Every year, as Christmas draws nearer, many can be heard questioning the sanity of annual gifting madness. In the past, everything was better when the parents themselves were children and most were happy with a wooden car. Today’s children are far too spoiled anyway. But if you think the favorite toys of yesteryear (Magic Cube, He-Man, Furby, Tamagotchi) are the spawn of the devil, you’ll be amazed by the current toy trends. A survey of parents by the security software manufacturer McAfee found that 90 percent of children want networked toys. Hardly any parent, however, has IT security in mind, which is quite important with such digital technology finding a place in our children’s bedrooms.
The EU General Data Protection Regulation (GDPR) and the Network Information Security (NIS) directive are already causing a flurry of activity among businesses. Who is ultimately responsible for cybersecurity seems to be attracting particularly intense discussion. According to a recent study by Palo Alto Networks, cybersecurity is usually the responsibility of CIOs in 50% of companies compared to 30% of CISOs. This is a surprising finding, especially considering that the role of Chief Information Security Officer implies this task. Whether this changes is probably more of a political rather than technical matter. At least around 30 percent of respondents believe that the CISO or CSO should be responsible for cybersecurity. The current situation points to long established and seldom adapted rituals in the distribution of responsibility within companies.
Two of the biggest technology trends today – IoT (Internet of Things) and M2M (machine-to-machine) communications – are changing the business world beyond all recognition.
Companies of all sizes, from major manufacturers to small-and medium-sized services companies from all sectors, now have a golden opportunity to derive new revenue streams from managing and servicing their customers’ equipment remotely.
According to leading industry analysts, the IoT market already accounts for hundreds of billions of dollars in 2017 – a figure that is set to be in the trillions by 2021. But new research reveals IoT is also a major headache for enterprise everywhere because of limited information and inadequate security measures. Legislators in the U.S. and in Europe are working to bring in standards compelling designers to do more to make their devices secure. But the signs are that even then they may be limited in scope. The good news at least is that remote connections can be reliably secured so that M2M communications remains private and confidential using virtual private networks (VPNs).
Major sporting events are always popular with businesses. The 2018 World Cup tournament in Russia promises to be no exception. The corporate sponsorship opportunities on offer are an ideal way to entertain influential decision-makers of important customers and prospects. Set against this are recent reports of Russia’s tough new internet censorship laws – set to come into effect from November 1, 2017. The move is a security concern for Western company executives anxious that employees and VIPs visiting the event may be unable to prevent sensitive information being exposed to Russia’s extensive surveillance network. The good news is that the new regulation only blocks access to web services and online information that are outlawed already and does not extend to personal or legitimate business Virtual Private Network (VPN) use. With a corporate VPN and some simple guidelines it should be possible for visiting executives to conduct business over the Internet securely during World Cup 2018.
Small business owners have many things on their mind but IT security should not be one of them. Not so long ago, network protection for a small business amounted to maintaining a firewall and some antivirus software. Now, recent technology advances have blurred the boundaries between the company perimeter and the world at large. Consumerization of IT and flexible working mean employees now need secure, private remote access to company resources from their own devices at any time of day from anywhere in the world. This translates into increased risk to the business and the potential for higher levels of stress for business owners, especially if they take on fixing security issues in person. A small business requires additional protection, particularly once they begin to expand. This is where remote access Virtual Private Networks (VPNs) for employees and Industrial Internet of Things (IIoT) can help.
The U.S. space agency NASA uses a network of high powered communications antennae and transmitters around the world to track and exchange data with dozens of man-made probes and satellites travelling through space. Known as the Deep Space Network, the infrastructure is responsible for managing and monitoring the general health and safety of spacecraft currently engaged in valuable scientific research projects. Perhaps less widely known is the fact that Virtual Private Networks (VPNs) form a vital component – providing secure and reliable communications for machine-to-machine (M2M) and telemetry data passing across the network.