Author: Paul Wallbank

  • Security in the age of connected kettles

    Security in the age of connected kettles

    A few weeks back I gave a presentation to the Australian Seniors Computer Clubs Association as part of Staying Safe Online Week.

    The presentation, Security In The Age of Connected Kettles, looked at where we are today with online security and some of the challenges facing individuals, businesses and communities as threats become more pervasive with cloud computing, personal technology and the internet of things while the people creating these risks become more professional.

    Overall, it’s not a cheery scenario and I end with a call to action that we have to start insisting business, public sector and political leaders start taking online security seriously as a public safety issue.

    Over ten slides we covered where we are today in personal and small business online security and some of the challenges facing individuals as computing moves onto the cloud and smartphones.

    The ongoing online safety battle

    Online safety is evolving as we move from PCs to tablets and smartphones, today the risks are increasingly appearing on our mobile devices although the desktop computer and email scams remain the biggest risk.

    It’s increasingly about the money

    A change to the security landscape in recent times has been the rise of professional malware. While a decade ago most of the hacks and viruses we saw were the work of people demonstrating their skills or causing mischief, today there is big money in compromising computers and capturing data.

    The rise of ransomware

    One of the best examples of the professionalisation of the internet’s bad guy is the rise of ransomware.

    Ransomware locks your computer with a demand for payment to release your data; if you don’t pay you lose all your information.

    Many of the online threats though are far more subtle; the theft of data from Target, compromises of Sony’s customer databases and ongoing security breaches illustrate how the risks are far greater than just on our desktop.

    Smartphone lockups

    Ransomware has moved off personal computers onto smartphones with both Android and Apple systems being attacked.
    The ‘hacked by Oleg Pliss’ message is a good example of how Apple’s products are just as much at risk as other companies’ platforms.
    Also the ‘hacked by Oleg Pliss’ lockup shows how the security aspects of cloud computing services are going to become more important to the average person.

    Security basics

    The basic advice for the average user remains the same;

    • Strong passwords
    • Don’t use common passwords
    • Be careful what you click on or visit
    • Keep your systems up to date
    • Have good security software

    However times are changing and many security issues are out of the average person’s control.

    Lessons from Heartbleed

    The Heartbleed Open SSL bug illustrated the limits of individuals in protecting their information. As a bug in the secure socket layer software, the Heartbleed Bug could expose sensitive data on websites using the service.

    The disappointing thing with Heartbleed is that people following good security policies were vulnerable.

    Probably the biggest threat with Heartbleed however is the Internet of Things, where relatively simple devices – the connected kettle – could expose security credentials.

    The Target hack

    Another example of how security is beyond the control of the individual user is the Target hack. Hackers found their way into the US department store’s network though an airconditioning contractor. From there, they were able to steal millions of customer payment details.

    The Target hack is one of dozens of similar coporate security compromises and this will continue until security is taken seriously by company directors and regulators.

    A pocket sized security breach

    As the Oleg Pliss hack showed, smartphones are not immune to security breaches.

    With our phones gathering increasingly more data on our behaviour, protecting the data they gather is going to become one of the biggest challenges facing us.

    Rich data

    Smartphones are not just gathering location data, as technologies like iBeacons roll out more information is being gathered from more sources.

    When we go shopping, attend a football game or visit the doctor these technologies are collecting information on our personal habits and behaviour.

    Not a generational issue

    One of the myths around security and privacy is that concerns revolve around the generations.

    The idea that only older people care about privacy or that younger folk understand technology is a myth.

    Unfortunately however our political and business leaders come from a segment of society that doesn’t care about or understand the technology or issues.

    If meaningful change is to be made in securing our information, then we’re going to have to demand our business and political leaders take these issues seriously.

    Similar posts:

    • No Related Posts
  • Economics for the ordinary person

    Economics for the ordinary person

    “95% of economics is common sense” says economist Ha-Joon Chang in his book The Little Blue Book — Five Things They Don’t Tell You About Economics.

    In a presentation at this year’s RSA conference Chang explains some of the underlying themes of his book, particularly the point that the various schools of economics theory are based on their own sets of cultural assumptions and that every group struggles to explain the world, especially when asked to fit Singapore into their models.

