AIRLINK 72.59 Increased By ▲ 3.39 (4.9%)
BOP 4.99 Increased By ▲ 0.09 (1.84%)
CNERGY 4.29 Increased By ▲ 0.03 (0.7%)
DFML 31.71 Increased By ▲ 0.46 (1.47%)
DGKC 80.90 Increased By ▲ 3.65 (4.72%)
FCCL 21.42 Increased By ▲ 1.42 (7.1%)
FFBL 35.19 Increased By ▲ 0.19 (0.54%)
FFL 9.33 Increased By ▲ 0.21 (2.3%)
GGL 9.82 Increased By ▲ 0.02 (0.2%)
HBL 112.40 Decreased By ▼ -0.36 (-0.32%)
HUBC 136.50 Increased By ▲ 3.46 (2.6%)
HUMNL 7.14 Increased By ▲ 0.19 (2.73%)
KEL 4.35 Increased By ▲ 0.12 (2.84%)
KOSM 4.35 Increased By ▲ 0.10 (2.35%)
MLCF 37.67 Increased By ▲ 1.07 (2.92%)
OGDC 137.75 Increased By ▲ 4.88 (3.67%)
PAEL 23.41 Increased By ▲ 0.77 (3.4%)
PIAA 24.55 Increased By ▲ 0.35 (1.45%)
PIBTL 6.63 Increased By ▲ 0.17 (2.63%)
PPL 125.05 Increased By ▲ 8.75 (7.52%)
PRL 26.99 Increased By ▲ 1.09 (4.21%)
PTC 13.32 Increased By ▲ 0.24 (1.83%)
SEARL 52.70 Increased By ▲ 0.70 (1.35%)
SNGP 70.80 Increased By ▲ 3.20 (4.73%)
SSGC 10.54 No Change ▼ 0.00 (0%)
TELE 8.33 Increased By ▲ 0.05 (0.6%)
TPLP 10.95 Increased By ▲ 0.15 (1.39%)
TRG 60.60 Increased By ▲ 1.31 (2.21%)
UNITY 25.10 Decreased By ▼ -0.03 (-0.12%)
WTL 1.28 Increased By ▲ 0.01 (0.79%)
BR100 7,566 Increased By 157.7 (2.13%)
BR30 24,786 Increased By 749.4 (3.12%)
KSE100 71,902 Increased By 1235.2 (1.75%)
KSE30 23,595 Increased By 371 (1.6%)

As digitalisation accelerates throughout the world, it is no secret that we now live in a highly data driven world. Data is everywhere and it is impacting our ways of life. As soon as we interact with a digital device, data drives our minds.

For instance, whenever we open a streaming application, the rankings of elements on that platform are determined through data.

When a user logs onto Netflix, the platform first lists recently released shows and movies followed by several recommendations based on previously watched titles.

PTA releases annual report on cyber security

Spotify follows a somewhat similar algorithm and lists songs based on previously streamed songs.

Social media applications too, track interaction with people and posts and a user is shown accounts of people they may know in real life and posts based on their browsing history.

Food delivery and online shopping applications tend to offer deals to customers based on their previous purchases.

The voice assistants in smartphones and other home devices have a tendency to store each and everything told to them.

Its no secret that a majority of digital applications store customers’ data in an effort to boost revenue and offer a better customer experience.

This has triggered fear all over the world since customer data is vulnerable to theft. Over the past years, there have been hundreds of instances of data leaks that threaten consumers on digital platforms.

We took digital services for granted. Now it’s time to pay

The data is usually used by companies to perform analytics and improve their business models but, when leaked, it becomes available to hackers who sell it on the deep or dark web.

This data includes emails, passwords, locations, addresses, contact numbers, past purchases, names of relatives and much more.

A leak of such details can put life of people and their close ones under threat.

In an effort to tackle this, a lot of applications have emerged that claim not to store user data. However, customer adaptation is quite slow.

This shows that either customers are not aware of the extent of the threat posed by stored data or they simply don’t care.

Exponential growth of AI: need for global regulations to keep misuse in check

Companies, on the other hand, have invested heavily in cybersecurity but data leaks from even large firms are common.

The main reason for this is that cybersecurity is a complex and diverse field.

It is also an evolving area that sees hundreds of new challenges each day.

There are many angles to cybersecurity that consists of encryption, cloud security, network security, application security and much more. Therefore, a large amount of workforce and expertise in this area is needed for a single company to protect its data.

Cybersecurity experts are small in number compared to software engineers, application developers and website managers.

A cybersecurity expert needs far more knowledge than an average computer scientist. In short, cybersecurity expertise is lacking as compared to its demand.

In addition, a lot of firms do not know how to set up cybersecurity infrastructure that best suits their business model.

Lagging behind in ‘internet of things’ race

Additionally, software needed for cybersecurity infrastructure are some of the costliest. Big businesses spend as much as 10% of their annual budget solely on cyber security.

Therefore, protection of customer data entails massive expenditure which forces companies to spend whatever they can on cybersecurity but at times, that too proves to be insufficient.

As an alternate, the pioneers of internet introduced Web 3.0 that aimed to provide consumer safety and security while browsing however, it adopted few security risks from Web 2.0 and faced new security risks some of which cannot be tackled at present.

Web 3.0 brought new challenges and shift to it is not as quick as what was expected by companies. Similar to the metaverse, it’s a concept unknown to many.

Moreover, open source software is termed to be safe and research suggests the same. This is because the open source community corrects any vulnerabilities in the code soon after release.

Digital businesses and consumers have a long way to go to ensure strict data protection however, the need for which is rising with every passing day.

The article does not necessarily reflect the opinion of Business Recorder or its owners

Omar Qureshi

The writer is a Senior Sub Editor at Business Recorder (Digital)

Comments

Comments are closed.