Are we all looking at each other, thinking data security is someone else’s job?
It’s always a blow to find out your personal data has been misused if not outright stolen and made to work for an ill-intentioned third party. Corporations, academic and scientific institutions, healthcare organizations, and government agencies work with extremely high stakes if data is susceptible to disruption or exposure. Most of us are well aware of some level of risk when we disperse the account of our lives across the web. How do we manage that risk? We can ignore it and proceed with no forbearance. We can take a range of precautions – from frequent password changes to complex encryption – and then perform social and professional tasks with greater confidence. Perhaps the most undesirable and unrealistic option: we can stay off the Internet altogether. As technology quickly moves forward to integrate our physical and psychological worlds with the virtual world, vulnerability increases when convenience does.
Whose responsibility is it to quell our concerns about data security? Does the data giver, the data collector, the data holder, or the data dispenser protect the user? Perhaps none of those people, but the engineers must make the data flow systems and methods safe. What do the legal departments do about making and enforcing the rules? Are we all looking at each other, thinking data security is someone else’s job?
No, not all of us. Through a search using IP.com’s InnovationQ, it becomes obvious that many organizations and inventors are addressing data security worries.
Working on It
Analysts, systems engineers, software designers, and many more are reviewing past errors while predicting and preventing future problems. These operatives are finding answers to problems such as security threats, data breaches, unauthorized information sharing, and data misuse. Their new algorithms and novel mechanisms are at the front line, working against hackers and data abusers. Some of their innovations are patented, some are in the application stage, and others are defensive publications.
Following are five examples of solutions that inventors have presented over the past two to three years. Each includes an excerpt copied from the document’s abstract.
Excerpt from Abstract: However, most organizations do not understand how to quantify and assess these risks/threats yet alone assess different preemptive actions for mitigating impact. It would therefore be beneficial to provide organizations with a software based system that provides threat information gathering, incident reporting, and asset identification/valuation as part of its compounded intelligence and supports predictive context specific analysis of risks and countermeasures. Further, distributed countermeasure monitoring provides incident levels of known and unknown, or yet to be categorized threats.
Excerpt from Abstract: This document describes apparatuses and techniques for monitoring social media for breach of organizational privacy… Based on a ratio of amounts of the private data and public data disclosed, a score is provided that indicates a degree to which the social media content breaches organizational privacy.
Excerpt from Abstract: A computer-implemented method for detecting information leakage by an organizational insider may include (1) identifying a set of organizational insiders of an organization, (2) identifying a set of public forums used by one or more organizational insiders, (3) identifying a set of messages posted to one or more public forums, (4) creating a message record corresponding to each message, with the record including a message summary, and a set of message metadata fields, (5) consolidating message records with common metadata fields into a message summary record, and (6) identifying, based on the message summary record, an information leakage threat.
Excerpt from Abstract: A method of securely distributing and storing content may include receiving user content and identifying a number of storage servers that are configured to receive portions of the user content. The method may also include dissecting the user content into content portions for storage in the storage servers.
Excerpt from Abstract: A method and system is disclosed for protecting social media data from unintended third party access.
Excerpt from Text: The method and system enables a user to define an additional security mechanism through data tagging, in addition to a traditional identifier (ID) and password, to control the access to user data. The data tagging can be applied to one or more of, but not limited to, a forum, a single message or picture. The additional security mechanism uses a communication channel.
Sometimes, we as end users are so excited about the newly possible, i.e. what we can do, we lose sight of what we should do. Thankfully, diligent intellects are working for the good side in an attempt to stay ahead of those with dangerous applications for information technology. Our part in the effort is to work smart, stay vigilant, and implement the viable solutions that the innovators present. Keeping our personal and professional data safe is everyone’s job.
For more information on developments in data security and methods to gain insights on that information, you can work with InnovationQ at IP.com.