And The Security Envelope Goes To…

It’s Oscar Season here in Southern California, and everyone is waiting for the envelopes!

At Milton though, we are thinking about a different kind of envelope – a Security Envelope.

The information age has given us all sorts of conveniences, but as we move ahead towards an even more connected world we have to keep in mind the cost of that convenience.

I am, of course, talking about security and, more significantly, the control of collected information. We tend to see security as a war against aggressive attackers bent on gaining access to things we would like to keep confidential, but what about the information that we willingly give up? Things like cookies, tracking data, heat maps of webpages, and a myriad of other information that is often anonymously collected and used to establish personal profiles. Do we really want this level of information collected and stored about us? What about the upcoming Internet of Things? With wearables, biometric information will be sent to marketers, the government and yes, Hackers (through illicit means – that’s an entirely different conversation).

How do we control what is shared about us?

I think this is going to become a very big issue as people begin to realize how extensive their online footprints are becoming. The personal control of personal information will soon become a substantial industry.

An ideal solution to this would be to use our own “friendly” automation to control just how much is shared about us. You might think of this as a higher-level firewall that we could set to share whatever we feel comfortable sharing.

For example, internal messaging systems: Do we really need to allow that to go off-site? Wouldn’t we like to be absolutely certain that those messages are kept local? Or databases that talk with vendor software: What is being collected? How can we be sure our information isn’t compromised?

Setting up automation to watch things like exactly how much information is sent back and forth between cloud services, or adding markers to data that we are assured will be kept private or restricting records we want kept local from being sent off-site is all going to be a lot more desirable as we move towards cloud service operation and more connected environments.

Today there are services that scan the internet to see if your private data has been leaked. These services search Tor networks, torrents and hidden websites for references against personal information. It’s a nice idea, but unfortunately it is really more mitigation than a solution. With the tsunami of personal and corporate information that is becoming available, we need to act long before that sort of data “accidentally” escapes. Proactivity is the name of the game here.

At Milton, we are thinking about these problems. Our security appliances and solutions are just the beginning of what we see as a proactive solution for your security. Giving you control over what you share is something we care deeply about.

Cloud services are here already and are only going to get bigger. Streamed delivery of applications has already taken hold and there is no arguing with the convenience of it, however, we need to also address how we retain ownership of the security aspects of our information independently of outside influence.

At Milton, we have the technology to make this happen for you today.

Visit us today for more details on how we can keep your data safe.

www.MiltonSecurity.com

One Comment

  1. David Dickinson said:

    Thank you for this article. I’m a sysadmin in the health care industry. Protecting data is — by law — my first obligation. A lot of people in this field think that protected health information is all they need to be concerned about. However, privacy is much more than that. Someone might be able hurt me if they know three facts about me, but they can do a lot more damage to me, even without my knowing it, if they can predict my behavior, and that’s what massive data collection allows data miners to do. I also have an obligation to protect the users of the networks I administer. Limiting what data can be collected about them without their consent is also part of my job, but the tools and policies for doing that are few and far between. Our legal system has a long way to go before it deals effectively with this problem. I fear that little will be done while large corporations control our government.

    January 22, 2015
    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *