We can’t be sure which quantum-safe algorithms NIST will standardise and because these algorithms are still relatively new, you may not want to completely do away with today’s standards. After all, quantum computers are still too primitive to break current encryption standards, so using today’s methods is still an effective way to protect against current info security threats. Therefore, as we make the transition to quantum-safe security, it’s important to practice ‘crypto-agility’. Crypto-agility is the process of understanding what existing cryptographic measures can be migrated over to quantum-ready solutions. ... This crypto-agile approach will offer greater assurance against both traditional attacks and future threats. This is vital as many devices, systems and applications that rely on encryption for security are now looking to be deployed and are expected to have a lifespan of over 10 years – if these aren’t cryptographically agile enough to deal with a future quantum attack, organisations will leave themselves vulnerable in the future.
With the advancement of work-from-home culture and future migration to four weekdays and hybrid working models, there would also be a rethinking needed on the large corporate offices. On one hand, people do not want to be in a crowded office space and would prefer odd-even type models, on the other hand, it’s not as easy to set up work from the home office if you do not have additional bedrooms, dedicated space, childcare options, and a large home overall and not everyone has that. Also, there is a need for most companies where they encourage their own employees to interact more for enhanced output and peer learning and competition. This would bring open many corporate offices to be accessible as co-working spaces to everyone looking for innovation, learning, and collaboration. Highly likely that the co-working industry will be back with a big bang as they make possible the dream of office next door or walk to the office culture. In fact, co-working companies may be the new commercial real estate aggregators as there may be many new collaborations underway between corporate offices and co-working companies, to drive the abundantly existing commercial infrastructure into good use.
Beyond their own services, the strategy adopted by the cloud vendors is to build a rich ecosystem of partnerships, marketplaces, development platforms, and APIs, so that they can offer as much flexibility and as many pathways as possible—as long as the data that requires higher-level processing eventually ends up in their cloud, says Dilip Sarangan, senior director of research at Frost & Sullivan. Neil Shah, vice-president at Counterpoint Research, says that the major cloud players are offering fully managed, end-to-end IoT deployments for “maximum value capture.” But they are also covering their bases by offering open interfaces and partnering with other players in response to enterprise concerns about vendor lock-in. This “have it your way” approach makes sense when you consider the vastly different types of IoT scenarios and the different types of data generated by connected cars, smart cities, smart homes, manufacturing, verticals like oil and gas or healthcare, video surveillance, etc. Dubrova adds that the one thing the cloud vendors lack is domain expertise in specific verticals. “Cloud vendor analytics toolsets tend to be very horizontal and limited—that is where partnerships are playing a key differentiation role.”
With an increasingly remote workforce, many companies are allowing employees to use their personal phones or laptops for business purposes, and people are using their work devices for personal use, too. These practices became more common during the pandemic, and they open up the door for cybercriminals to steal both personal and corporate data at the same time. Keeping your devices separate is just good practice. That way, if one device gets infected, you have a backup and you haven’t jeopardized both your personal data and your company's security. It’s worth saying three times because the majority of people aren’t listening. Using strong passwords that are complex and unique to each account is the No. 1 way to prevent cyberattacks. A Google-Harris Poll found that 24% of Americans admit to using the word "password" or "123456" to secure their accounts. A whopping 66% say they reuse the same password across multiple accounts. It’s such a problem that Google announced recently that it will enable two-factor authentication by default, automatically pushing users to take extra security steps.
Quote for the day:
"The problem with being a leader is that you're never sure if you're being followed or chased." -- Claire A. Murray