Wednesday, 22 January 2014
Invest in cyber security
THE 2014 production of the International Consumer Electronics Show (CES) recently held in Las Vegas, Nevada was a smorgasbord of delights for the tech lover. The different gadgets and machines on display were a testament to the imagination, ingenuity and innovation of the human mind. However, we were particularly intrigued after learning about some of the latest developments in biometric technology as showcased at the CES.
Two innovations in this field caught our attention – the Myris and the Pulse Wallet. As its name so cleverly suggests, Myris (my iris) scans the user’s eye to ascertain identity and gain access to one’s gadget/data. The small, portable device connects via a USB port, making it the essence of convenience. Meanwhile, the Pulse Wallet appears to nearly erase the line between man and machine. The palm scanner links the vein layout of the user’s hand to their credit card, allowing them to make payments with the swipe of a hand, rather than a card.
The two gadgets appear to make life that much more secure and convenient – providing an individualised method of protecting one’s sensitive data and finances, without having to remember endless lists of passwords and/or PIN numbers; or worry about the card being lost or stolen. However, while technophiles everywhere may be marvelling, technophobes are probably cringing in horror. In fact, one does not have to be anti-technology to be a bit uneasy about such capabilities becoming commonplace. The average person might interact with basic biometrics – fingerprint scanners and voice recognition on smart phones, for example – but the fact remains that many do not understand how it all works. And that means they cannot fully appreciate the doors that it may open – some of which may not all lead to a safe place.
As quickly as software developers can come up with a new system or gadget, there are those who make it their mission to ‘crack’ them. Some do it simply for the challenge; others for more nefarious reasons. Identity theft has become big business as the world has become more digitised and companies which utilise online facilities – in other words, nearly all of them – must do what they can to stay one step ahead of the hackers and other persons who would seek to compromise their security. In fact, this is how biometrics has gained popularity, as it purports to be the ultimate in security since, by rights, it should eliminate the ability for anyone to duplicate another’s identity.
However, if we appreciate that the hackers always find a back door or a way around the system, then shouldn’t we be concerned about fusing the essence of ourselves so intimately with our technology?
Though we appreciate the need for thorough checks, the process to regaining control and receiving compensation after one has been the victim of identity theft can be a tedious and stressful one. Some persons are forced to go to great lengths and expense to prove that they are indeed who they say they are; all while the identity thief is living the high life. How much harder would it become to prove that you are a victim when faced with an ‘impossible’ breach of biometric-based security?
Add to this the fact that cyber security is still an underdeveloped field in developing countries such as ours, and one can see the potential for chaos if we do not adequately prepare ourselves before embracing new technologies. Just as we encourage the use of technology throughout the region to increase efficiencies and boost productivity, we also suggest that a greater investment be made in cyber security.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment