Tag: bigdata

  • Digital vulnerabilities

    Digital vulnerabilities

    Global security breaches are on the rise and no one or country is safe. The acceleration of certain technologies has been rapid since the pandemic engulfed the world last year. But unfortunately, we’ve also become slack in the process.

    Once again, it has become apparent just how ‘at-risk’ our data is.

    Data hacks have been frantic and are now getting major press attention. It’s hard to know who each unwanted visitor is in each case but fingers are being pointed in perhaps familiar directions.

    Russian invaders back at it again

    In fact, throughout June, Russians have been blamed for a slew of hacks around the world.

    Microsoft in late May said a wave of Russian cyber-attacks had targeted government agencies and human rights groups in 24 countries, mostly in the US.

    It claimed that around 3000 email accounts of more than 150 different organizations, some of them international, were attacked in just one week.

    Allegedly, the group responsible was the same one that carried out 2020’s SolarWinds attacks, which the Russian Foreign Intelligence Service (SVR) was accused of orchestrating.

    But the Kremlin denied having any knowledge or anything to do with any cyber-attacks. It challenged Microsoft to how these attacks were linked to the European attacks.

    Nevertheless, authorities are now aggressively investigating cybercrime. In the first week of June, the US Justice Department recovered around $2.3m in cryptocurrency ransom money.

    Webscanner

    This was part of the funds paid by the Colonial Pipeline Company to Russian hackers in the most disruptive cyberattack on record in the country.

    The US deputy attorney general Lisa Monaco said investigators had seized 63.7 Bitcoins which was paid by the company after its systems were hacked, leading to massive shortages of petrol along the US’s East Coast. The department said it founded and recaptured the majority of the ransom.

    The hackers are believed to be a group called DarkSide, whose menace caused a multi-day shutdown in certain petrol stations and a spike in gas prices.

    The attack made international news and prompted the US’s White House to encourage business executives to improve security measures to avoid future cyberattacks whatever their nature, ransomware or otherwise.

    The FBI said DarkSide had also disrupted operations at a meatpacking company. As no one tends to be spared in the spillover effects, it is always a good idea to protect your company’s digital assets as a preventative measure.

    Not so sophisticated

    The attackers rather proved to be quite ‘amatuerish’ because they sent the Bitcoins to an online platform to convert it to fiat money – and that is how they got nabbed. Server-hosted (Online) crypto exchanges are obliged to keep customer data for compliance and anti-money laundering practices. So while your Crypto digital wallet does not reveal your identity, pairing it with an exchange will link it to all the other particulars you needed to provide to use the exchange.

    As long as you need cash to pay for things you will always need to switch your crypto in some way or another – unless your recipient agreed to take payment in Crypto as well. Keeping your digital assets on a hard-wallet or on your hard-drive keeps them “off-the-grid”. But also means you can’t actually spend them.

    Although the initial cyberattack was a smart manuever, the attackers proved to be rookies at the robbing game in the end.

    On a positive note: the ability to retrieve Bitcoins actually reinforces the need for a Blockchain-based financial system. This made it easier for the authorities to track movements of the ‘ransom-paid’ Bitcoins.

    Cuban for a bruising

    But politicians aren’t the only people who are urging businesses, civil society organizations, and other groups to improve security systems and be cognisant of an often-dark future.

    US Dollar billionaire Mark Cuban has also called for stricter cryptocurrency regulations.

    The owner of the Dallas Mavericks who has been investing in trading Bitcoin and other cryptocurrencies such as Ethereum said the world was in dire need of regulation for the burgeoning decentralized finance (DeFi) space.

    READ MORE ABOUT DEFI HERE

    Cuban said in an interview with Bloomberg that there “should be regulation to define what a Stablecoin is” in order for DeFi to be reliable and to prevent total collapses in investments.

    This comes after he saw his investments in a particular Stablecoin ‘went to zero’. Cuban claimed he had been scammed.

    Stablecoins are a type of cryptocurrency that is pegged to an underlying asset, or currency – usually the US dollar. They are the earliest forms of DeFi and the largest Stablecoin, Tether, is currently worth more than $62bn.

    DeFi has helped the price of Ethereum, the blockchain on which most DeFi projects are built, to also soar. But they can be highly risky investments.

    Investors try to create arbitrage opportunities and liquidity between coins but such a scheme collapsed for Cuban.

    “There should be regulation to define what a stable coin is and what collateralization is acceptable,” he said.

    trade cryptos
    Buy, Stake, and Trade Cryptos

    Strong words of caution

    Cuban hasn’t revealed how much money he lost but told a fellow DeFi investor via Twitter that regulation must be implemented- and quickly.

    It had been suggested that Cuban was “rugged” which refers to when a project’s liquidity dries up and investors cannot withdraw their cash.

    Mark Cuban is alleged to have 60% of his crypto holdings in Bitcoin, 30% in Ethereum, and 10% held in other coins. He likes to experiment with new financial tech investments.

    He added further in a recent blog post that banks should be scared of unregulated DeFi technology.

