AIRLINK 189.36 Increased By ▲ 1.33 (0.71%)
BOP 11.10 Decreased By ▼ -0.76 (-6.41%)
CNERGY 7.28 Decreased By ▼ -0.26 (-3.45%)
FCCL 36.65 Decreased By ▼ -1.14 (-3.02%)
FFL 14.95 Decreased By ▼ -0.29 (-1.9%)
FLYNG 26.19 Increased By ▲ 0.66 (2.59%)
HUBC 130.89 Increased By ▲ 0.74 (0.57%)
HUMNL 13.47 Decreased By ▼ -0.14 (-1.03%)
KEL 4.28 Decreased By ▼ -0.07 (-1.61%)
KOSM 6.08 Decreased By ▼ -0.09 (-1.46%)
MLCF 45.94 Increased By ▲ 0.26 (0.57%)
OGDC 201.86 Decreased By ▼ -4.57 (-2.21%)
PACE 6.12 Decreased By ▼ -0.26 (-4.08%)
PAEL 38.36 Decreased By ▼ -1.95 (-4.84%)
PIAHCLA 16.73 Decreased By ▼ -0.22 (-1.3%)
PIBTL 7.94 Decreased By ▼ -0.09 (-1.12%)
POWER 9.86 Decreased By ▼ -0.17 (-1.69%)
PPL 173.46 Decreased By ▼ -5.38 (-3.01%)
PRL 34.73 Decreased By ▼ -1.63 (-4.48%)
PTC 23.95 Decreased By ▼ -0.44 (-1.8%)
SEARL 101.74 Decreased By ▼ -1.42 (-1.38%)
SILK 1.07 No Change ▼ 0.00 (0%)
SSGC 32.70 Decreased By ▼ -3.54 (-9.77%)
SYM 17.93 Decreased By ▼ -0.30 (-1.65%)
TELE 8.14 Decreased By ▼ -0.24 (-2.86%)
TPLP 12.02 Decreased By ▼ -0.14 (-1.15%)
TRG 67.40 Increased By ▲ 0.07 (0.1%)
WAVESAPP 11.80 Decreased By ▼ -0.21 (-1.75%)
WTL 1.52 Decreased By ▼ -0.05 (-3.18%)
YOUW 3.90 Increased By ▲ 0.01 (0.26%)
BR100 11,819 Decreased By -87.9 (-0.74%)
BR30 35,000 Decreased By -554.1 (-1.56%)
KSE100 112,085 Decreased By -478.8 (-0.43%)
KSE30 34,946 Decreased By -148 (-0.42%)

As digitalisation accelerates throughout the world, it is no secret that we now live in a highly data driven world. Data is everywhere and it is impacting our ways of life. As soon as we interact with a digital device, data drives our minds.

For instance, whenever we open a streaming application, the rankings of elements on that platform are determined through data.

When a user logs onto Netflix, the platform first lists recently released shows and movies followed by several recommendations based on previously watched titles.

PTA releases annual report on cyber security

Spotify follows a somewhat similar algorithm and lists songs based on previously streamed songs.

Social media applications too, track interaction with people and posts and a user is shown accounts of people they may know in real life and posts based on their browsing history.

Food delivery and online shopping applications tend to offer deals to customers based on their previous purchases.

The voice assistants in smartphones and other home devices have a tendency to store each and everything told to them.

Its no secret that a majority of digital applications store customers’ data in an effort to boost revenue and offer a better customer experience.

This has triggered fear all over the world since customer data is vulnerable to theft. Over the past years, there have been hundreds of instances of data leaks that threaten consumers on digital platforms.

We took digital services for granted. Now it’s time to pay

The data is usually used by companies to perform analytics and improve their business models but, when leaked, it becomes available to hackers who sell it on the deep or dark web.

This data includes emails, passwords, locations, addresses, contact numbers, past purchases, names of relatives and much more.

A leak of such details can put life of people and their close ones under threat.

In an effort to tackle this, a lot of applications have emerged that claim not to store user data. However, customer adaptation is quite slow.

This shows that either customers are not aware of the extent of the threat posed by stored data or they simply don’t care.

Exponential growth of AI: need for global regulations to keep misuse in check

Companies, on the other hand, have invested heavily in cybersecurity but data leaks from even large firms are common.

The main reason for this is that cybersecurity is a complex and diverse field.

It is also an evolving area that sees hundreds of new challenges each day.

There are many angles to cybersecurity that consists of encryption, cloud security, network security, application security and much more. Therefore, a large amount of workforce and expertise in this area is needed for a single company to protect its data.

Cybersecurity experts are small in number compared to software engineers, application developers and website managers.

A cybersecurity expert needs far more knowledge than an average computer scientist. In short, cybersecurity expertise is lacking as compared to its demand.

In addition, a lot of firms do not know how to set up cybersecurity infrastructure that best suits their business model.

Lagging behind in ‘internet of things’ race

Additionally, software needed for cybersecurity infrastructure are some of the costliest. Big businesses spend as much as 10% of their annual budget solely on cyber security.

Therefore, protection of customer data entails massive expenditure which forces companies to spend whatever they can on cybersecurity but at times, that too proves to be insufficient.

As an alternate, the pioneers of internet introduced Web 3.0 that aimed to provide consumer safety and security while browsing however, it adopted few security risks from Web 2.0 and faced new security risks some of which cannot be tackled at present.

Web 3.0 brought new challenges and shift to it is not as quick as what was expected by companies. Similar to the metaverse, it’s a concept unknown to many.

Moreover, open source software is termed to be safe and research suggests the same. This is because the open source community corrects any vulnerabilities in the code soon after release.

Digital businesses and consumers have a long way to go to ensure strict data protection however, the need for which is rising with every passing day.

The article does not necessarily reflect the opinion of Business Recorder or its owners

Omar Qureshi

The writer is a Senior Sub Editor at Business Recorder (Digital)

Comments

Comments are closed.