Apocalypse? Why not? Computer security breaches seem to increase in number and severity with each passing week (and those are only the ones we know about). How long can that continue before there’s a true apocalypse; a financial meltdown, a political upheaval, and daily life is altered forever?
White Knight? Or Black Hat?
The latest news about a Russian crime ring stealing over one billion usernames and passwords may just be the tip of a growing iceberg.
If governments, backs, and corporations can get hacked what chance do the rest of us have? We need a white knight to protect us from the black hats.
Cyber warfare is an incremental battle, and, incrementally speaking, Apple has managed to balance the need to have devices we can use with a security we can trust– for now.
Locking down a device that can only be accessed by a single individual is not difficult. But whether it’s a computing system, a personal computer, a smartphone or a tablet, a complete lockdown also means the system is mostly unusable.
That means a tradeoff is required; as in compromises; as in enough security to protect personal data but balanced with friendly usability. The Touch ID in iPhone 5s is merely a first step. Multi-factor authentication for everything is probably around the corner, followed up by some biometric scanner identification techniques on our devices that we don’t even know about.
If Apple cannot protect a few hundred million customers from hacking and data theft on our personal devices and online data, then who can?
Maybe the problem of online and computer security isn’t as bad as it sounds. After all, the headlines are there to drive eyeballs and clicks to articles so media outlets can sell more advertising. The quoted security experts have something to sell; their security services. Plus, who do you know that’s had files, documents, or data stolen by some hacker? Probably not many.
Still, I worry. Someone said that only the paranoid survive. And if everyone is out to get you, paranoia is a good attitude to have. So, I ask, are we witnessing the tip of the iceberg of a coming computing security apocalypse, or is it merely déjà vu all over again for Chicken Little?