    All crypto-based investments remain highly risky as the technology around them develops. But there certainly needs to be global laws to prevent people from losing hefty amounts of their wealth/investment. Cryptocurrency is without a doubt a very lucrative investment vehicle that could make you an overnight millionaire. But that also makes it a perfect vehicle for scammers to clone projects to make away with your hard-earned cash.

    You must, therefore, be extra vigilant and scrutinize offers for instant riches. But more so, you would be quite negligent these days to navigate the Internet without any form of cyber-protection.

  • Be Digitally hack-proof

    Be Digitally hack-proof

    Why do people hack systems? Hacking is a technique used to compromise any digital device. Hackers want to get into your device to use your data for varied reasons – naturally, most of these motives are financially driven.

    A data breach is usually what leads to a hack. There is a difference even though both terms are used interchangeably.

    A data breach happens when data that is left vulnerable in an unsecured environment gets viewed by someone who shouldn’t have access to it.

    While hacks are the result of malicious behavior, breaches happen as a result of negligence, human error, or other non-malicious behavior that creates a security vulnerability.

    Hackers may access your device just to say they could or for financial gain, to protest, or to gather sensitive information.

    So what makes a hacker?

    In the past, a hacker may have been a whiz kid or specialized programmer but in the modern-day, hacking has become easier and more people are becoming hackers. As more people shop online and use computers for everyday tasks, they become the prey of hackers worldwide.

    Actual hacking is technical in nature – the hacker does not communicate with the person whose PC they are hacking into.

    But they can also use psychology to trick the user into clicking on a malicious attachment or providing personal data. These tactics are referred to as social engineering.

    Your cellphone too can be hacked

    While most associate hacking with Windows computers, the Android operating system also offers an inviting target for hackers. That means millions of people who use Samsung phones can be hacked.

    Some fifty years ago, there was a name for hackers who obsessively explored low-tech methods for getting around the secure telecommunication networks and expensive long-distance calls. they were called phreaks.

    This was a portmanteau of the words phone and freaks. They were a defined subculture in the 1970s, and their activity was called phreaking.

    Phreakers have now evolved out of the ‘analog technology era’ to become hackers in the digital world. They are beyond a sub-culture and have become a genuine threat to the safety of our information and data.

    Mobile phone hackers currently use a variety of methods to access your mobile phone and can intercept phone calls, voicemails, text messages, and even the phone’s microphone and camera, all without your permission or even knowledge.

    iPhones are not safe either

    In 2020, many journalists working for Al Jazeera were victims of a sophisticated zero-click spyware attack.

    The Toronto-based internet watchdog group Citizen Lab was asked to look into the attacks, which took place in July and August, and they released their findings at the end of December.

    The report found that 36 journalists, producers, anchors, and executives had their iPhones compromised by Pegasus spyware. The spyware, developed and sold by an Israeli-based firm called NSO Group, targets security vulnerabilities in the iMessage app.

    The so-called “zero-click” exploit deploys without any user interaction. Once installed, it can record ambient sound and phone conversations, take pictures, and access user credentials. It sounds like science fiction but it’s very much real!

    Types of hacks

    Malware

    People can use hardware to sneak malware into your PC. In offices, hackers will infiltrate networks by giving staff members infected USB sticks, dodgy USB cables, and mouse chords.

    It is crucial to always think before plugging anything into your work or personal device with access to confidential data.

    Educate your staff about being careful before plugging anything into their PCs.

    Malware infections generally occur when users interact with dangerous code by clicking on a URL or downloading malicious software disguised as an authentic program. But zero-click spyware penetrates devices without any user interaction.

    Citizen recommends making sure that your mobile OS is updated to the latest version. Identified vulnerabilities in previous versions of iOS were patched in the iOS 14 update.

    Practicing good digital hygiene is always important for the security of your mobile devices.

    Use sites like haveibeenpwned.com and breachalarm.com to see if your email credentials have been compromised. Use strong passwords on any apps that contain sensitive data and delete any apps that you do not regularly use.

    Missing security patches

    Always remember to update your security tools. Too many people ignore update notifications or security patches, leaving themselves vulnerable. It’s not just antivirus software that needs patching.

    Tell your staff to ensure that all their antivirus and applications are routinely updated as security patches become available. This task is usually the job of your IT department if you have one in the first place.

    Getting your password information

    Hackers can obtain your credentials through several means, but commonly they do so through a practice called keystroke logging or keylogging.

    Can you believe that the most common password is “123456”? Hopefully, yours isn’t so, or any of the most hacked passwords in the last 10 years.

    Through a social engineering attack, you could accidentally download software that records your keystrokes, saving your usernames and passwords as you enter them.

    This and other forms of spyware are malware that tracks your activity until a hacker has what they need to break into your system.

    Attackers can deploy malware on a user’s machine if they are in your environment and capture your credentials via keylogging too.

    Hackers also use password cracking programs that can run letter and character combinations, guessing passwords in a matter of minutes, or even seconds.

