We are undergoing the “Uberfication” of our personal privacy. We freely exchange personal information for convenience.
We tell Uber where we are, our credit card information and some personal information, all for a much better experience than most taxi services provide.
This mindset extends to our shopping experiences. Most people wouldn’t give their e-mail address when they first walk in the store, but in exchange for the convenience of having the receipt sent to our e-mail address, we now gladly give it out.
At the same time, we are becoming much more hesitant to trust in the Internet and give up our personal data. Yet, so many vendors and services now have so much of our information, one has to wonder how they are protecting it.
For businesses this really stresses the importance of a layered security approach. So many companies we see invest a lot of money in one line of defense. But that turns out to be a bit like the Maginot Line in World War I and II intended to prevent a direct assault from Germany.
So the Germans just went around it. And the modern hacker does the same for businesses that employ one line of defense. We’re seeing a large amount of interest from customers deploying mobile for business looking to better protect sensitive information in our Secure Content Locker (think of a secure Dropbox), multi-factor authentication and identity management.
The problem with security breaches aren’t the ones we’ve heard about in the news but the ones that haven’t been discovered yet.
Going forward, we expect businesses and individuals will look at security and privacy more holistically as they evaluate the services and tools used for convenience and productivity.
Security does not exist in a vacuum and must be regularly evaluated based on the latest vulnerabilities and technology available.
We have been quick to give up personal data on our smart phones as they also become our wallet, house keys and information gateways for our personal and professional lives.
As end users of these mobile applications, we need to learn to pause and truly understand what information we are making available before clicking “accept.”
At the same time, businesses that deploy devices, e-mail, applications and content need to implement the right layers of security and use the guiding principal of trust, but verify.