AIRLINK 79.41 Increased By ▲ 1.02 (1.3%)
BOP 5.33 Decreased By ▼ -0.01 (-0.19%)
CNERGY 4.38 Increased By ▲ 0.05 (1.15%)
DFML 33.19 Increased By ▲ 2.32 (7.52%)
DGKC 76.87 Decreased By ▼ -1.64 (-2.09%)
FCCL 20.53 Decreased By ▼ -0.05 (-0.24%)
FFBL 31.40 Decreased By ▼ -0.90 (-2.79%)
FFL 9.85 Decreased By ▼ -0.37 (-3.62%)
GGL 10.25 Decreased By ▼ -0.04 (-0.39%)
HBL 117.93 Decreased By ▼ -0.57 (-0.48%)
HUBC 134.10 Decreased By ▼ -1.00 (-0.74%)
HUMNL 7.00 Increased By ▲ 0.13 (1.89%)
KEL 4.67 Increased By ▲ 0.50 (11.99%)
KOSM 4.74 Increased By ▲ 0.01 (0.21%)
MLCF 37.44 Decreased By ▼ -1.23 (-3.18%)
OGDC 136.70 Increased By ▲ 1.85 (1.37%)
PAEL 23.15 Decreased By ▼ -0.25 (-1.07%)
PIAA 26.55 Decreased By ▼ -0.09 (-0.34%)
PIBTL 7.00 Decreased By ▼ -0.02 (-0.28%)
PPL 113.75 Increased By ▲ 0.30 (0.26%)
PRL 27.52 Decreased By ▼ -0.21 (-0.76%)
PTC 14.75 Increased By ▲ 0.15 (1.03%)
SEARL 57.20 Increased By ▲ 0.70 (1.24%)
SNGP 67.50 Increased By ▲ 1.20 (1.81%)
SSGC 11.09 Increased By ▲ 0.15 (1.37%)
TELE 9.23 Increased By ▲ 0.08 (0.87%)
TPLP 11.56 Decreased By ▼ -0.11 (-0.94%)
TRG 72.10 Increased By ▲ 0.67 (0.94%)
UNITY 24.82 Increased By ▲ 0.31 (1.26%)
WTL 1.40 Increased By ▲ 0.07 (5.26%)
BR100 7,526 Increased By 32.9 (0.44%)
BR30 24,650 Increased By 91.4 (0.37%)
KSE100 71,971 Decreased By -80.5 (-0.11%)
KSE30 23,749 Decreased By -58.8 (-0.25%)

As digitalisation accelerates throughout the world, it is no secret that we now live in a highly data driven world. Data is everywhere and it is impacting our ways of life. As soon as we interact with a digital device, data drives our minds.

For instance, whenever we open a streaming application, the rankings of elements on that platform are determined through data.

When a user logs onto Netflix, the platform first lists recently released shows and movies followed by several recommendations based on previously watched titles.

PTA releases annual report on cyber security

Spotify follows a somewhat similar algorithm and lists songs based on previously streamed songs.

Social media applications too, track interaction with people and posts and a user is shown accounts of people they may know in real life and posts based on their browsing history.

Food delivery and online shopping applications tend to offer deals to customers based on their previous purchases.

The voice assistants in smartphones and other home devices have a tendency to store each and everything told to them.

Its no secret that a majority of digital applications store customers’ data in an effort to boost revenue and offer a better customer experience.

This has triggered fear all over the world since customer data is vulnerable to theft. Over the past years, there have been hundreds of instances of data leaks that threaten consumers on digital platforms.

We took digital services for granted. Now it’s time to pay

The data is usually used by companies to perform analytics and improve their business models but, when leaked, it becomes available to hackers who sell it on the deep or dark web.

This data includes emails, passwords, locations, addresses, contact numbers, past purchases, names of relatives and much more.

A leak of such details can put life of people and their close ones under threat.

In an effort to tackle this, a lot of applications have emerged that claim not to store user data. However, customer adaptation is quite slow.

This shows that either customers are not aware of the extent of the threat posed by stored data or they simply don’t care.

Exponential growth of AI: need for global regulations to keep misuse in check

Companies, on the other hand, have invested heavily in cybersecurity but data leaks from even large firms are common.

The main reason for this is that cybersecurity is a complex and diverse field.

It is also an evolving area that sees hundreds of new challenges each day.

There are many angles to cybersecurity that consists of encryption, cloud security, network security, application security and much more. Therefore, a large amount of workforce and expertise in this area is needed for a single company to protect its data.

Cybersecurity experts are small in number compared to software engineers, application developers and website managers.

A cybersecurity expert needs far more knowledge than an average computer scientist. In short, cybersecurity expertise is lacking as compared to its demand.

In addition, a lot of firms do not know how to set up cybersecurity infrastructure that best suits their business model.

Lagging behind in ‘internet of things’ race

Additionally, software needed for cybersecurity infrastructure are some of the costliest. Big businesses spend as much as 10% of their annual budget solely on cyber security.

Therefore, protection of customer data entails massive expenditure which forces companies to spend whatever they can on cybersecurity but at times, that too proves to be insufficient.

As an alternate, the pioneers of internet introduced Web 3.0 that aimed to provide consumer safety and security while browsing however, it adopted few security risks from Web 2.0 and faced new security risks some of which cannot be tackled at present.

Web 3.0 brought new challenges and shift to it is not as quick as what was expected by companies. Similar to the metaverse, it’s a concept unknown to many.

Moreover, open source software is termed to be safe and research suggests the same. This is because the open source community corrects any vulnerabilities in the code soon after release.

Digital businesses and consumers have a long way to go to ensure strict data protection however, the need for which is rising with every passing day.

The article does not necessarily reflect the opinion of Business Recorder or its owners

Omar Qureshi

The writer is a Senior Sub Editor at Business Recorder (Digital)

Comments

Comments are closed.