    To get around this, use a password management tool that securely houses your company’s credentials. These tools can often auto-generate lengthy, diverse character passwords that are difficult for hackers to guess. They can also autofill for your employees for easy access to their tools.

    Encryption and multi-factor authentication methods also offer more layers of protection.

    Distributed Denial-of-Service (DDoS)

    Acunetix

    This technique involves taking down a website so that a user cannot access it or deliver their service. DoS attacks take place when hackers inundate a target’s server with large influxes of traffic. The amount is so frequent and high that it overloads the server by giving it more requests than it can handle. This crashes your server and your company’s website.

    Larger businesses can get hit by a Distributed Denial of Service (DDoS) attack, which is a synchronized attack on more than one server or website, potentially taking down numerous online assets. 

    A good method to fight DDoS attacks is to use cloud protection services to spot them – like Acunetix or Netsparker.

    Social Engineering & Phishing

    This is where hackers try to get your personal information, often by impersonating a legitimate and maybe trusted source.

    Many types of social engineering bait come in the form of phishing emails.

    A hacker sends you a message that looks like it’s from someone you know, asking you to do something, like wire them money, or to click or download an infected attachment to see more. 

    Here is a hilarious example of a phishing Email

    “The top malicious email attachment types are .doc and .dot which make up 37%. The next highest is .exe at 19.5%,” according to a report by Symantec. Always be cautious of opening these types of attachments.

    Warn your employees to never give out private business information over email, to think before opening any attachments, and educate them on mail scams.

    Use email software that scans for phishing. Microsoft 365 and Google’s Business packages come equipped with such. Google’s tech uses AI to scan the content and find things such as spelling errors and dodgy URLs. This enables the system to block them before they even hit your inbox.

    Most people or companies that get hacked or suffer from a data breach do so mainly due to negligence. Many do not prioritize beefing up their security systems before it is too late. Hacks are, however, completely avoidable so don’t fall victim to them.

    Other ways to protect yourself

    • Download a reliable anti-malware product that can both detect and neutralize malware and block connections to malicious phishing websites.
    • Of course, whether you are on Windows, Android, a Mac, an iPhone, or in a business network, you must always use layered protection wherever you can.
    • Only download phone apps from the legitimate marketplaces that police themselves for malware-carrying apps, such as Google Play and the Apple/Amazon Appstore.
    • Check the ratings and reviews first. If it has a low rating and barely any downloads, it might be best to avoid that app.
    • Use long and complex passwords. Don’t use numbers in sequence. You can also use mixes of letters that can be remembered through rhymes.
    • Consider using a password manager.
    Advert
  • Ethical hacking

    Ethical hacking

    Maybe you should encourage your kids to become hackers. When you open Twitter handles and Linkedin profiles, it’s not unlikely that you’ll find people listing hacking as a skill.

    Parents used to tell their kids to become doctors, lawyers, and accountants. Later, they advised them to learn about computers. These kids have now grown to become hardware specialists and then software specialists today.

    In the past 10 to twelve years, we have seen ourselves thrown into the fourth industrial revolution. In it, technology affects our lives through social media and augmented reality.

    We share a lot of our personal information with more people, companies, and institutions every day, willingly and are often blasé about it. This has tempted people to steal this information by hacking it. 

    Hacking background

    Since the advent of personal computers in the 1980s hackers have become prolific, initially in ‘first-world’ countries that had an advanced infrastructure. There were numerous cases in the US but as computer technology permeated the world, hackers followed suit. 

    A hacking group called MOD, Masters of Deception, in the 1980s allegedly stole passwords and technical data from Nynex, and other telephone companies as well as several big credit agencies and two major universities.

    The damage caused was extensive and one company, Southwestern Bell said it suffered losses of $370,000 alone. These days the damages, though not always publically announced, can run into a few millions of dollars.

    READ MORE about the Online Threats hackers use here

    All this has paved the way for a special information technology (IT) vocation. A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system and networks. They break into systems they aren’t authorized to, and tend to break seamlessly into email and banking systems.

    Advertisment

    Hacking as a career

    Ben Wilson works as an ethical hacker. He has more than ten years of experience and worked in London where he received on-the-job training. He now works remotely in South Africa servicing UK clients.

    “I test websites for clients and look for vulnerabilities in the systems. I have done a lot of work for banks lately but my work is across industries.” 

    “Energy companies are using my services more and more,” he says.

    Wilson says he worked in a permanent position for six years. Right now he contracts for five clients regularly.

    Ethical hackers are the knights who test how permeable these systems are.

     

    “The majority of my work is for British clients. The UK pound is strong and I like to earn pounds. I’d say the best computer security consultants in the world are in the UK. The US is strong too but the UK consultants are sophisticated and the best.”

    Vulnerabilities

    The most common way in which people hack information is through email contacts; especially personal Gmail accounts.

    People think that their information is safe because it sits with one of the largest companies in the world. But this is exactly why it isn’t safe.

    Gmail and other third-party free email accounts are regularly hacked. If you want to protect especially valuable information you should either upgrade it to the business/enterprise level, use a different email service, or perhaps the one connected to your employer. 

