and Foursquare, connected devices like smartphones, and the Internet of Things heralded by smart refrigerators, cars and FitBits – all these take our daily habits, our opinions and our impulses, generate a picture from the data, and send it out to the ether. Every single day.
Compromised privacy is the price we users pay for the convenience these services bring. But is the cost too onerous to bear?
In an ideal world, we can trust tech companies to keep our data safely under lock and key. But reality gets in the way: businesses, pranksters or criminals often take this data and use it to serve their interests, not yours.
Risks to Your Data
Data leaks can also emerge when Moore's Law gives way to Murphy's. In Australia, a completely wiped iPhone continued to download the old owner's voicemails for the new owner to hear. Telstra, the telecom provider involved, has yet to get to the root of the problem - “They know what the symptoms are,” explained Richard Thornton, the iPhone's previous owner, “but they don't know what the cause is.” The greatest risk to your data security comes from the booming cybercrime industry. A visualization of the world's biggest data breaches should make anyone nervous: a 2014 breach involving over 200 million personal records held by Court Ventures; a cyberattack at JPMorgan Chase that affected 76 million households; and $300 million in lost revenue due to a Russian hacking team gaining access to over 160 million credit and debit card numbers and reaching deep into the NASDAQ stock exchange itself!
Tech Companies Bear Responsibility
We can't put the genie back in the bottle. We want to keep the convenience of tracking our fitness and sharing LOLs on social media. We want to keep our data absolutely out of harm's way. But, we can't have both.
Tech companies must be primarily responsible for ensuring their users' data stay safe. Conscientious providers make use of protocols like HTTP/2 (where most client implementations take advantage of its mandatory encryption over TLS 1.2); and end-to-end encryption services (PGP for email; Tresorit for cloud storage) to keep their clients' data away from prying eyes.
As a growing amount of data courses through content delivery networks (CDNs), more providers now leverage these solutions as an additional layer of data security on top of their hosting infrastructure. For instance, on top of improving website access speed by caching content across servers in different parts of the globe, a CDN can act as a barricade against DDoS and other attacks on websites and Web applications.
What Providers Can Do
Far beyond dealing with infrastructure, providers also need to address the human factor – with actions as simple as restricting or controlling BYOD (bring your own device) policies and restricting access to individuals whose role in the organization do not require the use of sensitive data.
A 2014 report by McKinsey and Company sets out seven practices that optimize cyber resilience, or strength in the face of cyberattacks. These notably include performing a triage based on the risks and importance of assets, actively testing and deploying defenses, and integrating cyber resistance throughout the enterprise.
But the report asserts that the buck on data security ultimately stops at the C-suite: “Given the cross-functional, high-stakes nature of cybersecurity, it is a CEO-level issue, and progress toward cyber resiliency can only be achieved with active engagement from the senior leaders of public and private institutions,” it explains.
Growing Risk, Growing Liability
This is not to minimize the role of individual users in safeguarding their personal data – each of us is individually only as safe as our personal privacy habits allow. But with the data of millions of users on the line, tech companies are on the hook for all of them.
“The risk of consumer injury increases as the volume and sensitivity of the data grows,” explains Federal Trade Commission chairwoman Edith Ramirez – pointing out that leaky tech companies will answer to both their clients and regulators. “If they fail to secure the life cycles of their big data environments, they may face regulatory consequences, in addition to the significant brand damage that data breaches can cause,” Ramirez says.
Antivirus software is not enough. Apex Technology Services used its decades of IT and cybersecurity
experience to create budget-friendly network security packages every company needs.
Please take a moment to fill out your information so we can contact you directly regarding your request.
At IDEA Showcase at ITEXPO 2022, seven startups and entrepreneurs focused on transforming markets or creating new ones were able to present their uniq…
Diversity, equity and inclusion has come into greater focus due to cultural awareness, demographic shifts and current events.
The first thing to know about AI-influenced recruiting software is the user is responsible for the actions of the software.
Quality of life and the lack of a state income tax are factors contributing to the emergence of south Florida as a tech hub.
An effective marketing tactic has been utilized in order to make an effective promotion of platforms, come up with ads that evaluate specific audience…