Tag Archives: personal information

Amidst Waves of Data Breaches, U.S. Gov Advised Agencies: Implement Zero Trust Architecture

It’s been nearly two years since arguments and questions kept rising following the FAA outage that happened on January 11th, 2023, which resulted in the complete closure of the U.S. Airspace and most of the airspace here in Canada.

Although the FAA later confirmed that the outage was, in fact, caused by a contractor who unintentionally damaged a data file related to the Notices to Air Missions (NOTAM) system, the authenticity of the fact is still debated. 

The FAA initially urged airlines to ground domestic departures following the system glitch Credit: Reuters

“The FAA said it was due to one corrupted file – who believes this? Are there no safeguards against one file being corrupted, bringing everything down? Billions of Dollars are being spent on cybersecurity, yet this is going on – are there any other files that could be corrupted?” questions Walt Szablowski, Founder and Executive Chairman of Eracent, a company that specializes in providing IT and cybersecurity solutions to large organizations such as the USPS, Visa, U.S. Airforce, British Ministry of Defense — and dozens of Fortune 500 companies.

There has been a string of cybersecurity breaches across some high-profile organizations.

Last year, on January 19th, T-Mobile disclosed that a cyberattacker stole personal data pertaining to 37 million customers, December 2022 saw a trove of data on over 200 million Twitter users circulated among hackers. In November 2022, a hacker posted a dataset to BreachForums containing up-to-date personal information of 487 million WhatsApp users from 84 countries.

The Ponemon Institute in its 2021 Cost of a Data Breach Report analyzed data from 537 organizations around the world that had suffered a data breach. Note all of the following figures are in US dollars. They found that healthcare ($9.23 million ), financial ($5.72 million), pharmaceutical ($5.04 million), technology ($4.88 million), and energy organizations ($4.65 million) suffered the costliest data breaches.

The average total cost of a data breach was estimated to be $3.86 million in 2020, while it increased to $4.24 million in 2021.

“In the software business, 90% of the money is thrown away on software that doesn’t work as intended or as promised,” argues Szablowski“Due to the uncontrollable waves of costly network and data breaches, the U.S. Federal Government is mandating the implementation of the Zero Trust Architecture.

Eracent’s ClearArmor Zero Trust Resource Planning (ZTRP) consolidates and transforms the concept of Zero Trust Architecture into a complete implementation within an organization.

This image has an empty alt attribute; its file name is image-4.png

“Relying on the latest technology will not work if organizations do not evolve their thinking. Tools and technology alone are not the answer. Organizations must design a cybersecurity system that fits and supports each organization’s unique requirements,” concludes Szablowski. For the Silo, Karla Jo Helms.

How Big Data Is Exactly What It Sounds Like

When Facebook founder Mark Zuckerberg took to Capitol Hill to explain user data retention almost four years ago, he essentially sat in the hot seat on behalf of every entity that has ever collected and used personal information to craft better products. If that sounds like a massive catch-all, that’s because it is. However, Systems America, Inc. President Adesh Tyagi says it’s not as nefarious as it may sound. As the head of a global information technology services company, Tyagi knows that “Big Data” can be collected, applied and benefit the general public all at the same time.

Big data is exactly what it sounds like, says Tyagi, who has more than two decades of experience in this sector and whose company was previously awarded for being one of the fastest-growing in America.

It’s a compilation of information broken out by software that makes sense of the traits and behavior of service users. With a background that includes cloud computing and analytics plus Mobil Oil and McDonald-Douglas (now Boeing) among former clients, Tyagi says that any company can request an in-depth study of customer information to better design upcoming offerings.

This is sheer advertising at its core and it’s exactly what companies that work with Facebook do when they buy ad space on the social media platform. Do not confuse this with the fact that a third party was able to get its hands on 87 million Facebook accounts and use it as part of presidential election subterfuge.  This occurrence is prolific on a global level, recently the Indian government expressed a sincere concern that third parties may have influenced the country’s elections. Similar concerns have been expressed by the Kenyan & Nigerian governments.

Tyagi says that this is inexcusable and a result of either over-confidence and laid-back oversight and provides an illustration of how technology can be used against the greater good of mankind.

Why big businesses buy into big data. They believe insight gleaned from big data analysis offers:

  • Happier users and larger returns due to consistently in-tune goods and services.
  • Learning more about which goods and services are going to use while others are ignored and why.
  • Real numbers to pair with real-world efforts to show investors regarding current efforts.

Adesh Tyagi.

“You basically employ different analytical tools to come up with the best services or tools for that particular customer,” says Tyagi. An example he points to as it pertains to data-driven solutions are financial products being deployed by a bank such as insurance programs or a new credit card. By retaining Systems America before launch, an enormous amount of information about members can be broken down by geography, income history, account balances and more. In his view, this is no different from a grocery store looking at what people are buying and deciding which products to purchase when restocking the shelves.  For the Silo, Greg Adomaitis.