    Nowadays companies use services to protect themselves against hacks and unauthorized access. These monthly or annual service providers might employ ethical hackers to check the companies’ systems.

    Hacking, however, isn’t just something that happens to big companies or in blockbuster movies. Here are some reality checks:

    • All websites are under threat;
    • So are applications (Apps) on your phone;
    • People can also program artificial intelligence (AI) to hack into systems. This has become a big concern and theme for security experts.

    Ways to proactively prevent a hack 

    Fortunately, there are several ways of protecting yourself and your information from hacking; starting with your emails. Be wary of “phishing” emails asking you to update your information, especially for bogus databases that you have never heard of.

    Use a spam filter – Avoid opening attachments from senders you don’t know – Update your passwords regularly – It helps to have authentication methods, such as a smartphone-linked and email-linked authentication (2FA) or security keys like Yubico – Do not click on any ad – period! Back up your files regularly – it’s always a good idea – Don’t allow ransomware bullies to bully you.

    • If you get sent communication saying that people have your files and want money or they’ll release the files; ignore them.
    • They can’t threaten you forever and might eventually move onto another target especially if your information loses its value over time.

    Anti-hacking software

    As a business, use tools like those from cybersecurity experts Acunetix. More than 4 000 companies protect their web applications from vulnerabilities using its powerful web scanner.

    Its penetration testing software prevents potential attacks by identifying holes in your websites’ coding. This is where hackers usually plant their complex code which allows them to extract data such as contact details, credit card details, and in worse cases, company-sensitive data like patents and blueprints.

    Naturally, it also scans networks to find gateway loopholes that could lead to crashes and downtime-related losses. A bank’s website going down for a few hours can cost it several thousand or even millions in lost revenue.

    Despite having firewalls, VPNs, and other Internet security systems in place, your websites and apps being developed are still vulnerable to cyber-attacks or a hack.

    The most commonly known hack used is a DDoS attack. Basically, it works like a traffic jam clogging up a highway, preventing regular traffic from arriving at its desired destination. Incidentally, only a few days ago, Amazon was hit by a DDoS Attack.

    So, how would you know or find out if you are vulnerable?  By conducting regular scans on your websites and apps to see where vulnerabilities lie.

    Avoiding a hack requires common sense

    Be aware and don’t fall into scams. It’s unlikely you’ve won 120-million Euros in a lottery. You should know by now that you are not the descendant of a king!

    In addition, if someone says they have a sex tape with you in it and they want your salary, unless you know you made a sex tape, they’re probably lying.

    Unless of course, a scorned lover of yours tricked you – but you can’t blame technology or a hacker for that.

     

  • The Online Threats of 2019

    The Online Threats of 2019

    How you can stop them from happening.

    Like a biological virus mutates – as technology advances so do the complexity of phishing and identity theft schemes. With major services adopting cloud technologies and storing private data online, anyone is vulnerable to hacking.

    To make matters worse, hackers continue to come up with some pretty creative ways to profit from stolen information.

    Without wasting time, these are the things you should already be doing to avoid being exposed to hackers in the first place:

    In order to keep these cyber-criminals out of your lives and computers, let’s take a look at some of the actual schemes to watch out for in 2019.

    Hacking

    We all know what hacking is by now – the term has almost become synonymous with internet security. So a question is: do you love watching movies on Netflix or jamming out to your summer playlist on Spotify? If the answer is yes, then you’re at a pretty high risk of getting hacked.

    DynaRisk, a UK cybersecurity firm, recently found that cybercriminals most commonly target these brands, along with adult-oriented sites (you know what we mean) and then, online gaming services.

    Identity Theft

    A few weeks ago, authorities caught a New York-based gang who had used identity theft to steal over $19 million worth of iPhones. Quartz reported that this operation ran for seven years.

    So-called “Top Dogs,” the ring leaders, would organize lower level members of their organization to steal identities and create clone credit and identity cards. Then, affiliates fanned across the nation, signing up for mobile phone plans to acquire iPhones, which were later sold for a profit by the Top Dogs.

    Because phone payment plans take the shape of nominal fees over the course of several years, victims often wouldn’t notice the fraud until it was too late. Learn how another scheme dubbed sim port attack works in the diagram below:

    Ransomware

    Hacking can happen to anyone – including our favorite bands. In early June, a hacker managed to steal the minidisk archive of Thom Yorke, the lead singer of Radiohead. This included previously unreleased demos and audio material from around the time of “OK Computer,” the band’s 1997 worldwide hit album. The hacker then demanded $150,000 on the threat of releasing it.

    Holding files for ransom is so common nowadays that it even has its own name: “Ransomware.” Either pay over the ransom or lose your files—or, even worse, have them released onto the unforgiving Internet.

    In response, Radiohead released all 18 hours of material on Bandcamp themselves, winning against these ransom hackers.

    Most security experts recommend the same route as Radiohead—never pay the ransom, because there’s no guarantee you’ll recover files or prevent their release.