    Chang’s five points are a call for the average person to understand economics and be prepared to challenge the orthodoxies being trundled out by business and political leaders.

    You should be willing to challenge professional economists (and, yes, that includes me). They do not have a monopoly over the truth, even when it comes to economic matters.

    As economists have been allowed to become the high priests of modern society — or possibly the court jesters of the corporatist world — it may well be time to challenge them.

    Similar posts:

  • Competing in the global tech race

    Competing in the global tech race

    Last week I wrote a piece for Business Spectator on the contrast between countries competing for tech investment and skills.

    Irish Taoiseach Enda Kenny was in Silicon Valley promoting Ireland as an investment and operating location while in London the Queen hosted 350 British tech companies at Buckingham Palace.

    Earlier this week President Obama hosted the first White House Makers’ Faire with over thirty inventors showing their ideas.

    All of this contrasts with the Australian Prime Minister Tony Abbott’s recent North America where he touted the country was ‘open for business’ by offering mines and toll roads to Canadian pension funds.

    It’s clear some countries’ leaders recognise they live in the Twentieth First Century while others are struggling with Twentieth Century.

    Similar posts:

  • Insurers and the internet of things

    Insurers and the internet of things

    Earlier this week, Microsoft Ventures announced a partnership with American Family Insurance in an accelerator for home automation services.

    The insurance industry has an obvious interest in the Internet of Things (IoT) as constant monitoring allows them to make more accurate assessments of risk and quickly adjust policies or premiums when circumstances change.

    “We are focused on helping early stage companies bring new products and services to market that can make our policyholders’ homes and lives safer,” Microsoft’s media release quotes Dan Reed, American Family Ventures’ Managing Director as saying.

    For consumers and the public at large, there a serious implications of constant monitoring by insurance companies, marketers and government agencies.

    As Business Insider points out, Google already holds a massive amount of data on us all with Apple, Amazon, Facebook and Microsoft not far behind.

    One of the key questions of the next decade is ‘do we we want our smart smoke detectors spying on us?’ and, if so, do we want it giving that data straight to the insurance company?

    Similar posts:

    • No Related Posts
  • The online security pains of a growing business

    The online security pains of a growing business

    Possibly the most embarrassing of the outbreak of computer hacks in late 2011 was the breaching of prominent geopolitical analysts Strategic Consulting, also known as Stratfor.

    The Daily Dot dissects what went wrong for Stratfor based on a leaked report from Verizon Business who carried out a “forensic investigation” of the hack which the company claims cost them $3.8 million in damages.

    While the monetary damages were substantial for a relatively small company, Stratfor’s reputation was probably the greatest casualty as customers’ credit card details were exposed and the firm’s confidential files were distributed by Wikileaks.

    The tragic thing is that none of this would have happened had Stratfor followed basic IT security practices, something that every business should be following.

    Don’t store credit card details

    Probably Stratfor’s biggest mistake was storing customers’ credit card details – there is no reason for saving your clients’ payment details. Ever.

    If you’re accepting credit cards, organise a payment service to handle that work for you as they know what they are doing and take most of the management hassles, security and fraud risks.

    In most cases, these companies’ fees are no more than manual processing fees that Stratfor and most businesses manually processing payments get hit with anyway.

    Password policies

    Another basic mistake was that passwords were shared and kept simple; there is no excuse for giving staff the same password to access confidential or critical files and systems.

    Similarly, there wasn’t a ‘need to know’ policy; that is, that an analyst has no reason to have access to HR files and the receptionist no need to be looking at sales figures. Sensitive data should only be accessible to those who need it for their day-to-day work.

    Remarkably, Stratfor didn’t have any properly configured firewalls and on many computers didn’t have up to data anti-virus protection. All of this made it easy for hackers to get into the network and access confidential information.

    The online pains of growing a business

    In some respects it’s possible to feel sorry for Stratfor’s management, the report is a classic example of a business that outgrew the IT structure for a one or two person operation founded by men who didn’t understand the risks of the internet.

    Today there’s no excuse not to have systems locked down or to lack a company culture that recognises data security as being essential in the modern business world.

    Stratfor’s hack was a spectacular example of what could go wrong, but it’s a warning for all businesses about the importance of security in a connected world.

    Similar posts:

    • No Related Posts