Data Security – Part 1
Since the internet began, we have grown more and more dependent on it. It’s awesome! It enables you to sync your applications, documents, calendars over multiple platforms; connect and share with others no matter your physical location; and a learning tool for almost anything you want. It also holds our photos, metadata and other confidential information… so why are we using our childrens’ names as passwords!?
Our false sense of cyber-security is tantamount to that of car-safety… we know it happens, people warn us about its consequences of happening, but we refuse to believe it will happen to us.
Sydney Morning Herald recently published an article comprising people pushing for a two-tier vefirication system after their phones had been remotely wiped by hackers. A wiped phone is more an inconvenience than a car accident, however these are the lucky ones compared to those whose have their bank details hacked or their very private photos made very very public.
Described above were user-targeted attacks, affecting only a minority of internet users.
Company-targeted attacks are a much bigger issue. In 2012, LinkedIn were subject to a cyber attack compromising 117 million accounts. LinkedIn were so oblivious to their own security flaws that this number was thought only to be 6.5 million at the time of the attack, four years ago!
More recently, Ashley Madison (and its admittedly catchy ad) were subject to a data breach that preceded many awkward household conversations.
You may barely use Linked-In, and I should hope never Ashley Madison, and feel like these issues are overhyped. You may feel safe from the companies’ public statements. LinkedIn’s response to their data-breach was just for people to change their passwords whilst Ashley Madison merely absorbed the publicity. Changing your password might seem easy, but if you’re someone who uses the same password for everything… your LinkedIn profile may be the least of your worries.
Out of curiousity before continuing with the slighty-more science heavy part-two of this post, I’d like you to fill out this thirty-second survey to provide me with some context (it’s the same link as in the second paragraph). This survey does not ask you to enter your password. Never enter your password into a Google-form. Never.
Thanks for reading!