    Sextortion

    If you think ransomware is bad, there’s an entire subgroup of it aimed to profit off sexual shame. Cheekily named “Sextortion,” some hackers creatively upgraded the classic email phishing scam to scare victims into handing over Bitcoin.

    According to Fortune, hackers have already racked up over $900,000 with sextortion. In these phishing emails, the sender claims to have spied on you while you watched porn—and has webcam footage of the salacious deeds. The message then demands a Bitcoin ransom, or else face the social and professional consequences of this lewd video getting sent to all your contacts.

    To make the threat even more believable, the sender references a previous password tied to the user’s email account. According to Krebson Security, a sextortion phishing message might look a little like what’s written in the sidebox.

    In rare cases, the threats are real—and hackers get their hands on some sexually explicit photos. Recently, American actress Bella Thorne fell victim to sextortion. Last Saturday, she took a similar, albeit more risqué, route as Radiohead, opting to release her nude photographs on Twitter in order to take the power away from her hacker.

    Last thoughts

    So, what’s the best way to avoid your personal, or, business from costing thousands in virtual currency? Since most of these emails are fake, you can just avoid them with a spam filter. And you should probably buy a webcam cover…just to be safe. When it comes to general browsing- we suggest using a VPN.

    Read more about VPNs here

    There are now more secure anti-hacking tools that use the Blockchain and offer great protection, especially against identity theft. Have a look at our feature on Tokenisation.

    Most online services now like mobile banks, offer App-based 2-factor authentication. This should now be regarded as the minimum security for ANY online account or App.

    To avoid hacking or phishing scams in general, optimizing your cybersecurity and using online common sense will save you loads of time, trouble and money.

    Cybersecurity by Acunetix
  • The latest cloud computing trends in 2019

    The latest cloud computing trends in 2019

    It’s 2019, and the Cloud is everywhere—from the apps we use every day to the infrastructure of global tech giants.

    According to researchers at Gartner, revenue generated from public cloud services is projected to grow 17.5 percent in 2019. This amounts to a total of $214.3 billion, up from $182.4 billion in 2018.

    More than a third of organizations surveyed by Gartner saw cloud investments as a top three investment priority. With this kind of growth, tech organizations are racing to get on board with cloud-only software and platforms.

    Here are some of the trends to look out for this year:

    Hybrid Cloud, Multi-Cloud and Mergers

    IBM announced its purchase of Red Hat last October, calling it the “most significant tech acquisition of 2018.” This combined Red Hat’s extensive network of open-source clouds with IBM’s Hybrid Cloud team.

    Mergers like these are likely to become a trend this year, as companies see the benefit of using multiple clouds across all sectors of their organization.

    Furthermore, this system will dominate in the future, as businesses find public clouds inadequate to meet every one of their requirements.

    As a more flexible and functional solution, many organizations will shift to a network of multiple private, public and hybrid clouds in the future.

    Serverless Cloud

    Serverless computing is a young market in technology, but it will continue growing in 2019. It isn’t actually “serverless.” Instead, it is a cloud-computing model in which the cloud provider itself runs the server on a dynamic, as-used basis (FaaS).

    Rather than buying server space, developers can use a back-end cloud service to code. They will only then pay for the server space they actually use.

    As this relatively new technology develops, we can expect to see more companies providing and expanding their “serverless” offerings.

    Artificial Intelligence

    Although cloud technologies are growing exponentially, artificial intelligence (AI) could prove an even greater economic driving force. According to Accenture, the impact of AI could double economic growth rates by 2035 in developed countries. 

    Around 80 percent of large companies have adopted some form of AI, according to the Harvard Business Review.

    Amazon, Twilio and Nvidia, to name a few, are thus, incorporating AI with cloud computing, next-gen GPUs and the Internet of Things (IoT). This has led to the developing of applications with “smart assistants,” and voice-to-text technologies.

    Such a combination of AI and the cloud provides an extremely powerful and unconstrained computing network.

    Security

    Digital transformation is already underway, with Gartner also projecting that 83 percent of all workloads will shift to the cloud by 2020. However, this movement presents issues of cybersecurity.

    Many businesses have not properly secured their cloud-stored data. For example, marketing and data aggregation firm Exactis left around 340 million records exposed on its cloud servers. This was uncovered in a data breach last year.

    Mitigating factors

    The implementation of the General Data Practice Regulations (GDPR) makes this even trickier. It affects cloud security, and IT companies will likely struggle to comply with these new laws while protecting sensitive information.

    Cloud computing services are progressing exponentially, as are their new developments. The year 2019 will surely be filled with businesses pouring investment into enterprise solutions. This while expanding, securing, and implementing cloud technologies to their fullest extent.

    Bridget is a freelance writer and editor, and the founder of Lost Bridge Blog, where she writes about traveling as a Millennial woman on a budget. When not writing, you can find her traveling, drinking inhuman amounts of caffeine and scrolling through the latest tech & political news.
    N26 Bank
  • Already GDPR-ed Out?

