Has The Public Gotten Use To Privacy Violations?

Has The Public Gotten Use To Privacy Violations?

We keep talking about how we want to keep our privacy in this new world of information sharing and consumption but that is getting increasingly hard to do. The governments of the free world understand the value of information monitoring and know the merits of not trusting anyone, not even its own people. They know that to protect its sovereignty and its people, it must be willing to violate some trusts. That is why for the past few years any news that relates to breaches or the possibility of one becomes one of the most hotly debated topics on the web. But because this has happened so many times and with the results being so anti-climactic, very few people to actually matter have felt the extreme effects of it, the buzz around the issue is down to a simmer rather than a violent boil. People have slowly become accustomed to putting information in public places and have heard so many news stories about privacy issues, and since they have not felt its repercussions, they have subconsciously dumbed down the threat of such violations.

The public is a fickle creature which can be easily controlled by the mass media. People easily believe what they see and read in news stories being fed to them by the government as long as it comes from “credible” source or there is an “expert” being associated with it. The problem is that some of these news and articles are in some way or another meant to make the public complacent with the growing problems being faced in today’s cyber world which to the dismay of many security experts is still being fanned by the emergence of Cloud Computing services and technologies.  Because of Cloud storage and data syncing, it has become very easy for people to get a hold of other’s data just by the information they can find publicly about a person through social networking sites like Facebook, Google+ and Twitter. Because as you know, the most basic security questions to retrieve account names and passwords that are being used are simple things like the birthdate, mother’s maiden name, pets, or schools that a person has gone to, all of which are even shared publicly by most people. It’s also easier to track people. For example, the Facebook check-in function may allow another to know a person’s exact location if the check-in has been made public or if the person is a “friend” or has been “followed.” Newer technologies also solidify the apparent privacy concerns we are facing now.

Cloud Computing only serves to provide cyber criminals with a wider market field and a richer source for information. Sure, a lot of measures are being taken to hamper the above threats, but what man has made another man can undo eventually. Our safety now lies in the hands of security experts who are in a constant back and forth dance with cyber criminals.

By Abdul Salam

Sorry, comments are closed for this post.

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…