Consumers are waking up to privacy

Consumers are waking up to privacy

Participating in modern society almost seems like a leap of faith in today's hyper-connected world, because almost everything we do collects our personal data from the moment we wake up to the moment we fall asleep Living simply as we always have In fact, we implicitly acknowledge that the organizations that collect, analyze and sell our data are in fact trustworthy and interested, even capable of protecting our most personal data and our privacy.

About the author Alex Willis, vice president of global sales engineering at BlackBerry. But with every new technology and privacy controversy that arises, it's clear that most of us haven't made such an acknowledgment. Instead, we simply choose to ignore these data-gathering machines, maintaining a wonderful kind of ignorance, assuming that their data and information is invalid, or abandoning the fact that we can't do much about it. Recently, a Bloomberg reporter detailed his extraordinary efforts to hide completely from Silicon Valley before finally giving up the same month as it proved too difficult and too little practice.

control

However, just because complete data control is almost an unachievable goal doesn't mean consumers won't wake up to the "data tax" they're paying. unintentionally. In recent weeks, headlines highlighting the misuse of personal data to form high-tech tools have multiplied, as media outlets turn to privacy breaches and gain attention. from the public Of course, the recent disclosures are surely just a drop in the bucket in the case of our invasion of privacy, and there is no evidence that large organizations have acted. inappropriately based on information collected from consumers. But in the wake of the controversial and viral FaceApp challenge, this seems to mean a growing awareness among consumers that privacy matters and that our personal data is often not as secure as we think. In fact, this was a red flag for how consumers voluntarily hand over data to companies around the world and highlight the question of whether that data is truly secure. Naturally, privacy and security issues are unique unto themselves, and organizations will use different tactics to respond to each one. For example, continuous authentication is a useful Internet security measure to ensure that a user's stolen data is not just accessible. This makes it an extremely effective first line of defense, but not the only line of defense.

Trust and belief

However, what is becoming increasingly clear is that consumers are beginning to take notice of the true value of their data and the ease with which they choose to share it. It is a golden opportunity for organizations or a catalyst for their eventual downfall. This idea starts with the seemingly counterintuitive notion that zero trust is necessary for all trust to exist. It may sound confusing, but it stems from the simple idea that trust must be at the center of all interactions and transactions between organizations and the public. Credible trust depends on security, confidentiality, and control. This means that the public thinks that the organization secures its data, uses it only as necessary, and voluntarily allows the consumer to decide where that data ultimately goes and how it is used, especially with regard to cloud storage. To ensure this Public belief, enterprises should adopt a zero-trust model based on continuous tenant cybersecurity identity authentication, because once your identity is compromised, everything is compromised. And as we learn, every business collects part of our identity, whether it's our physical photo, our voice, or even our DNA, making every business a potential threat to our personal and professional lives. Therefore, it is better to play it safe than to end up forgiving in the long run. In practice, continuous identity authentication falls short of the concept of zero trust. Even after verifying your identity during login (whether it's a two-factor ID or not), he doesn't trust who you are. Instead, it constantly checks multiple authentication features. This includes passwords and other traditional security details, but also situational factors such as location, time, user behavior, etc.

Data Collect

While this may sound complicated, there are a number of easy-to-implement products that enable continuous identity authentication. Machine learning tools, for example, can integrate context into access requests by profiling normal user behavior and taking appropriate action when behavior anomalies occur. This means that even if a cybercriminal obtained the company's login credentials and personal photos by executing malware or phishing attacks against an unrelated third-party application, the machine-learning-based tool will always report the location of the application as suspicious and will follow up if necessary. . In today's hyper-connected world, it is naive to think that the collection of personal data will stop or that malicious actors will simply disappear. And as consumers place more emphasis on privacy and security, the way organizations collect and protect personal data will play a vital role in determining which businesses will grow and which will fail. name destroyed Users will soon demand additional protections as cybercriminals advance their tactics, so making sure your platform supports zero trust with true real-time AI/ML-based assessment and adaptive policy control is essential. In other words, the time has come to embed security and control into every product, solution, and service from the ground up. This is the only way to proactively respond to growing consumer concerns about data privacy.