Continued lapses in network security are holding back more activities being conducted online, poor security leads to distrust and this stifles adoption of technological change. If cyber security is better designed it will increase user certainty and it will result in greater use of the internet and better accumulation of skills by users and foster changes in user habits and the way commerce is undertaken. There will be a greater adoption of new methods of communication which will greatly assist the planet in reducing the requirements for people to travel unnecessarily. This cant happen to soon, if climate experts are to be believed, it is a matter of urgency. Even if they are not to be believed the fact is that at the current increasing rates of energy consumption and prices and projected shortages are going to eventually dictate changes if technological developments in renewable and efficient energy use are not developed fast enough. It will just then be a question of whether we tackle those problems in the context of a significantly degraded environment.
At present armies of people travel each day from their homes to various places of work in metropolitan regions all over the world many in private motor vehicles. Sadly governments have been ploughing huge investments into infrastructure to cope with this traffic demand that could be used to invest in the infrastructure that will be required in the future, for example better communications and public transport. Many of these people are white collar workers doing jobs on computers or using paper based systems or a combination of both that could well be done from their own residence without the need for travel to an office or meeting venue but only occur in this manner because organisations have yet to come to terms with controlling processes and protecting information in an online working environment.
Secure remote access is critical to the process and yet still today most remote access to information systems, processes, networks and applications are controlled by a user name that is not masked, a password that has insufficient controls and with no lockouts to prevent hacking attempts because to do so results in users being locked out when hacking attempts are made. Many organisations inadvertently publicise where their most valuable asset, their customers, logon and may unintentionally inconvenience & confuse their existing customers when running promotions to attract new customers and vice versa. There are many client side solutions that purport to secure client computers for authentication but in truth most of these will not detect a compromised client device. Strength must come from a properly constructed set of routines that test the veracity of the person seeking to gain entry to the network the solution provided by Armorlog is the only solution for networks, computers and intelligent devices with a graphical user interface capability that does this.
Sign up for CIO Asia eNewsletters.