2020 logo

A New Decade Means A New Frontier in Technology and Security

Can we imagine a new decade in which we protect our privacy and security while still maintaining innovation and freedom online?

As we inch toward the new year, I think it’s interesting to think about where we came from. Somebody made a comment that we can finally say “The Twenties” in reference to a decade (they questioned how good “the teens” or “the tens” sounded). Yet, for so many people, The Twenties refers to a period 100 years ago, a century ago. It’s crazy to think about the years that have passed, but it’s even crazier when you think about technology.

I can remember playing creatively named games like Bowling, Boxing, and Hockey on the Atari when I was young and upgrading to a Nintendo a few years later. I remember playing Jill of the Jungle on my Tandy and Doom and Duke Nukem 3D on my first “real” computer (a Pentium 75). I got into technology because I wanted more time on the computer and I replaced Windows ’95 with Slackware because no one else in the house knew how to use it, effectively locking my family out of the computer.

These days, I’m closer to 40 than 30 or as friends like to remind me closer to 50 than 20. When my parents were my age, Windows XP still hadn’t been released, the PS2 had not yet revolutionized console gaming, and the Nokia 3310 was the most popular phone in the world. Take a second to think about that: Twenty years ago, none of these things existed, yet today they seem archaic. Before that the biggest leaps in communications were probably touchtone dialing in the 70s and Caller ID in the 90s.

When I was a teenager, my parents’ biggest worries were wondering if I would run up the long distance bill or tie up the phone line. If a virus hit our computer, it meant I couldn’t play games or do my homework. Today, parents have to wonder about the strangers messaging their kids on Instagram, or losing all of their memories in a ransomware attack because nobody owns photo albums anymore. A breach of a computer system isn’t some kid playing around at night in their parents’ basement, it’s organized crime looking to steal identities and nation-states searching for secrets. Everyone is connected, but those connections have made the world a darker, sadder, more vicious place.

My favorite bookstore down the street is gone, my sister was just complaining that she couldn’t buy men’s jogging pants in town because of the stores that have closed, and my apartment building just informed me that rent must now be paid online. We’re losing face to face interactions and we’re driving business online. We have our Starbucks delivered, someone buys our groceries for us, and we push a button on our phones and get in a stranger’s car. I remember in the late 90s when my parents freaked out because I was going out for coffee with a group of “online friends,” I could only imagine someone’s reaction then if they saw the world today.

We could debate the pros and cons of this shift for days, there are definitely people on both sides of the fence. My attitude changes daily depending on where I am and what I need. None of that changes the additional value all of this places on our personal information. Look at the story of Frank Abagnale Jr. (played by Leonardo DiCaprio in the film Catch Me If You Can). Much of what he did then would not work today, but there are so many new techniques that are much scarier than anything accomplished in that film.

Let’s take one small aspect of our changing world – real estate. It seems that half of my friends on Facebook are real estate agents and they are constantly posting listings for new homes. These listings end up cached on dozens of websites, with pictures of the home persisting forever. I recently looked up the name of someone I only know through gaming and found two addresses. Once he confirmed which town he lived in, there was only one address left. Within minutes, I had a full floor plan for his house with pictures of each room from the last time it had been listed online. If I were a thief, this would be a treasure trove of information. The guesswork around a house layout has been removed, you can look up almost any address and, as long as it’s been sold recently (or even just listed), you know where you are going.

We can take this a step further and pair it with community groups. I recently saw a posting on social media for my neighborhood group that someone was going out of town for 6 weeks and wanted to rent out their home. A thief watching this group would know exactly when the house is going to be empty or, at the very least, occupied by someone who may not notice items missing. Search for the poster’s name, pull up the real estate listing, and suddenly you know when the house is going to be most vulnerable and a layout of where you likely want to look to get in and out quickly.

So, as we move into a new decade, we need to think seriously about how we want the next 10 years to play out and what is society going to look like. How do we invest in protecting our privacy, how do we invest in our security, and how do we accomplish both those things while maintaining the freedom that technology has brought us over the past two decades?

I think that, in some cases, we may need to take a step backwards. In others, we need new technology, and, finally, we need user education. First and foremost, we need to teach future generations about the risk of exposing everything online. The Internet was new when I was a kid and I like to think that my parents’ paranoia instilled some caution in me. Today, however, as parents are completely comfortable and 6-year-old children have their own cell phones, we need to make sure we’re teaching those kids about the dangers of the internet.

It’s a scary topic, but we need to tell them about human trafficking, teach them about people creeping social media, and warn them that there are now worse things than taking candy from strangers. This needs to be built into our education system. Our politicians and our educators need to work together to get all of this scary information distilled into a message that children can digest and understand. Parents need to further invest in ensuring their kids understand the risks all around them.

Then, we can start to look at scaled back technology, restricted technologies for children and even some adults. Should the default settings on Instagram allow anyone to message another user? Should Facebook display your profile picture to the world by default? Should real estate listings be maintained and searchable after a house is sold? Should they even be fully visible to those without registered accounts? We were so excited for the freedom of information that the Internet allowed us, that we didn’t question how much of it should be freely shared and with whom we should share it.

Several friends have shared (WARNING: VERY DARK CONTENT) this Medium article on Facebook recently and many of them have children. I don’t, but I do have nieces and nephews and the article scared the crap out of me. We need to be aware of what’s going on around us, what the world is like today, and we need to start changing it for the better. I think a lot of that change needs to start with those of us in information security as we look at new tools, new technologies, and new ways to clean the filth off the Internet.

This may not be the happiest way to ring in the new year, but it’s something that is weighing heavily on my mind as we approach a new decade. We must recognize the need for a global resolution to clean up the internet, protect our privacy and eliminate the risk. We’ve reached a point where those risks aren’t even hiding in the shadows anymore, they’re sitting out in the open and that can’t be allowed to continue.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3