Smart cities, connected devices, digitized records, as well as smart cars and homes have become a new reality. Your sensitive, personal information is the fuel that makes smart devices work.
While there are tremendous benefits of this technology, it is critical to understand how to use these cutting-edge innovations in safe and secure ways.
Privacy Will Be a Major Concern
The United States government recently repealed internet privacy laws allowing internet providers to share user information with third parties and advertising firms without user consent.
The bill, which had not yet gone into effect, would have made it so Internet Service Providers would have to obtain permission to collect and share their data from users.
In the future, we will continue to see arguments over the degree of privacy users can expect from internet service providers and other businesses. You must be aware of the data you share online by reading privacy statements that are posted on company websites and forms. It is imperative to understand how your data will be used once it has been surrendered.
As a consumer, you cannot assume your data will not be shared or sold to third parties.
A Continued Shift to the Cloud
An increasing number of organizations are moving to the cloud because of the benefits it affords them. In the future, we will continue to see both commercial and government infrastructure migrate to cloud platforms.
Spending on public cloud computing is expected to rise from $67B in 2015 to $162B by 2020. However, when shifting from traditional infrastructure to a public cloud deployment, companies give up their data to cloud service providers who are then responsible for the confidentiality, integrity, and availability of that data.
Internet of Things (IoT)
Cars, medical devices, and other products will continue to be produced with network capabilities, increasing potential vectors for cybersecurity threats.
There are expected to be 20.4 billion IoT devices connected to the internet by 2020.
Part of the problem with these IoT devices is that patches are not regularly rolled out like they are for regular computer systems.
Patches for IoT devices are an afterthought, leaving devices vulnerable to attack. After purchasing an IoT device, consumers should download any new patches that exist and change the default password if they can.
Patching will help remediate known vulnerabilities that exist, while changing the default password to a complex password will defend against password guessing and password-cracking software.
Incorporating security into the design of components used in the Internet of Things (IoT) is essential for securing the cyber-physical infrastructure upon which our society depends.
– Information provided by StaySafeOnline.org
National Cyber Security Awareness Month
For additional information, visit the Office of Information Technology’s Cybersecurity website.