Technology: The World’s Weapon of Mass Disruption
In the world of technology, one could say we live and die by the sword. Disruptive technologies have changed our world for the better, but they can also be exploited as a weapon to disrupt our daily lives, including our ability to buy things, get medical treatment, travel and even have electricity.
In the world of technology, one could say we live and die by the sword. Disruptive technologies have changed our world for the better, but they can also be exploited as a weapon to disrupt our daily lives, including our ability to buy things, get medical treatment, travel and even have electricity.
Most recently it took the power of celebrity to bring attention to cloud vulnerabilities. While the world focused on the photos and victims, the real issue needing attention was cloud security. Most consumers upload and store files daily without ever knowing where the servers are located and what type of security is protecting the system and network infrastructure. Intellectual property laws are different in every country, so pursuing hacks can be an arduous and costly task.
In the News Again
Another U.S. retailer recently announced the possibility of a breach. This is happening with greater frequency because vulnerabilities that were exposed more than a year ago have not been addressed. Dated card technology combined with hacker prowess provides a ripe environment for this type of disruption. While the retailer released a statement that it would reimburse any losses, the disruption alone will cost both the retailer and the consumer time and money to repair.
What Are We Learning and, Better Yet, What Are We Doing About It?
Cloud platforms, applications and storage have revolutionized the way we deliver and consume data, but with that comes a huge responsibility to protect users and data. Take an inventory of what file-sharing programs are being used. Note, for every one file that is uploaded, a share occurs at least three times.
Partnering with the right business, technology and education partner, like Ingram Micro, is the first step. Next, work with the partner and reseller to set business goals. Then determine the right mix of infrastructure, software and security to meet those goals. Security should involve all aspects of the business—including executive leadership, IT, HR and legal—to be effective. Then be prepared with a disaster recovery plan and keep it updated. Make sure it includes a communication plan to employees and customers.
What’s in Your Wallet?
Never say, “That will never happen to us.” I know too many IT folks who have eaten their cavalier words. Each day, there are hackers who put on a suit and go to work; their sole job is to create breaches. You may think they are lone wolves sitting a basement doing this for fun. Hacking is big business and very well-funded. Credit cards in the United States will need to be updated to chip or another more secure technology. It will be costly, and it will undoubtedly be passed onto the consumer.
Technology is a global asset and a weapon. As technology advisers and users, we have to stay educated on risks and opportunities, or suffer the consequences of not being prepared. Ingram Micro Training specialists are available to answer your questions on cloud and security. For more information, visit ingrammicro.com/training/NA.
Nina Buik is Principal Marketing Manager, Global Training Services, Ingram Micro Professional & Training Services. Guest blogs such as this one are published regularly and are part of The VAR Guy’s Business Acceleration InfoCenter.