Mark Barrenechea
Mark Barrenechea

So are Bad and Stranger Things—the Negative Impact of Technology

Negative Impact of Technology

Cyberattacks and information breaches are happening every day, from influencing the outcomes of elections to bringing down businesses to massive data breaches of personal information. In fact, every 39 seconds a company in the U.S. is hacked and one in three people are affected.

And the activity is only growing.

Each year, the World Economic Forum releases its Global Risks Report to identify and analyze the most pressing risks that the world faces. In the 2018 report, those surveyed were most concerned about environmental and cyberthreats over the next decade, along with geopolitical tensions. In their view, future risk will be created by either “Acts of God” or machines.

Ai Draft

A Zero-Trust Environment

From stolen Intellectual Property (IP) to personal accounts being compromised to ransomware WannaCry, businesses must navigate a zero-trust world. Operating in increasingly litigious environments, organizations in all industries will need to continue to architect their systems and the data they collect in secure and compliant ways to protect themselves and maintain competitive advantage.

A telecommunications company was breached by a nation-state when hackers stole the company’s design documents. The company ultimately went out of business, in part because the stolen documents were shared with a key competitor. This is an example of cyber-espionage, with an attack originating from competitors or nation-states trying to steal business plans, trade secrets or IP — and it could happen to any company.

Malware is another example of a cyberbreach. A state-owned oil company was attacked through a phishing email scam that infected tens of thousands of workstations. As much as 75% of the infrastructure in the company was affected and it shut the company down for two months.

Not only are companies in danger, people’s lives can be at risk. WannaCry, the biggest ransomware attack in history, infected 300,000 computers across more than 150 countries. WannaCry’s impact was particularly pronounced at hospitals in the U.K., where more than 19,000 appointments were cancelled and computers at 600 emergency departments were locked down.

But not all breaches are a result of cyber-espionage or hacking. Many are inadvertent results of insider privilege and misuse. There have been many examples over the past decade of these types of cyberbreaches, where personal credentials and sometimes money are stolen. The Intelligent and Connected Enterprise will have to be vigilant against the creative, clever and targeted arsenal of hackers today or risk having its business disrupted. 

Technologies like AI will make cyberthreats more targeted and creative. Take image recognition, for example, used for identity theft. Over the past five years, AI has improved from correctly categorizing images with 70% accuracy to 98% (near perfect categorization), which exceeds the human benchmark of 95%.

From the bad, there is the downright strange.

Our social media data determines our social status, or at least a portion of it. What happens when your social data can no longer be trusted as an accurate representation of yourself as a “good citizen” in society?

In Shanghai, for example, a government-backed company has legally collected data on every citizen. Honest Shanghai, a rating app for citizens in Shanghai, is one of many social credit systems run by local governments. It is part of China’s goal to establish a nationwide social credit system by 2020.

Scores are very good, good, or bad. Those with a very good score enjoy more government services or perks, like discounted flights or lower interest rates for loans.

I, for one, am skeptical. If the government is watching everyone else, who is watching the government?

And on a stranger note, to illustrate how data can truly be manipulated by technology, researchers from the University of Washington perfected a facial recognition algorithm and a mouth movement algorithm to model how someone speaks. These AI deepfakes are now as simple as typing whatever you want your subject to say.

In another example, Emma Gonzalez, Parkland shooting survivor, fell victim to the same kind of media manipulation when fake news published a tampered image of her tearing up the U.S. Constitution on social media sites. Single tweets have the power to wipe out billions in capitalized worth. The Intelligent and Connected Enterprise will look beyond protecting the systems in its control to monitoring its presence in the wider, online (social) community. 

In this era of fake news, what are your thoughts on AI applications that manipulate (like deepfakes)? In what ways can technology like this help the enterprise?

By Mark Barrenechea

Daren

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security

Kayla Matthews

6 Reasons More Organizations Are Adopting Zero Trust

Organizations Adopting Zero Trust The zero trust model is becoming more commonplace in security. It’s based on the realization that

David Friend

Data Centers Need to Wake Up and Compete with the Hyperscalers

Data Centers Need to Wake Up and Compete with the Hyperscalers Win Customer Hearts & Minds and Become a Trusted

Wired Logo

Toys “R” Us Is Back—Now With More Surveillance!

Reports about the toy store using cameras to track shoppers caused an uproar, but the companies behind the tech insist

Samsung

Developing AI ScaleNet: Enabling Seamless, High-resolution 8K Streaming

It’s official: We’ve entered the era of 8K TVs. Around the world, sales of 8K displays are steadily increasing, and

Citrix Bw

Zero Trust – The Citrix Way

Whack-a-mole (noun); “An arcade game in which players use a mallet to hit toy moles, which appear at random, back