The “phishing” industry is a booming goldmine for hackers. More unsuspecting victims fall prey every hour to phishing campaigns, than any other type of cyber-attack. It is an epidemic of sorts, plaguing the digital world.
We live in a rapidly changing world. Constant breakthroughs in new technologies are occurring at a fantastical pace. This has led to many wonderful improvements in our society but has also come with unexpected conundrums. Advances in data collection methods have completely transformed our commercial sectors, by allowing the consumer to be studied and observed in real-time. As the consumer interacts with the product or service, data is collected. It is then sent to manufactures and marketing firms for research analysis. Data collection has also impacted our society on various social media platforms and created serious ethical dilemmas. Mass data collection can be a positive contributing factor to the improvement of many emerging technologies but must be applied ethically. Another factor to consider, is how the data is being stored and who can access it. Over time (and many data breaches later), it was decided a standardized set of rules for data collection and storage was needed. What evolved was the General Data Protection Regulation.
Human beings have always sought out ways to communicate more efficiently. Our society has come a long way since the days of the telegraph and radio. Never have we been more inter-connected with our ability to communicate and collect data than we are now. New advances in technology has given us an unprecedented look, into how our industries and commercial sectors operate. The consumer can now be studied with precise observation in real-time. The arrival of the Internet of Things (IoT) has ushered in a new age of mass communication and data collection. First, let us discuss what IoT is and how it is applied in the real world. Simply put, the Internet of Things is a network of Internet connected objects able to collect and exchange data. Kevin Ashton of MIT was the first to mention the Internet of Things in 1999. His goal was to bring radio frequency ID (RFID) to the leaders of P&G. IoT has evolved tremendously since then. It is important to understand how versatile IoT can be. A “thing” in IoT can be a medical device (pacemaker) monitoring vital statistics, a built-in sensor to monitor tire pressure, or a smart thermostat to keep server rooms at acceptable temperatures, and commonly used household devices, such as Nest, Ring doorbell, and Roku boxes. All these examples collect and send data back to the manufacturer. Data is also sent to third-party analytical centers for both marketing and research. IoT is generally subcategorized by device, into three distinct groups: information technology, operational technology, and smart objects.