Has The Public Gotten Use To Privacy Violations?

Has The Public Gotten Use To Privacy Violations?

We keep talking about how we want to keep our privacy in this new world of information sharing and consumption but that is getting increasingly hard to do. The governments of the free world understand the value of information monitoring and know the merits of not trusting anyone, not even its own people. They know that to protect its sovereignty and its people, it must be willing to violate some trusts. That is why for the past few years any news that relates to breaches or the possibility of one becomes one of the most hotly debated topics on the web. But because this has happened so many times and with the results being so anti-climactic, very few people to actually matter have felt the extreme effects of it, the buzz around the issue is down to a simmer rather than a violent boil. People have slowly become accustomed to putting information in public places and have heard so many news stories about privacy issues, and since they have not felt its repercussions, they have subconsciously dumbed down the threat of such violations.

The public is a fickle creature which can be easily controlled by the mass media. People easily believe what they see and read in news stories being fed to them by the government as long as it comes from “credible” source or there is an “expert” being associated with it. The problem is that some of these news and articles are in some way or another meant to make the public complacent with the growing problems being faced in today’s cyber world which to the dismay of many security experts is still being fanned by the emergence of Cloud Computing services and technologies.  Because of Cloud storage and data syncing, it has become very easy for people to get a hold of other’s data just by the information they can find publicly about a person through social networking sites like Facebook, Google+ and Twitter. Because as you know, the most basic security questions to retrieve account names and passwords that are being used are simple things like the birthdate, mother’s maiden name, pets, or schools that a person has gone to, all of which are even shared publicly by most people. It’s also easier to track people. For example, the Facebook check-in function may allow another to know a person’s exact location if the check-in has been made public or if the person is a “friend” or has been “followed.” Newer technologies also solidify the apparent privacy concerns we are facing now.

Cloud Computing only serves to provide cyber criminals with a wider market field and a richer source for information. Sure, a lot of measures are being taken to hamper the above threats, but what man has made another man can undo eventually. Our safety now lies in the hands of security experts who are in a constant back and forth dance with cyber criminals.

By Abdul Salam

About Abdul

Abdul is a senior consultant with Energy Services, and author of numerous blogs, books, white papers, and tutorials on cloud computing and accomplished technical writer with CloudTweaks. He earned his bachelor’s degree in Information Technology, followed by an MBA-IT degree and certifications by Cisco and Juniper Networks.

He has recently co-authored: Deploying and Managing a Cloud Infrastructure: Real-World Skills for the CompTIA Cloud+ Certification (Wiley).

View All Articles

Sorry, comments are closed for this post.

How Does IT Operations Management Help Enterprise IT?

How Does IT Operations Management Help Enterprise IT?

IT Operations Management Rapid change is the new constant with today’s Enterprises. There is a continuous shift in the technology landscape and the demands of the customers coupled with Enterprises wanting to stay competitive. This changing, fluid environment results in concurrent changes with IT infrastructure. Enterprises today are turning to IT Operations Management to bring…

Conquering Disease with Artificial Intelligence and IBM Watson

Conquering Disease with Artificial Intelligence and IBM Watson

Artificial Intelligence and IBM Watson Artificial Intelligence, or AI, is growing increasingly pervasive in today’s modern world. Perhaps the most publicized and recognizable application of AI to date, IBM’s Jeopardy-winning computer, Watson, is now being used to help cure cancer. IBM announced the development of Watson for Genomics on Wednesday at the National Cancer Moonshot…

The Fundamentals of Predictive Analysis

The Fundamentals of Predictive Analysis

Predictive Analysis  Article sponsored by SAS Software and Big Data Forum Analytics is playing an increasingly important role in our lives thanks in large part to internet of things (IoT) developments and a greater appreciation of Big Data. With solutions that range across business productivity, health care, individual and national security, new insights are regularly…

Clouding Around With The Unicorns

Clouding Around With The Unicorns

The Social Unicorn Early investors and technology consumers alike love the poignantly named “Unicorn” companies, or private startups that reach the $1 billion valuation. The most recent unicorn spotting is social media game-changer Snapchat, which was recently valued at $16 billion. According to a recent infographic from Alexa discovered via Adweek, Snapchat also proves to…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Cloud Above Our Home

The Cloud Above Our Home

Our Home – Moving All Things Into The Cloud The promise of a smart home had excited the imagination of the movie makers long ago. If you have seen any TV shows in the nineties or before, the interpretation presented itself to us as a computerized personal assistant or a robot housekeeper. It was smart,…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Recurring Revenue Business Metrics Recurring revenue is the secret sauce behind the explosive growth of powerhouses like Netflix and Uber. Unsurprisingly, recurring revenue is also quickly gaining ground in more traditional industries like healthcare and the automotive business. In fact, nearly half of U.S. businesses have adopted or are planning to adopt a recurring revenue model,…

The Monstrous IoT Connected Cloud Market

The Monstrous IoT Connected Cloud Market

What’s Missing in the IoT? While the Internet of Things has become a popular concept among tech crowds, the consumer IoT remains fragmented. Top companies continue to battle to decide who will be the epicenter of the smart home of the future, creating separate ecosystems (like the iOS and Android smartphone market) in their wake.…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps Whether it be enterprise apps or any other, if there is any heavy data that is going to be transacted in and through an app, then affiliating it with the Cloud becomes a must. And then an important question arises: How do you decide when to integrate your enterprise app with…