MSG Team's other articles

12046 Work Study and Industrial Engineering

Introduction To survive in the current competitive and global environment, it is important for the organization to continuously look at ways to improve efficiency and productivity. It needs to discover a new, easy and cost-effective way of manufacturing or providing services. Work study and industrial engineering play important role in job simplification, job design, job […]

12781 Step 1: Collect and Review Primary Information

The project begins when the top management assigns responsibility to the Project Champion. The Project Champion usually delegates the task of preparing the Project Charter to another team member. It is important for both the Project Champion as well as the team member to understand what information is required. Here are tips on how to […]

9115 Emerging Trends in Information Technology

Introduction 21st century has been defined by application of and advancement in information technology. Information technology has become an integral part of our daily life. According to Information Technology Association of America, information technology is defined as “the study, design, development, application, implementation, support or management of computer-based information systems.” Information technology has served as […]

12613 The Canadian Housing Bubble

Canada is a developed western nation. It does not get nearly as much attention in the world media as it should. This is the reason why Canadian housing market is not being displayed in the news by the mainstream media. Right now the market is going through an incredible bull run. The prices are rising […]

8949 Digital Payments: What they are, How they Work, and their Benefits and Problems

In recent months, all of us have heard extensively about the “war on cash”, the move to make India and other countries “cashless economies” and the general trend among policymakers worldwide to move the economies of the world to a digital and information enabled paradigm. In this context, it is worth noting that the emphasis […]

Search with tags

  • No tags available.

Data Security in the News for All the Wrong Reasons

The issue of data security has been in the news in recent months. First, there were reports of hacking of computers in the Presidential Election of 2016 where Russian hackers were alleged to have hacked into the computers of the Democratic Party and reveal insider information designed to help Donald Trump, who was the Republican Candidate to win.

Next, in recent weeks, there was much noise about how Facebook had allowed Third Party Apps to access the personal data of its users and thereby compromising on the issue of protecting such data which is the cornerstone of their privacy policy.

Lastly, in India, there was much controversy over how the Governmental flagship Biometric Identification project, Aadhar, and the data associated with it was compromised by sundry individuals. In addition, the news is full of how so and so corporate was hacked and its sensitive data stolen along with reports of individuals being scammed online and how their bank accounts are being hacked.

Thus, it can be said that in an age where almost all are online either through computers or through Smartphones, data security has become the Holy Grail of our times.

Why Data is the New Oil and What it Means

What these incidents reveal is the increasing importance of personal data to the Tech companies and how access to such data can indeed make them and their partners very rich.

Indeed, many experts opine that Data is the New Oil wherein access to consumer data for data mining and harvesting the personal information for marketing and advertising as well as more sinister purpose of profiling them or targeting them with criminal intentions has now taken center stage.

Thus, the Big Five Tech Giants, namely, Facebook, Amazon, Apple, Google, and Microsoft, are all collecting humungous amount of personal data from their users and harvesting such data for profit.

Further, the fact that these firms also sell such data to Third Parties means that the problem of data security extends to unknown realms as well wherein anyone who has that data can use for both good and bad purposes.

In addition, since personal data is valuable for anyone who wishes to target such users by marketing and advertising as well as for political and economic purposes means that all of us have to be extra careful in what we reveal about ourselves online and how much personal information are we sharing with sundry firms.

How to Protect Yourself Online

So, the next time you sign up on a website or an app or even for that matter, allow Third Party Apps to access your Social Media accounts, be mindful of how much and what information you reveal about yourself.

Indeed, while annoying ads and intrusive marketing might seem bothersome, there is other more important and sinister ways in which your data can be used for nefarious purposes. For instance, pesky telemarketers might bother you with their incessant calling and mails as well as mobile messages, sometimes; it can extend beyond this and include hacking and other criminal activities targeted at your bank accounts as well as other vulnerable financial aspects.

All of us who are online would have received emails, calls, text messages, and other targeted marketing and some of us would have no doubt experienced the scam mails asking for contact information that can lead to you losing money in the process.

Thus, no one is safe online and hence, one has to be very careful about what and how much information one reveals as well as the Digital Footprints one leaves behind on the internet and indeed, on Smartphones as well.

The Tech Firms and the Governments Have to Act as well

Having said that, it is also the case that no matter how much we try, there are some basic details which we have to share online. For instance, how many of us can avoid having Email Accounts and how many of us can desist from using Smartphones for browsing and communication as well as shopping and eCommerce and mCommerce.

Further, when the Government collects personal and biometric information about us through Aadhar and other initiatives, we really do not have a choice but to part with such information.

Thus, it is incumbent upon the Tech firms and the Government who collects and gathers our data to use it in a safe and reliable manner as well as have robust safeguards against the nefarious use of such data.

In addition, we can also subscribe to security providers who shield our online behavior and warn and protect us when such services feel that we are giving away too much information or accessing dangerous websites and apps.

Indeed, it is a very good idea for those who spend a lot of time online to go in for identity protection as well as secure protocol based apps that block unwanted content from being downloaded on our computers and Smartphones.

Conclusion

Lastly, as mentioned earlier, since Data is the New Oil, the battles over data mining and data harvesting are only going to become shriller and hence, it is high time the regulators and the other stakeholders design measures and put in place measures to ensure that our data and personal information is secure online.

In addition, it is also our personal responsibility to ensure that our online and mobile activities are secure as well as we only reveal what is needed and be extra cautious when we allow login using our social media accounts.

Article Written by

MSG Team

An insightful writer passionate about sharing expertise, trends, and tips, dedicated to inspiring and informing readers through engaging and thoughtful content.

Leave a reply

Your email address will not be published. Required fields are marked *

Related Articles

Components of Commercial Value Chain

MSG Team

The Changing Face of Business Environment

MSG Team