2020 logo

A New Decade Means A New Frontier in Technology and Security

Can we imagine a new decade in which we protect our privacy and security while still maintaining innovation and freedom online?

As we inch toward the new year, I think it’s interesting to think about where we came from. Somebody made a comment that we can finally say “The Twenties” in reference to a decade (they questioned how good “the teens” or “the tens” sounded). Yet, for so many people, The Twenties refers to a period 100 years ago, a century ago. It’s crazy to think about the years that have passed, but it’s even crazier when you think about technology.

I can remember playing creatively named games like Bowling, Boxing, and Hockey on the Atari when I was young and upgrading to a Nintendo a few years later. I remember playing Jill of the Jungle on my Tandy and Doom and Duke Nukem 3D on my first “real” computer (a Pentium 75). I got into technology because I wanted more time on the computer and I replaced Windows ’95 with Slackware because no one else in the house knew how to use it, effectively locking my family out of the computer.

These days, I’m closer to 40 than 30 or as friends like to remind me closer to 50 than 20. When my parents were my age, Windows XP still hadn’t been released, the PS2 had not yet revolutionized console gaming, and the Nokia 3310 was the most popular phone in the world. Take a second to think about that: Twenty years ago, none of these things existed, yet today they seem archaic. Before that the biggest leaps in communications were probably touchtone dialing in the 70s and Caller ID in the 90s.

When I was a teenager, my parents’ biggest worries were wondering if I would run up the long distance bill or tie up the phone line. If a virus hit our computer, it meant I couldn’t play games or do my homework. Today, parents have to wonder about the strangers messaging their kids on Instagram, or losing all of their memories in a ransomware attack because nobody owns photo albums anymore. A breach of a computer system isn’t some kid playing around at night in their parents’ basement, it’s organized crime looking to steal identities and nation-states searching for secrets. Everyone is connected, but those connections have made the world a darker, sadder, more vicious place.

My favorite bookstore down the street is gone, my sister was just complaining that she couldn’t buy men’s jogging pants in town because of the stores that have closed, and my apartment building just informed me that rent must now be paid online. We’re losing face to face interactions and we’re driving business online. We have our Starbucks delivered, someone buys our groceries for us, and we push a button on our phones and get in a stranger’s car. I remember in the late 90s when my parents freaked out because I was going out for coffee with a group of “online friends,” I could only imagine someone’s reaction then if they saw the world today.

We could debate the pros and cons of this shift for days, there are definitely people on both sides of the fence. My attitude changes daily depending on where I am and what I need. None of that changes the additional value all of this places on our personal information. Look at the story of Frank Abagnale Jr. (played by Leonardo DiCaprio in the film Catch Me If You Can). Much of what he did then would not work today, but there are so many new techniques that are much scarier than anything accomplished in that film.

Let’s take one small aspect of our changing world – real estate. It seems that half of my friends on Facebook are real estate agents and they are constantly posting listings for new homes. These listings end up cached on dozens of websites, with pictures of the home persisting forever. I recently looked up the name of someone I only know through gaming and found two addresses. Once he confirmed which town he lived in, there was only one address left. Within minutes, I had a full floor plan for his house with pictures of each room from the last time it had been listed online. If I were a thief, this would be a treasure trove of information. The guesswork around a house layout has been removed, you can look up almost any address and, as long as it’s been sold recently (or even just listed), you know where you are going.

We can take this a step further and pair it with community groups. I recently saw a posting on social media for my neighborhood group that someone was going out of town for 6 weeks and wanted to rent out their home. A thief watching this group would know exactly when the house is going to be empty or, at the very least, occupied by someone who may not notice items missing. Search for the poster’s name, pull up the real estate listing, and suddenly you know when the house is going to be most vulnerable and a layout of where you likely want to look to get in and out quickly.

So, as we move into a new decade, we need to think seriously about how we want the next 10 years to play out and what is society going to look like. How do we invest in protecting our privacy, how do we invest in our security, and how do we accomplish both those things while maintaining the freedom that technology has brought us over the past two decades?

I think that, in some cases, we may need to take a step backwards. In others, we need new technology, and, finally, we need user education. First and foremost, we need to teach future generations about the risk of exposing everything online. The Internet was new when I was a kid and I like to think that my parents’ paranoia instilled some caution in me. Today, however, as parents are completely comfortable and 6-year-old children have their own cell phones, we need to make sure we’re teaching those kids about the dangers of the internet.

It’s a scary topic, but we need to tell them about human trafficking, teach them about people creeping social media, and warn them that there are now worse things than taking candy from strangers. This needs to be built into our education system. Our politicians and our educators need to work together to get all of this scary information distilled into a message that children can digest and understand. Parents need to further invest in ensuring their kids understand the risks all around them.

Then, we can start to look at scaled back technology, restricted technologies for children and even some adults. Should the default settings on Instagram allow anyone to message another user? Should Facebook display your profile picture to the world by default? Should real estate listings be maintained and searchable after a house is sold? Should they even be fully visible to those without registered accounts? We were so excited for the freedom of information that the Internet allowed us, that we didn’t question how much of it should be freely shared and with whom we should share it.

Several friends have shared (WARNING: VERY DARK CONTENT) this Medium article on Facebook recently and many of them have children. I don’t, but I do have nieces and nephews and the article scared the crap out of me. We need to be aware of what’s going on around us, what the world is like today, and we need to start changing it for the better. I think a lot of that change needs to start with those of us in information security as we look at new tools, new technologies, and new ways to clean the filth off the Internet.

This may not be the happiest way to ring in the new year, but it’s something that is weighing heavily on my mind as we approach a new decade. We must recognize the need for a global resolution to clean up the internet, protect our privacy and eliminate the risk. We’ve reached a point where those risks aren’t even hiding in the shadows anymore, they’re sitting out in the open and that can’t be allowed to continue.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

Featured Cybersecurity

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3