Cyber security: 9 key concepts explained
An interesting case erupted earlier this year between the FBI and Apple, manufacturer of the iPhone. America's Federal Bureau of Information requested that Apple assist it in unlocking certain phones in order to extract information from the phones that might assist the bureau with its investigations. Apple point-blank refused to assist with this collection of confidential information from its customers, saying that it had "implications far beyond the case at hand".
Apple v FBI is just the latest in a swath of stories relating to the gathering of data from private mobile conversations and being transferred way beyond their original context. If anything, Apple's stance defending our all-important right to privacy struck some as surprising amid a sea of freely exchanged big data but the incident was also a reminder of the difficulties involved in keeping your private information secure in this day and age.
With a maze of jargon and data to wade through, the field of cyber security is far from straightforward. Here are some essential concepts to understand to make sure you don't put your business at risk:
1. SSL
When sending confidential information in electronic files, make sure you use an SSL encryption protocol. SSL stands for 'secure sockets layer' and is a very common way of transferring information without a third party being able to intervene and work out the contents of the file. So it's like a code that can only be deciphered by your addressee. On our website at 1stcalldetectives.com we offer a brand-new encryption certificate that will ensure a new higher standard of security for your data.
2. https/http
Websites, too, can be easily vulnerable to security attacks and this is why you should always be vigilant when giving out your personal details online. If the web address of the page you are accessing begins with 'https' instead of 'http', this means there is a secure connection between you and the website provider and it is safe to enter your details, without fear of having them stolen by a third party.
3. VPN and secure tunnel
If you're working on a mobile device or second computer, it's advisable to use a virtual private network (VPN) or Secure Tunnel when sharing files between the machines. This, again, is to avoid the data being made insecure through the transfer.
4. Hacking
Not just the subject of sci-fi stories, hacking is alive and well and every day there are stories of companies having their data exposed into due to insufficient security measures. It's important to keep abreast of and learn from case studies in order to prevent this happening to your business.
5. Secure communications
Without secure messaging, your data can be easily accessed by anyone. Make sure you are using secure messaging applications to make sure it remains safe.
6. Security v convenience trade-off
These two concepts appear to be diametrically opposed to each other within the world of data security. A strong password requirement is, on the face of it, a good idea, but if it causes everyone to forget their passwords, or to expose them by, say, writing them down, the system is not working so well.
7. Security protocols
These are the software-based security credentials used in computers and mobile devices to prevent strangers from accessing their data. In the Apple v FBI case it was revealed that the FBI had found a way to bypass one level of the iPhone's security protocol (getting past the screen lock) but needed help getting into the places where the data was stored. All businesses should stay on top of about the security protocols of their devices, what they are set up to prevent and where their security flaws and vulnerabilities lie.
8. IP Bill
Here in the UK, spying on phones has been a hot topic since the phone-hacking scandal unfurled in 2011. A bill introduced by Theresa May, currently under scrutiny in the House of Commons, concerns the operation of law-enforcement and intelligence services with regard to intellectual property in the interception of communications. It has been called the Investigative Powers Bill or IP Bill (and also nicknamed 'the Snoopers' Charter'). The bill would require phone and internet providers to collect and store records of all customers' communications, with a view to potentially using them for investigation purposes.
There have been complaints about this invasion of the privacy of many millions of innocent people and it highlights the fact that, even in the UK, this wholesale accumulation of data on British citizens' private lives by government is a project that is gaining ground. Security is becoming more and more essential.
9. Internet of Things (IoT)
This is the name given to all the other devices, other than computers and phones and tablets, that all communicate via the internet. From Wi-Fi speakers to car dashboards to fitness trackers, our lives are increasingly full of these communicative objects and this means an ever-growing mine of data to keep track of. Your computer may be safe, but how about your toaster, your watch, your TV?
For all your cyber security needs contact 1st Call Detectives and we'll help you protect your data.