2018 is the year of data security, are you ready?

Just entering 2018, data and information security issues have once again become a hot topic: first, Li Shufu, chairman of Geely Group, talked about the insecurity of an instant messaging software in public; later, a lawyer questioned that a payment APP might be used without the user's knowledge. Hand over private consumption data to third parties.

In my opinion, these events all mark that the data risk awareness of Chinese Internet users has finally begun to fully awaken!

In the past, we only know that the Internet has subverted all aspects of daily life, and almost all life has been "transferred to the Internet"; now the Internet has finally changed from a "technological tool" to a "lifestyle", and the virtual world and the real world are intertwined and affect each other.

2018 is the year of data security, are you ready?

The virtual world is intertwined with the real world to generate massive amounts of data

Therefore, the Internet produces a large amount of "data" every day, and connecting, integrating, and improving these data is the value of the Internet's existence.

But "data" itself is a double-edged sword. As the scope of application and the economic benefits generated continue to increase, the hidden problems behind it gradually surface and emerge - that is, the security of data and information.

2018 is the year of data security, are you ready?

The security of data and information is very important

Every day we are contributing data to the internet without even knowing it. For example, we usually use chat software or mobile payment software. Technically speaking, our text, voice, pictures, files, consumption information, etc., are actually first passed through the software vendor and then passed to others.

2018 is the year of data security, are you ready?

Leaking data is like leaking our lives

In addition, with the development of artificial intelligence technology, our Internet data has become a gold mine, such as big data credit investigation, accurate consumption recommendation, etc. The basis is to collect and master our data. How to protect and use this data has become a key issue of the Internet this year.

The Internet economy has reached the deep-water area, and technological development trends such as big data and artificial intelligence have become irreversible, and it is impossible to stand still. Problems can only be solved by accepting reality, understanding and embracing technology, and keeping pace with social and economic development. As an Internet user, if you want to cope with the future information society more easily, cultivating data security awareness has become a compulsory course in the new era.

2018 is the year of data security, are you ready?

Big data, artificial intelligence technology will embrace our daily life

I think the first step in developing data security awareness is to learn to "classify and treat data differently". Although this is a little troublesome at first, it will allow everyone to cope with the current complex information security environment with ease.

Below, I will share with you what I have summarized and how to process data at different security levels, for reference only:

01 Personal photos, documents, audio and video, etc.

These are the most common data in our computers and mobile phones, with many types, large quantities and large volumes. It's important to note that don't think you can sit back and relax by keeping this data locally and not uploading it to the internet. In fact, on the contrary, the storage of computers, mobile phones, and mobile hard drives is extremely unstable.

2018 is the year of data security, are you ready?

The storage of computers, mobile phones, and mobile hard drives is extremely unstable.

In the previous "He Yang Kai Lecture", I explained to you in detail that "reasonable use of cloud services for data backup" is the solution to future data.

So, how do you judge whether your data is suitable for uploading to the cloud? The method is actually very simple: Do our daily photos, documents, audio and video contain privacy or business secrets that will have a significant impact on you if they are leaked?

If the answer is yes, I recommend going directly to the "confidential data" treatment method mentioned below; if the answer is no, then I highly recommend that you use cloud services.

2018 is the year of data security, are you ready?

Reasonable use of cloud services for data backup

Use the physical media at hand to save the data, once the data is lost, it is permanent; for non-confidential data, "yes or not" is the key. In this dimension, you don't have to overdo it, and it is a trend to choose to use trusted cloud services .

02 Using the privacy data of the Internet product platform

Our work and life have long been inseparable from various third-party Internet platforms: such as social networking, online shopping, hotel reservations, taxis, takeaways, etc. Once a habit is formed, it is difficult to turn back. Since it is inevitable, we should focus on what scenarios can use third-party platforms and what scenarios can not be used.

There is a popular saying in the Internet circle: "Free is the most expensive".

2018 is the year of data security, are you ready?

It is important to read the terms of use carefully

I suggest that if you have time, it's a good idea to read the terms of use of the internet platform you're using (especially new or less mainstream platforms). In the future, data is a valuable asset, and we are the real owners of the data, and the terms of use are actually a contract. In real life, will we rush to sign the contract without even reading the content?

2018 is the year of data security, are you ready?

We are the masters of our own data

There is another point to pay special attention to, that is, when using a third-party Internet platform, you must be "public and private" and distinguish whether your current work is suitable for a third-party Internet platform. Especially in some professional fields and special positions. In this regard, the state has introduced relevant policies to manage the use of Internet platforms.

Taking the financial sector as an example, on January 4, 2018, the China Securities Regulatory Commission issued the "Notice on Further Strengthening the Supervision of Bond Transactions by Securities Fund Operating Institutions" , which clearly stated:

"Bond investment traders should use the company's unified configuration of telephone, email, instant messaging and other systems to carry out bond trading inquiry and other activities, and their work emails, call records, instant messaging information, etc. should be monitored and traced, and subject to the supervision and inspection of the compliance department. , it is strictly forbidden for bond traders to use personal email addresses, social network accounts, instant messaging tools, etc. to conduct transaction inquiry and other activities."

03 Confidential data

Whether it is an individual or an enterprise or institution, there are confidential data. How to keep and use them has become a worldwide problem.

It is true that traditional computer and network security products such as anti-virus software, firewalls, and anti-leakage software have played their due roles for a long time.

2018 is the year of data security, are you ready?

Traditional security products are severely challenged in the new data security situation

However, the current data security situation is that the shortcoming is the use of data and loopholes in the mechanism, and the concept of "passive protection" of many traditional network security products is no longer sufficient.

I think that instead of forcing the product to achieve 100% security coverage in the style of "covering the ear and stealing the bell", it is better to reverse the idea and build the product from the data itself, forming a strong complement to traditional network security products.

This idea is the starting point for me to create oat cloud products. I often ask myself these questions : "Even if the data is paralyzed by an attack, can the data have a self-healing emergency mechanism?" "Even if the hard disk of the server is removed, is the data in it still safe?" "How to actively back up and monitor all computers in the government and enterprises? data?"

2018 is the year of data security, are you ready?

The oat cloud and traditional security products form a strong complementarity

On the contrary, large government and enterprise units are obliged to uniformly configure their own private cloud systems when dealing with confidential data.

2018 is the year of data security. The country has issued corresponding policies and regulations to manage this field. Are you ready?

 

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=326234837&siteId=291194637