In an age where technology is all around us and IT companies are flourishing in the APAC region, everything is going online by default and there is exponentially more data available on the internet every year it is more important than ever to ensure businesses keep their data private and have the right security measures in place. As Founder of Bitspark, a Bitcoin fintech company, nothing keeps me up at night more than security and its something that is a constantly evolving field. Below I share some of the top 5 ways we use to keep your data safe, save money and make any organization’s life a bit easier in the process.

1. Use Open Source where available. Open Source software means the code is freely open for anyone to view, copy and make their own anywhere in the world. When code is auditable anywhere in the world, especially for larger projects it means a different set of eyes are vetting it, for free and security issues and fixes can be found and patched quickly leveraging the crowd. A good example of this is the Firefox web browser which is faster and scores higher in security tests than incumbents like Internet explorer. Indeed, most day to day office tasks you’ll generally find there is an open source alternative (like OpenOffice or LibreOffice) have a look around, you may be surprised.

2. Encrypt sensitive information. If your business holds sensitive customer information like usernames, passwords, names, addresses, billing details, credit card numbers, confidential documents etc it should be encrypted by default. Encryption is the transformation of data into a form thats not readable by anyone else without the proper key or password and is fundamental to IT security. Important data (documents, spreadsheets, customer information, website forms) can be encrypted with various local storage devices (Hard drives, USB’s), open source software (like AEScrypt) and cloud services like Mega. Encryption enforces privacy, is easy (and free) to do and provides your customers and employees reassurance their data is safe from prying eyes. Even in the event your data is exposed it is unintelligible and useless without the proper key.

3. Crowdsourced auditing. Sites like Crowdcurity and Bugcrowd are innovative new examples of leveraging the crowd for high quality, cheap and fast auditing of your website or application. Bounties are paid to security researchers from around the world who compete to find holes in your service which ensures you pay for actual results not time spent and it’s active 24/7. This is a much more effective way of ensuring a high quality product than paying a contractor not for results but hours spent and in the past, that contractor would only deal with the code presented to them on the day, next week when a new feature may be introduced a new unforeseen vulnerability may be exposed rendering prior auditing redundant. Thousands of brains on the task are better than just 1.

4. Use a VPN to connect to the net. When connecting to any public WIFI while travelling, in public places or other business locations the connection itself could be insecure with your passwords and data vulnerable to snooping and collection by an entity monitoring the network you are connected to. VPNs (Virtual Private Network) ensure you connect directly to another secure server which then connects you to the outside web with all good VPN providers ensuring your data is encrypted all the way, they are cheap (or free) and easy to setup even for the non­technical. A VPN ensures if anyone was snooping on your connection all they’d see is garbled data that is unintelligible ensuring you stay safe when connecting outside your own network.

5. Authentication can be easy. By authentication we usually mean a username, password maybe a captcha or a physical number generator banks like to give you. Frankly all of us would agree our lives would be better if we had less usernames and passwords to remember. Many people use the same username or password for multiple applications which is a security risk and some organisations force people to change the password frequently or require ever more complex combinations which most people are too busy to make a new unique password every few days and instead just increment the existing password by a number to keep it easy to remember. I stumbled upon Clef and have been very impressed. Clef uses secure public / private key cryptography and enables users to securely login to any supporting website by pointing their smartphones camera at a picture on the screen (the awesome ‘Clef wave’). No username, password, physical key required and no private details being transmitted over the web.

The above mentioned tools and methods we’ve found to be of assistance to us and when applied effectively, we can all help make the web a safer place!

Contributor

Recently Published

Key Takeaway: A study has found that humble leaders can become more promotable by growing others through a “humility route”. Human capital theory suggests that employees’ value can be enhanced by investing in their knowledge, skills, and abilities. Humble leaders focus on the learning and growth of their followers, creating human capital value for themselves. […]

Top Picks

Key Takeaway: The current economic climate is particularly concerning for young people, who are often financially worse off than their parents. To overcome this, it is important to understand one’s financial attachment style, which can be secure, anxious, or avoidant. Attachment theory, influenced by childhood experiences and education, can help shape one’s relationship with money. […]
Key Takeaway: Wellness culture, which claims to provide happiness and meaning, has been criticized for its superficial focus on superficial aspects like candles and juice cleanses. Psychological research suggests that long-term wellbeing comes from a committed pursuit of both pleasure and meaning. Martin Seligman’s Perma model, which breaks wellbeing into five pillars: positive emotions, engagement, […]
Key Takeaway: Quantum computing, which uses entanglement to represent information, has the potential to revolutionize everyday life. However, the development of quantum computers has been slow due to the need to demonstrate an advantage over classical computers. Only a few notable quantum algorithms have been developed, such as the BB84 protocol and Shor’s algorithm, which […]
Key Takeaway: China’s leaders have declared a GDP growth target of 5% in 2024, despite facing economic problems and a property crisis. The country’s rapid economic growth has been attributed to market incentives, cheap labor, infrastructure investment, exports, and foreign direct investment. However, none of these drivers are working effectively. The government’s determination to deflate […]
Key Takeaway: Neuralink, founded by Elon Musk, aims to implant a brain-computer interface (BCI) in people’s brains, allowing them to control computers or phones by thought alone. This technology holds the promise of alleviating human suffering and allowing people with disabilities to regain lost capacities. However, the long-term aspirations of Neuralink include the ability to […]

Trending

I highly recommend reading the McKinsey Global Institute’s new report, “Reskilling China: Transforming The World’s Largest Workforce Into Lifelong Learners”, which focuses on the country’s biggest employment challenge, re-training its workforce and the adoption of practices such as lifelong learning to address the growing digital transformation of its productive fabric. How to transform the country […]

Join our Newsletter

Get our monthly recap with the latest news, articles and resources.

Login

Welcome to Empirics

We are glad you have decided to join our mission of gathering the collective knowledge of Asia!
Join Empirics