To see if a web site is secure, we have been trained to look for the padlock in the browser. Sadly, not all padlocks are the same…
The boundaries to technology are ever shifting. The development of our systems are not always a bad thing when you consider that precision and the sharing of information contribute to something as important as saving lives. Despite the negative effects of data theft avoiding technology is not an appropriate way forward.
‘Mitigating’ the dangers associated with introducing new processes, hardware and software into our lives, business or personal is the responsibility of each of us as individuals. Mitigative measures need to be made on a reflective and ongoing routine method. Amidst the Deloitte crisis it was recognised that these principals were not followed. Notably, the Guardian remarked that Deloitte had also fallen, “victim of a cybersecurity attack which went unnoticed for months.”
So it’s not a question of can we completely defend against hacking, because as shown, even the largest companies in the world can be affected. It is more about practicing proven strategies to keeping up with the fight against cyber security breaches and malware infiltration.
Based on an article written by The Guardian: https://www.theguardian.com/business/2017/sep/25/deloitte-hit-by-cyber-attack-revealing-clients-secret-emails
Data scientist Cathy O’Neil comments on how algorithms — “under the guise of math, fairness, and objectivity — reinforce and magnify the old biases and power dynamics that we hoped they would eliminate.”
Network providers and digital must be responsive to new legislation from the European Comission. It outlines the necessity of data sharing for government service use, clarity with it’s customers and consistency of service. Despite these aims being high on the agenda for years, Lightreading sees a refocus of data protection and management in the latest discussions.
“The European Commission is proposing new rules that will effectively extend existing restrictions on the use of customer data so that they apply to OTT services such as WhatsApp, Facebook Messenger, Skype, Gmail, iMessage…
The UK’s Cyber Essentials Scheme took a major step forward at the beginning of this year when the UK Ministry of Defence (MOD) mandated that its suppliers need to have obtained a Cyber Essentials certificate…
The internet has bought to civilization both pleasure, but has simultaneously paved the way for misery. An unprecedented form of crime which is difficult to prepare and prevent from happening is cybercrime, and as hackers become more knowledgeable, it is essential the regular citizen is aware of its developments. The Times recently headlined an article on the significance of the ‘Dark Web’ in a major credit card scandal, where millions of customers details have been stolen. The Dark Web is an incredibly secret and arguably also dangerous realm, which involves online criminality.
The Times cited a scandal involving the retrieval of millions of credit card and personal details by unauthorised access. These are currently on sale on fraudulent websites, one of which is bestvalid.cc. But protecting customers does not lie in the removal of the website- these websites may easily be restaged under a different domain name, also untraceable to the original perpetrators. The most worrying aspect of this article is the claim to the “authenticity” of the appearance of the website. This suggests that consumers are all equally as vulnerable to being persuaded into entering their details.
Anonymity can mean the paths of cybercriminals are harder to track. There are hundreds of websites operating on servers which are rerouted to avoid pinpointing perpetrators. A real concern is, these crimes are often not isolated- they are usually part of a wider network of organised crime. Anonymity empowers the cybercriminal as it allows an offsetting of responsibility onto younger, groomed and ill-informed people. This, in conjunction with hackers and coding becoming more complex and sophisticated, means that pinpointing a leader in the crimes can become nearly impossible. Unlike other forms of crimes which are based on tangible evidence and trail, coding can prevent and pervert the cause of justice.
Cyberspace and security are issues which are part of an uncertain and expanding market. It is essential that both businesses, employees and customers are constantly educated as a part of the process to minimalizing cyber crime. To manage uncertainties, protocol which may be implemented are practice drills of how to manage an intrusion (ethical in house hackers). This can be beneficial to protecting the business image and data, (PGI 2015- cyber crime conference attended recently).
In conclusion the Dark Web is and should be an intrinsic part of business and personal agendas. As the reliance on online spaces increases, measures need to be taken to ensure these are made more secure than they currently are.
***All credit for the article in the picture goes to Emilia 1st year PPE Student, LSE, in The Beaver, Week 03/02/16-09/02/16***
A series of events have been organised to take place between 08/02 – 11/02 at LSE, to raise awareness about unlawful privacy violations. The events essentially are to inform LSE students of their rights that are being impinged upon due to the way governments around the world are conducting themselves in accumulating personal data about individuals. Many intrusions are unfounded so are unlawful. We have a several speakers planned, including a workshop by Ed Johnson Williams Open Rights Group, Anthony Glees, a Politics Professor from The University of Buckingham, and director of its Center for Security and Intelligence studies. Alongside these events, a cupcake sale will accompany, to raise money for ‘Don’t Spy on Us’.
Attend our events on Facebook, I look forward to seeing you there!
Momentum is finally gathering toward the student run Amnesty Anti-Mass Surveillance campaign at LSE.
The concept is based on the Amnesty International campaign with the same intentions. The aim of the movement is to inform students and encourage discussion about the rights of governments to access personal digitalised information. We also aim to equip students on how to ‘clean’ their devices periodically, to prevent over tracking of information. We have several renown speakers lined up for the campaign week. These, I will inform you all about closer to the date.
Watch this space!
In order to use your credit card abroad, you’ll need to contact your card provider. Sometimes, your card is declined if you do not inform them that you are planning to use it. This is a preventative measure to the credit card holder against unauthorised use or credit card detail fraud.
Forbes Marc Tobias highlights that many of the issues which come up when using your credit card abroad, can be avoided, or its negative consequences protected against, by taking advantage of a few services which can provide emergency support and assistance when you need it. Although the article is almost 2 years old, it is still relevant.
So I have decided to repost it.
Keep up to date with content and follow this blog