AGL 37.50 Decreased By ▼ -0.08 (-0.21%)
AIRLINK 222.89 Increased By ▲ 0.46 (0.21%)
BOP 10.82 Decreased By ▼ -0.14 (-1.28%)
CNERGY 7.56 Decreased By ▼ -0.10 (-1.31%)
DCL 9.42 Decreased By ▼ -0.21 (-2.18%)
DFML 40.96 Decreased By ▼ -0.74 (-1.77%)
DGKC 106.76 Decreased By ▼ -3.99 (-3.6%)
FCCL 37.07 Decreased By ▼ -0.99 (-2.6%)
FFL 19.24 Increased By ▲ 0.95 (5.19%)
HASCOL 13.18 Decreased By ▼ -0.19 (-1.42%)
HUBC 132.64 Decreased By ▼ -2.32 (-1.72%)
HUMNL 14.73 Decreased By ▼ -0.86 (-5.52%)
KEL 5.40 Decreased By ▼ -0.16 (-2.88%)
KOSM 7.48 Increased By ▲ 0.07 (0.94%)
MLCF 48.18 Decreased By ▼ -2.15 (-4.27%)
NBP 66.29 Decreased By ▼ -0.18 (-0.27%)
OGDC 223.26 Decreased By ▼ -5.35 (-2.34%)
PAEL 43.50 Increased By ▲ 0.13 (0.3%)
PIBTL 9.07 Decreased By ▼ -0.23 (-2.47%)
PPL 198.24 Decreased By ▼ -4.89 (-2.41%)
PRL 42.24 Decreased By ▼ -0.62 (-1.45%)
PTC 27.39 Increased By ▲ 0.06 (0.22%)
SEARL 110.08 Increased By ▲ 3.06 (2.86%)
TELE 10.52 Increased By ▲ 0.74 (7.57%)
TOMCL 36.62 Decreased By ▼ -0.01 (-0.03%)
TPLP 14.95 Decreased By ▼ -0.28 (-1.84%)
TREET 26.53 Decreased By ▼ -0.26 (-0.97%)
TRG 68.85 Decreased By ▼ -1.30 (-1.85%)
UNITY 34.19 No Change ▼ 0.00 (0%)
WTL 1.79 Increased By ▲ 0.03 (1.7%)
BR100 12,363 Decreased By -32.9 (-0.27%)
BR30 38,218 Decreased By -629.2 (-1.62%)
KSE100 117,120 Increased By 111.6 (0.1%)
KSE30 36,937 Increased By 72.2 (0.2%)

As digitalisation accelerates throughout the world, it is no secret that we now live in a highly data driven world. Data is everywhere and it is impacting our ways of life. As soon as we interact with a digital device, data drives our minds.

For instance, whenever we open a streaming application, the rankings of elements on that platform are determined through data.

When a user logs onto Netflix, the platform first lists recently released shows and movies followed by several recommendations based on previously watched titles.

PTA releases annual report on cyber security

Spotify follows a somewhat similar algorithm and lists songs based on previously streamed songs.

Social media applications too, track interaction with people and posts and a user is shown accounts of people they may know in real life and posts based on their browsing history.

Food delivery and online shopping applications tend to offer deals to customers based on their previous purchases.

The voice assistants in smartphones and other home devices have a tendency to store each and everything told to them.

Its no secret that a majority of digital applications store customers’ data in an effort to boost revenue and offer a better customer experience.

This has triggered fear all over the world since customer data is vulnerable to theft. Over the past years, there have been hundreds of instances of data leaks that threaten consumers on digital platforms.

We took digital services for granted. Now it’s time to pay

The data is usually used by companies to perform analytics and improve their business models but, when leaked, it becomes available to hackers who sell it on the deep or dark web.

This data includes emails, passwords, locations, addresses, contact numbers, past purchases, names of relatives and much more.

A leak of such details can put life of people and their close ones under threat.

In an effort to tackle this, a lot of applications have emerged that claim not to store user data. However, customer adaptation is quite slow.

This shows that either customers are not aware of the extent of the threat posed by stored data or they simply don’t care.

Exponential growth of AI: need for global regulations to keep misuse in check

Companies, on the other hand, have invested heavily in cybersecurity but data leaks from even large firms are common.

The main reason for this is that cybersecurity is a complex and diverse field.

It is also an evolving area that sees hundreds of new challenges each day.

There are many angles to cybersecurity that consists of encryption, cloud security, network security, application security and much more. Therefore, a large amount of workforce and expertise in this area is needed for a single company to protect its data.

Cybersecurity experts are small in number compared to software engineers, application developers and website managers.

A cybersecurity expert needs far more knowledge than an average computer scientist. In short, cybersecurity expertise is lacking as compared to its demand.

In addition, a lot of firms do not know how to set up cybersecurity infrastructure that best suits their business model.

Lagging behind in ‘internet of things’ race

Additionally, software needed for cybersecurity infrastructure are some of the costliest. Big businesses spend as much as 10% of their annual budget solely on cyber security.

Therefore, protection of customer data entails massive expenditure which forces companies to spend whatever they can on cybersecurity but at times, that too proves to be insufficient.

As an alternate, the pioneers of internet introduced Web 3.0 that aimed to provide consumer safety and security while browsing however, it adopted few security risks from Web 2.0 and faced new security risks some of which cannot be tackled at present.

Web 3.0 brought new challenges and shift to it is not as quick as what was expected by companies. Similar to the metaverse, it’s a concept unknown to many.

Moreover, open source software is termed to be safe and research suggests the same. This is because the open source community corrects any vulnerabilities in the code soon after release.

Digital businesses and consumers have a long way to go to ensure strict data protection however, the need for which is rising with every passing day.

The article does not necessarily reflect the opinion of Business Recorder or its owners

Omar Qureshi

The writer is a Senior Sub Editor at Business Recorder (Digital)

Comments

Comments are closed.