technology

Digital Security: 5 Ways To Protect Yourself

Security will be top of mind in 2017. I know it has been top of mind for me lately. The increase of my credit/check card being stolen has increased tenfold within the last two years. That’s just me too. I’m just one single person amongst billions of other persons on this planet, so you can imagine how others may feel on this subject. That is why securing data will be topics of conversation for many IT professionals this year and for the foreseeable future as we continue to see the rise of internet hacking and theft. End users and technology service providers alike will look to detection and response as forerunners to wage this new battle.  According to Gartner, worldwide spending on information security is expected to reach 90 billion in 2017 with a 7.6% uptick from 2016.

Why are we seeing this trend?

swiss-cheese-analogy-1In the last few years, with the advances of mobile technology and IoT, we are now accessing the internet through many unsecured means. Think of it as Swiss cheese and there is literally a Swiss cheese model describing security, learn more here. The WiFi network at the coffee shop, the device, the application on the device, we have made ourselves vulnerable by allowing the conveniences of our technology to create gaps in our cheese. If the technological means (WiFi, device & apps) are not properly stacked, the holes in our Swiss cheese become exposed.

What you can do to protect yourself:

  1. Stay up to date on your software updates, especially on your mobile devices. This includes the applications you use on those devices as well.
  2. DO NOT save or cache your passwords for major accounts you login and use to transmit payments. And do not link your credit/check cards to those accounts for easy access later.
  3. Change your passwords frequently. Every 90-180 days is reasonable without driving yourself crazy. Don’t use the same password for multiple accounts. Example: Your email and bank account should NOT have the same password.
  4. Run AV/Malware software on your devices to prevent and detect an unwanted intrusion.
  5. Pay attention to suspicious emails with attachments. Usually you can spot a malicious email by its use of poor grammar but then again, hackers are getting smarter about it. Stay alert and check the email from addresses and double-check URLs are actually going to the site domain you are receiving the email from.

securityUnfortunately, there are a number of ways your card information can be compromised outside of email and infected computers. Card scanners are another increasing threat. What makes this rising threat frustrating is that scanners are so easy to get and even easier to use. Don’t believe me? Watch this.

Security is a constant moving target and the best way to combat it is to never lose sight of it. Stay aware of new threats as technology changes, stay up to date on your devices and apps you use, and finally, stay alert to accounts you maintain an online presence with.

 

http://www.erinalbertson.com

technology

NEXT-GEN DATA SECURITY

securitycommunityTo understand what next generation security may mean to us in the future, we must understand what it means today. Let’s boil the term security down.  What are we trying to secure? Data, right?  In today’s digital age, the evolution of 1’s and 0’s dominates the way we manage our lives, our finances, our businesses, and lately with the adoption of big data, we now allow the data to make decisions for us. Maintaining the integrity of the data, now ruling such a significant portion of our lives, could then be determined a top priority. We don’t want to go off making poor choices because we got the facts wrong. Ultimately, data security is simply the understanding and recognizing of the link between mastering data and protecting it.

idc-logoAccording to an IDC survey conducted, “84% of US Consumers expressed concern regarding the security of their PII (personally identifiable information) and 70% told IDC that their concern is greater today than just a few years ago.”

IDC goes on to explain just how much demographics can play a factor in preconceived notions of data security.  IDC finds that younger consumers, those aged 18-35, demonstrate a higher concern than the slightly older 36-50-year-old counterparts. So, we can see an uptick in a risk-adverse generation of users. These are the same consumers that will contribute to the adoption of new technology being pushed across all market sectors. It will be important for companies to maintain trust between those users and their data if they want to remain relevant.

iotMore devices are connected to the Internet than ever before. From our smart phones to our smart watches and fitness apps, to our smart homes, the rising phenomenon of the Internet of Things proposes security concerns alone. Per a new report from the Ponemon Institute, IBM, and Arxan, a staggering 80% of IoT applications and 71% of mobile applications are not tested for vulnerabilities raising more concerns for data security.

A new dawn is rising and the transformation of the digital landscape is changing. With new technology comes new threats, next generation data security will look to evolve from a data-centric solution to an extended, distributed networking solution which leverages many endpoints, multi-layer authentication, data tokenization, masking, and data loss prevention. We are already starting to see the expansion of this platform in financial industries with the increased adoption of Blockchain technology.

As the technology learns to advance, so will the rise of the cybersecurity professional. Job postings in the cybersecurity field have increased over the past 5 years, up 74%.

Digital transformation efforts are underway at most companies looking to deliver more value to their customers, but it does not come without the next generation costs to rise against new data security challenges presented.

http://www.erinalbertson.com

technology

BIG DATA SUCCESS STARTS FROM THE TOP DOWN

ceo-big-data-strategyWhat is big data? Big data is defined as extremely large data sets that can be analyzed to reveal patterns, trends, and associations, especially relating to human behavior and interactions.

Why is big data becoming an important factor in today’s digital business? Data by the numbers is quickly becoming the basis for competition in today’s agile marketplace. Analytics becomes a crucial way for companies leading big data initiatives to do business better by enhancing their customer experience, leverage strategies to innovate and increase the quality of products and services.

Gartner’s article, 100 Data and Analytics Predictions Through 2020, states, “By 2020, contextual predictive data streams — and the proprietary algorithms behind them — will be a top three service provider differentiator.”

Investments in big data require hefty investments not only in the technology to support it, but also the personnel resources necessary to organize and disseminate the value gathered. Companies wanting to achieve success and glean ROI, big data initiatives must warrant a strong relationship with corporate strategy. Big data leadership must start with the CEO. Top down is a proven, effective way to drive the organization to the intended vision. Think about it like this: big data is the cart and corporate strategy is the horse.

Motivation and inspiration are also the keys to success and often the CEO is the one who will advance the charge. Big data and managing business decisions based on numbers versus that good ole’ gut feeling proposes a difficult balancing act where we go against those natural instincts and trust the data instead.  This can often cause conflict with ideologies, but if the CEO is driving the vision, it will be hard to dispute. It will be imperative that the CEO is walking the walk and talking the talk. He or she must be the primary user and repeatedly show value of how analytics are supporting the corporate agenda to win business in the big data and analytics game.

http://www.erinalbertson.com

technology

Women in Technology

White Town's Women in Technology CD - Listen: Your WomanLately, I have come across quite a few articles discussing gender differences within the technology industry. Most recently was the discussion of IBM’s CEO, Virginia Rometty, and her inabilities to achieve the ‘big boy-golf club status’. (Article) Now I enjoy a good riff, especially when it comes to gender inequality, but this takes the cake. I suspect the author of this article achieved exactly what she set out to do: get people talking.

With articles of this nature, i.e.: gender inequality, I find the pulp resides in the comments. I have to admit, I love this stuff. People become so passionate and emblazoned with their opinions it almost always turns emotional erupting into a hair-raising, gun-slinging, and chaw-spitting discussion. People get caught up in their moments of stating points and lose their sense of reality. We live in a patriarchal society, people! End of discussion. So what if the tech industry is filled with a bunch of guys who want to be in an exclusive club? I commend all the women out there that have broken barriers and achieved success in this male-dominated industry. Good for you! Good for you, Virginia Rometty, for not getting caught up in the hype and good for you, Eileen Burbidge, for providing the platform for such an intense commentary.