Skip to main content

Perilous

This past week there were articles all over the Internet about "The China Incident." If you have been so distracted by the unfortunate disaster in Haiti that you didn't see it, Google has threatened to pull its operations out of China because an attempt to hack it and 30 other companies occurred. Worse, Google says it has evidence pointing to the Chinese government as the source of the intrusions.

The scary part is that although initial reports implied that the hackers were looking for information on Chinese dissidents, it now seems that they were after intellectual property. This raised an interesting question: what if they installed a Trojan horse into Google's source code without stealing anything? How would you know what happened?

I spent 20 years in application development, and I know firsthand that the more complex systems can easily be in excess of 1,000,000 lines of code in size. If someone inserted 100 - even 1,000 - lines of new code as a backdoor, is a company like Google really going to notice the %0.1 difference in size? Worse, what are the bigger implications, e.g. what could they steal from users such as you or me using such a technique?

At least Google made an effort to protect itself. A recent New York Times article said that 20% of people choose their passwords from the relatively small pool of 5,000 words and variations. 1% of people use "123456" as their password, with the 2nd most popular password being "12345." While I realize that having your financial information on a computer does not impress you with the same sense of urgency for security as the old school safe deposit box did, that makes this doubly disconcerting since there is so much more data to be mined from people's personal computers than you could ever find in a single safe deposit box.

This is your personal identity at risk. My brother was the victim of identity theft several years ago. And while the damage was more limited than what you typically find in the news articles written in Wired et al, it still took him forever to straighten the situation. Imagine if all of his data were pilfered and his identity completely taken over by a rogue hacker.

Better still, imagine if your identity were completely taken over.

Don't tempt fate. You, me, and every individual are not Googles unto ourselves. We don't have the same facilities available to protect the intellectual property that is our life. This means that it is that much more important to ensure the safety of our digital selves.

Popular posts from this blog

So What is this IPaaS Stuff, Anyway?

 In my last post , I discussed how no-code/low-code platforms fulfill rapid development of business applications - addressing the needs of the Citizen Developer (a Gartner term  first used around 2009).  I also commented on how this specific objective limits their ability to provide true integration capabilities, which require the flexibility to adapt to the myriad variations of infrastructure.  This is a concern because companies often have acquired legacy systems via M&A activity while simultaneously investing in new technology solutions, resulting in a mishmash of systems with multiple ways of accessing them. In this post, I'd like to examine how the needs of the latter group are met by describing some key capabilities that are "must-haves" for any company looking to execute on a digital transformation strategy.  In order to do this, let's define who the target user base is for such a technology platform. Disclaimer:   I work for MuleSoft (a division...

Time to Level Up!

With the recent news out of Salesforce and Oracle, it’s easy to understand why folks affected by layoffs might feel discouraged. Not only are they leaving companies they may have called home for years, but they’re also facing the daunting prospect of job hunting while headlines scream about “AI taking over human jobs.” Not long ago, another company I follow - let’s call it Acme  - went through a similar round of layoffs. Two employees in particular (we’ll call them Jim and John) showed how mindset can make all the difference. Jim had been at Acme for over 20 years. He was reliable, steady, and well-liked, but not exactly the standout type. When he was laid off, he decided to take some time off before even thinking about his next move. After all, he had a severance package. Didn’t he deserve a break after two decades of hard work? John’s story was different. Though he hadn’t been at Acme as long, he’d built a strong reputation and had both technical and leadership skills. Instead of...

COSMIC Insights

Consider the following scenario:  you're a mid-level manager and find out that a layoff is coming.  You're about too lose one of your best direct reports, but you have no ability to influence the decision to lay them off. Oy! My head hurts! What do you do? Oftentimes, I find that people - when presented with situations where they feel compelled to act but have no ability to change the outcome - enter a state of mental lethargy.  They don't know exactly what it is they should do but, "gosh darnit!", something has  to be done.  When they realize how helpless they actually are, they start lamenting about the situation, how they are backed into a corner, etc. In a very real sense, they go through the five stages of grief . I'd like to offer the following alternative way of approaching these and other situations:  I call it the COSMIC method, not only because it sounds cool but also because I like science fiction (" Lisan al Gaib! "). COSMIC is an acronym...