    Already GDPR-ed Out?

    Well, it didn’t take long. Less than a full week in fact, for the first GDPR-related court cases to surface against social tech giants Facebook and Google.

    It was as if lawyers were just waiting to pounce on them for their apparent failure to protect our rights as online users. This pertains specifically to issues relating to data privacy and the sharing of private details mainly with third-party marketers.


    How Facebook stores and shares your data has been clarified by several intense inquiries in the US and recently in Europe. This is where the law is set to benefit users of the social media platform in that geospatial area of the world.


    The said lawsuit, however, focuses on the opt-out clause that forces you to make a choice to comply or leave. The claimant is a privacy campaigner. He has made the Billion-Euro complaint on behalf of several users; seemingly a challenge to Facebook.


    Additionally, he has launched a separate suit against Google, accusing them of “pressurizing” users into accepting their data collection policies.
    This ‘comply and accept or get thrown out’ clause could leave you without your routine dose of social media consumption. Such a clause is thus deemed unfair.


    It could cost Facebook a lot if they get their way based on the terms stipulated in the new law. The social media giant could be fined up to a few billion or a sizeable fraction of their earnings in punitive damages.

    The aim of the new law

    The passing of the new regulation on May 25th, 2018, better known as the General Data Protection Regulation {GDPR} has been a long time coming.


    Despite the warnings of the “kick-in” of the regulation, many are unprepared for it. Some of the reactions to the law include confusion, anxiety by both large and small firms alike, and plain comical hysteria!


    Non-compliance now carries heavy fines and penalties, up to 20 million euros for anyone operating within the EU borders.

    So, what then, is the big fuss about GDPR?


    Well, it boils down to a right that has since the launch of the Internet to the mainstream, been waivered and overlooked. Gaining CONSENT to use your data for anything other than the reason you went public on the Internet is very crucial.


    This has become a contentious issue as many companies have over the years, unscrupulously benefited from data acquired (mined) – without your consent. Facebook only brought this into the spotlight recently.

    You can read more about data mining here

    Ad: Web, Network & App Scanner

    Who needs compliance?

    If you hold a folder, database of clients whether online or on your internal server, you would have to comply with the rules which stipulate full disclosure. This includes who you share your details with, and how the information is tracked, shared, and kept secure.


    Furthermore, research in March this year showed that only 39% of the Fortune 500 companies in the UK and 47% had GDPR compliance taskforces.


    Another UK firm commissioned study found that our buying behaviours are heavily influenced by we perceive our data is being handled by companies.

    The consent given to use your basic information cannot be taken for granted – even in the medical environment.

    German doctors’ practices, in the wake of GDPR, are manually making you sign consent forms. Doctors are now required to fully disclose who they share your contact information with.

    How to be compliant

    There are simple ways you can stay GDPR compliant. One method is to adopt an attitude of embracing it rather than just complying with it. You can be transparent with your customers by doing the following:

    Add a cookie bar to your website. You can also add a clause/paragraph to that effect (website disclaimer) in your ‘About Us’ section.


    Similarly, you must state clearly on any opt-in forms. Newsletters and any forms where their data is collected, used, and passed onto other third-parties must be announced. State clearly who they are and which data they have access to.


    You then need to give your customer the option to select what they want to share. Even if such data may not be necessary for them to receive services from you.


    Constantly review your relationships with third-party affiliates and partners to ensure that they are also complying with the law.
    They could be jeopardizing your data compliance efforts – as Cambridge Analytica did with Facebook.

    The last and most challenging step requires the action of what is promised above. This means an upgrade of your internal software to include security/encryption.

    GDPR compliant software

    You can obtain full compliance by using a GDPR-compliant package like Office 365 Enterprise E3. This package has email software specially designed for those of you dealing with sensitive client’s data that need to be kept for long periods.  Litigation hold, heavy archiving features; as well as basic email encryption are all included.


    You can add supplementary encryption software such as Azure Information Protection as an extra layer of security. This helps you to safeguard emails and stored data from being lost, compromised, or accidentally shared.


    All said and done it is likely that if you are a bigger firm, you would either need to create the position of a data security officer internally. If your lawyers are not up to date with digital laws, however, you can simply outsource the service.

    This should help make you become fully compliant thereby having to avoid issues with the data compliance authority altogether.
  • Data (Gold) Mining

    Data (Gold) Mining

    Let’s face it, if you really were going to quit Facebook, you would have a few years ago. Fact is, you should have asked the serious questions when the ‘free’ social media platform started turning over billions of dollars.

    No free service can generate that amount of money out of goodwill and thin air. So much that they could list on the stock exchange. So, we are not quite sure why everyone is acting amazed or why the knee-jerk #DeleteFacebook campaign is only now coming to light.


    There really is no such thing as a free lunch. If you believe that all these online social platforms would keep it that way, then you are as naive as they are hoping you to be.


    Think about it, the companies behind the platforms, actively recruit in pretty much tens and hundreds of cities globally.


