High profile data breaches at companies like Mossack Fonseca, Target, Home Depot and Wendy’s along with Government controversies like Edward Snowden and the FBI’s legal suit against Apple after the San Bernadino shootings have severely dented public confidence in the ability of business and government to keep personal data safe and secure.
The average company network has many more devices connecting to it than even just a few years ago. In addition to traditional workstations there are now smartphones and tablets alongside a wide variety of Internet-connected equipment from printers, access control systems and security cameras to digital signage, smart TVs, thermostats and even everyday appliances like coffee machines. In situations where digital signage shares the network with such a diverse range of devices and applications use of software-based site-to-site VPNs are often the best way to ensure security, signal continuity and optimize flexibility.
Tor (The Onion Router) is one of the most important tools for anonymity on the Internet. The Tor network, protocol and client, make it extremely complicated to trace user activity. However, Tor users are not completely invisible. Firstly, only the connection to the exit node – the last server before traffic leaves the Tor network – is encrypted. Whoever controls the exit node can see data traffic in plain text. Meanwhile attacks and statistical analysis methods are known which can allow an organization with access to large parts of global Internet traffic to de-anonymize users in some cases. Nevertheless, Tor can protect users against the curiosity of most unauthorized parties if it is configured correctly. And a better solution is currently not available – at least not for the average computer user.
For a couple of years now security breaches in the retail sector have seldom been out of the headlines. Breaches at large retail chains like Target, Neiman Marcus and The Home Depot in 2014 were followed in 2015 by Dungarees, Starbucks, CVS, Toys R Us and Wallmart Canada. Some of the latter stores were much smaller illustrating that when it comes to attacks a retailer’s size is not important. According to the annual Global Threat Intelligence Report, retail now makes up 22 per cent of all response engagements, up from 12 per cent the previous year. This is also reflected in the latest report from BDO which lists a possible security breach in joint top spot with “general economic conditions” as the biggest security risk to the retail sector.
Germany is reported to be increasingly left behind in terms of digitization in public spaces. The reason: There are just not enough hotspots available. A political decision has now been taken to abolish any “disturber“ liability (“Störerhaftung” under German law). This means, the door has been closed for any business models based on cease and desist letters. This will pave the way for more free hotspots in cafés, at airports, train stations and hotels.
Many professionals frequently use free Internet access in remote locations, especially when they travel, making them easy targets for hackers. And while most encrypt their private Wi-Fi to ensure data protection and IT security related to corporate network access, they seldom take the same precautions when surfing the Internet or checking email from public hotspots.
Half of enterprises today store sensitive information within big data environments (up from 31 percent in 2015). Influential agencies like ENISA warn there are considerable cyber risks from using big data tools. There is concern, for example, that such developments are a possible point of compromise and there are calls for increased vigilance and compliance.