Huawei poses security threat to UK, says former MI6 chief

Huawei poses security threat to UK, says former MI6 chief

Report calling for 5G ban in UK comes as Netherlands said to be investigating Huawei espionage Huawei should be completely banned from supplying 5G mobile networks in the UK because its operations are “subject to influence by the Chinese state”, according to a report by
/
How Microsoft builds empathy between its security and development teams

How Microsoft builds empathy between its security and development teams

How would you describe the relationship between your organization’s security and development teams? Chances are, you’d use words like “tense” or “distrustful.” That’s because the two groups often feel they are working at cross-purposes and getting in each other’s way. Security sees themselves working to
/

Citizen Engagement Literacy

The term “engagement literacy” is not commonly-used at this moment, but it is a concept that bears greater attention in an age where personal data is king. Citizens and consumers now provide two currencies to the retailers and companies around them. The first is actual money, transferred either electronically or by hand, but the second, which has much greater value, is that of data. Data has far greater ability to shape the future of a vendor’s business, since it compounds quickly when added to, or compared with other data.

data education passwords

Consumers are generally not aware of the power of this data. Tracking technologies and data gathering techniques used by websites, many of which have been around for years, are largely ignored, as is password management. So let’s look at these two in the context of citizen engagement literacy.

Engagement through Password Literacy

Many of the hacks and cyber-attacks that happen daily can be traced to human nature, including inadequate password strength, phishing scams, or simply being too trusting. People also resist having to memorize or carry numerous passwords, especially when they are long strings of unintelligible characters. Entire papers are dedicated to this topic, but for the purposes of this article, the point is this: there are many sophisticated and often free password management applications available that can take care of the creation and maintenance of strong passwords. It is up to the citizens themselves to learn how to use these, with the same degree of comfort and habit as they would with their home alarm system. That comprises part of “literacy” in the digital age.

Engagement through Data Literacy

Data

In a related fashion, customers must become more aware of the data they share and the power they have over this data. Very soon, more and more retail stores will start to take advantage of smartphone-based apps to identify shoppers and enhance the in-store experience by making offers based on past browsing and purchasing activities. Sales associates may even greet shoppers by name. Some people feel this is too much, even invasive, but the point is, the individual consumer can and should exercise control over which data is made available and to whom. Apps and online profiles have privacy settings, but too often these appear complex and intimidating to the average user.

Engagement Literacy

Engagement literacy is a requirement for functioning in the wireless world. As a comparison, in the physical world, most people can read and drive a car. These abilities require training and practice to master, but most people find they are able to do both (and sadly, with texting, they feel they can do both simultaneously).

Engagement literacy is something that should be taught, and more importantly, is something that citizens must recognize as essential to maintaining personal control while enjoying the growing benefits of a highly tailored retail and service environment.PrescriptionMeds

When the day comes that the smartphone entirely replaces the wallet, for payment, ID, medical information, and loyalty programs, there should be no fear. Managing and protecting the data that this smart phone can hold, including mitigation in the case of loss or theft of the device itself, should be effortless, comfortable and well-practiced. That is what engagement literacy is: privacy, protection and control of data – all in the palm of your hand.

For more on this topic, please visit businessvalueexchange.com, sponsored by HP Enterprise Services.

By Steve Prentice

Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

Microsoft Professional Program in Cybersecurity

Microsoft Professional Program in Cybersecurity

As the number of cyberthreats continues to increase, the demand for skilled cyber professionals is also growing. Become knowledgeable on the wide set of skills that will allow you to start or grow a cybersecurity career. Protect. Describe the current threat ...

$990.00Learn More

Certificate Program: Essentials of Cybersecurity

Certificate Program: Essentials of Cybersecurity

What You'll Learn: Describe the vast array of roles and sectors within the Cybersecurity industry; Explain the relationship between management and technology in cybersecurity protection; Identify appropriate types of security controls to the actions of different and evolving threat actors; ...

$396.00 $356.40Learn More

Leading Multicloud Strategies

What’s Ahead for Cloud in 2019

The Cloud In 2019 2018 was an incredible time for cloud. Its impact on customer experiences, business processes and models, ...
Mitigating the Downtime Risks of Virtualization

Mitigating the Downtime Risks of Virtualization

Mitigating the Downtime Risks Nearly every IT professional dreads unplanned downtime. Depending on which systems are hit, it can mean ...
6 Best Practices For Increasing Security In AWS In A Zero Trust World

6 Best Practices For Increasing Security In AWS In A Zero Trust World

AWS Security Best Practices Enterprises are rapidly accelerating the pace at which they’re moving workloads to Amazon Web Services (AWS) ...
A Smart Data Approach to Assurance in a Hybrid Cloud Environment

A Smart Data Approach to Assurance in a Hybrid Cloud Environment

Smart Data Approach Microsoft and Amazon both reported significant growth in their cloud businesses recently. Revenue for Microsoft’s Azure increased ...
Survey: 87% of Businesses Are Confident About Cybersecurity

Survey: 87% of Businesses Are Confident About Cybersecurity

Businesses Confident About Cybersecurity In a year that has seen multiple massive data breaches and troubling cyberattacks, a new survey ...
Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has ...
12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services For Your Company

Business Intelligence Companies and Services Business Intelligence (BI) services have recently seen an explosion of innovation and choices for business ...