    And the simple fact of the matter is that in order for them to pay all their staff of programmers, developers, executives, lawyers, and other stakeholders. They need to be paid!

    What your data means

    Facebook, Google, Twitter, Snapchat, and any social media platform that has over 100 million users sit on a goldmine for advertisers.

    The commodity, however, is not just what their users wish to own in the short term, or their purchasing power directly for that matter.

    The commodity is simply you, the user. So, your preferences, habits, and views along with their personal data are analyzed via machine-learning systems to study behaviours and habits.


    The data, in turn, is used for constant revenue maximization. In some extreme cases, it is used for political, psychological, and social manipulation!

    “Your ‘payment’ on a social media platform is your consent to have your information used for marketing purposes. Opting out of marketing would give you true ‘free use’ of the service. But no profiteering company offers you that privilege today. The best you can get is a month’s free trial.”

    Your likes, spending habits, music preferences, political views, location and working habits enables marketers to present their goods and services.


    They can position their offerings (sometimes subliminally) into spaces where you are likely to indulge in them.


    Social media platforms, in this case, become the marketplace for them to ‘mine’ data to use.

    Social network sites worldwide as of January 2018, ranked by the number of active users (in millions).
    Most famous social network sites worldwide

    Source: © Statista 2018

    How the mining works

    text-mining-icon-2793702_640


    Data mining is not a new idea and completely legal if presented transparently in the terms and conditions of any service. The terms get longer by the day (small print) that we don’t bother to read them.
    Microsoft envisioned this a decade ago and changed the way its operating systems work (with its Windows 8 series).

    Its operating systems are now more of a social, interactive, and information gathering system. Allegedly designed to “help you” organize things better.
    This is fostered by a voice-activated app called Cortana – all under one Microsoft account.


    Amazon has its own ways of data mining via your shopping habits and Alexa – is its own voice-activated search and information-providing device.
    Google (owned by Alphabet company) has the biggest stranglehold of the lot. They must, therefore, be the most cautious when it comes to data privacy and security.


    This applies especially with its partnership with Android, which makes it a requirement for you to use for all their devices to link all your data.


    These include phone contacts, emails via Gmail, pictures via GoogleDrive, apps (music, movies, etc) orders via the Google (Play)Store, and social media (Google+).


    You can even have your search fields stored and synced onto your devices – from your laptop to phone and tablet via Google.


    You are now having to give up your personal details to unknown affiliated marketers and partners of tech giants. They get first dibs on this data – and paying good money for it.

    Read more about Affiliate Marketing here

    Required by regulation

    The main violation by Facebook, therefore, might not even be non-consensus selling of data to marketers. Such things could be countered with a clause.
    They may have strategically stuck one in while you were busy posting selfies and liking random videos of cats.


    The real issue is the potential use of the data for political or advanced manipulation of data for fraudulent purposes. This can be facilitated by the use of artificial intelligence to influence you without your knowledge.

    Read more about the uses of Artificial Intelligence here

    250x250

    It is possible for you to have full data privacy and absolute freedom from advertising on social platforms. This, however, comes at a ‘cost’.

    This was reiterated recently by the COO of Facebook who admittedly confirmed that ‘opting out’ would mean you will have to pay to use Facebook in the future.
    They had just not put this in place but will now forcibly have to make it a clearly visible option.

    The fact of the matter is we are in an era of Big Data, the Internet of Things (IoT), and AI. All of these require your data to ‘operate’.

    Data mining is here to stay

    Though many were reluctant at first, pretty much every company now has a Facebook, Twitter, or Instagram page. It serves as a platform to showcase and communicate with thier clients via the newly termed phrase ‘social engagement’.

    This has turned out to become a strong branding and marketing tool for them.


    And if you think you are out of it by leaving one platform, just remember this: Facebook owns WhatsApp & Instagram; Google owns YouTube; Microsoft owns LinkedIn, and so on.


    There is, in fact, nowhere to hide if complete online privacy is important to you. And let’s not forget your web-browser: Not many of us actively use ad-blockers: but your browsing data is being scanned and processed by external third-parties companies.


    If you aren’t using a Virtual Private Network (VPN), you should seriously consider it! Along with some good plug-ins to help secure your online browsing from all types of behind the scenes snooping and ransomware.
    It will be interesting to see the outcome and verdict of the probe into the Facebook case.

    Rest assured, many other heavily used platforms will be deleting and removing ties with data mining marketers. Especially ones that have had a similar agenda to what Cambridge Analytica was accused of conducting.

    A change in the verification of marketers, data storage and data security laws (such as the new GDPR law) were long overdue. Facebook will now be the scapegoat to enforce data security laws on social media.
  • Data (Gold) Mining

    Data (Gold) Mining

    Let’s face it, if you really were going to quit Facebook, you would have a few years ago. Fact is, you should have asked the serious questions when the ‘free’ social media platform started turning over millions and even billions of dollars in revenue. No free service can generate that amount money out of goodwill and thin air – so much that they could list on the stock exchange. So, we are not quite sure why everyone is acting amazed or why the knee-jerk #DeleteFacebook campaign is only now coming to light.

