Overview
Is there an app for that…yes of course there is an app for problems that are not even unearthed yet.
Considering that good data is worth gold…does that app risk compromising your security in every facet of your livelihood (IT professionals refer to this as an attack surface)…yes unfortunately it does if you act gung ho.
So not to throw the baby out with the water, apps are great positive appendixes to your life….you should constantly educate yourself on the topic of security and use apps wise. Every time you use a free (often paid) app or service then it is simply spying on you by trading your personal info for advertising money….this is the rule of economics and is as simple as that.
Big tech companies became super wealthy by selling your private info and then either adding it into the massive fine print or denying it. Hackers became powerful by exploiting every good process.
The current state of IT security, in particular, is that there is now no such thing any longer as absolute security as it was replaced by the term ‘Zero Trust’ which is a radically different approach…
Use cases
A few approaches to best industry practices:
- Any products & services can contain security risks so properly vetted and from sources, you know. (Notice I did not mention sources you trust as there should be none)
- Even known sources may be using risky components from their sources.
- Legacy technologies can pose enormous risks so understand the underlying tech.
- MFA or multi-factor authentication makes the risk much safer.
- NFC as found in bank cards is a good way of determining good traceability and authentication in physical devices.
- Cloud to cloud such as OATH2.0
- Web 3.0 with blockchain data management.
- Encrypting data in all 3 states as described below or here in article.
How can great security be achieved?
By adopting segmented ZERO TRUST security! This means layering security like an onion and segmenting networks well. Add a few other best industry best practices and your data is safe.
CATIM usage
At CATIM we promote and have fully adopted a Zero Trust philosophy in all our solutions using modern tech such as MFA & NFC.
Additional Post information
- Broadcom ‘What is Zero Trust’…see video here
- What it’s like to use a De-Googled phone in real life?…see intriguing video here
- Computer Scientists Achieve ‘Crown Jewel’ of Cryptography…see article here
- A certain social site does what with your userdata? …see the article here
- How Zero-Trust Should be Expanded to Include your Embedded Devices/IoT…see article here