    There really is no such thing as a free lunch and if you believe that all these online social platforms – who may have started off with sole intentions to provide a free service, would keep it that way, then you are as naive as they are hoping you to be. Think about it, the companies behind the platforms, actively recruit in pretty much tens and hundreds of cities globally. And the simple fact of the matter is that in order for them to pay all their (global) staff of programmers, developers, executives, lawyers and other stakeholders – they need revenue.

    Facebook, Google, Twitter, Snapchat and pretty much any social media platform that has over 100 million users, therefore, sit on a goldmine for advertisers. The commodity, however, is not just what their users wish to own in the short term, or their purchasing power directly for that matter. The commodity is simply you, the user. So, your preferences, habits and views along with their personal data are analysed via machine-learning systems to study behaviours and habits for constant revenue maximization or in some extreme cases: political, psychological and social manipulation!

    “Your ‘payment’ on a social media platform is your consent to have your information used for marketing purposes – opting out of marketing would give you true free use of the service. But no profiteering company offers that privilege today – the best you can get is a month’s free trial.”

    Knowing your likes, spending habits, music preferences, political views, personal information including location and working habits is enough for any company or institution to cater their goods and services and position them (sometimes subliminally) into spaces where you are likely to indulge in them. Social media platforms, in this case, become the marketplace for them to ‘mine’ data to use.

    Most famous social network sites worldwide as of January 2018, ranked by number of active users (in millions).

    Most famous social network sites worldwide

    Source: © Statista 2018

    text-mining-icon-2793702_640

    Data mining is not a new idea and completely legal if presented transparently in the terms and conditions of any service – which are getting longer by the day (and smaller in print) that we don’t bother to read them. In fact, Microsoft envisioned this a decade ago and changed the way its operating systems work (beginning with its Windows 8 series), to more of a social, interactive and information gathering system – designed to “help you” organize things better. This is fostered by a voice-activated app called Cortana – all under one Microsoft account.

    Amazon has its own ways of data mining via your shopping habits and Alexa – is own voice-activated search and information-providing device. Google (owned by a group called the Alphabet company) has the biggest stranglehold of the lot and must, therefore, be the most cautious when it comes to data privacy and security.

    This applies especially with its partnership with Android, which makes it a requirement to use for all their devices (phones and tablets) to link up all your data including phone contacts, emails via Gmail, pictures via GoogleDrive, apps (music, movies and games) orders via the Google (Play)Store and social media via Google+. You can even have your search fields stored and synced onto your devices – from your laptop to phone and tablet via Google.

    You are now having to (almost mandatorily) give up your telephone number, location, and other preferences indirectly to unknown affiliated marketers and partners of the tech giants who are getting first dibs on this data – and paying good money for it.

    The main violation by Facebook, therefore, might not even be non-consensus selling of data to marketers, because such things could be countered with a clause they may have strategically stuck in while you were busy posting selfies and liking random videos of cats making funny faces. The real issue is the potential use of the data for political or advanced manipulation of data for fraudulent purpose with the use of sophisticated and artificial intelligence to influence you without your knowledge.

    Read more about the uses of Artificial Intelligence here

    N26_banner-300x250-EN

    Full data privacy, though not conceivable, and absolute freedom from advertising on social platforms is possible – but at a cost. This was reiterated recently by the COO of Facebook who admittedly confirmed that opting out of the terms to have your data sold or used would lead to you having to pay to use Facebook in future. They had just not put this in place but will now forcibly have to make it a clearly visible option.

    250x250The fact of the matter is we are in an era of Big Data, Internet of Things (IoT) and AI – all which require data to analyze. These platforms are thus here to stay and still serve their specific functions well. More importantly, they’re also the livelihood for many small-to-medium-sized businesses. Though many were reluctant at first, pretty much every company now has a Facebook, Twitter or Instagram page to showcase and communicate with their clients via the newly termed phrase ‘social engagement’ – a strong branding and marketing tool.

    And if you think you are out of it by leaving one platform, just remember this: Facebook owns WhatsApp & Instagram; Google owns YouTube; Microsoft owns LinkedIn and so on – there is nowhere to hide if complete online privacy is important to you. And let’s not forget your web-browser – not many people actively use ad-blockers unaware that even their browsing data is being scanned and processed always by external third-parties companies.

    If you aren’t using a Virtual Private Network (VPN), you should seriously consider it along with some good (some free) plug-ins to help secure your online browsing from all types of behind the scenes snooping and ransomware.

    It will be interesting to see the outcome and verdict of the probe into the Facebook case and rest assured, many other heavily used platforms will be deleting and removing ties with data mining marketers that have had a similar agenda to what Cambridge Analytica was accused of conducting.

    A change in verification of marketers, data storage, management and data security laws (such as the new GDPR law targeting businesses coming in May 2018 to the EU region) were long overdue, and Facebook will now be the scapegoat to enforce data security laws on social media.

Translate »

This website uses cookies. By continuing to use this site, you accept our use of cookies.