Companies perusing new opportunities also need to assume a corporate responsibility as those who compete in these areas will agree to be bound by rules, says HANS ZACHAR, MD for Technology Strategy at Accenture in SA.
As pioneering companies pursue boundary-breaking opportunities, they must assume a new corporate responsibility. The concept of trust and good corporate citizenship will increasingly come to the fore as those who willingly compete in these new and exciting areas willingly agree to be bound by rules, or lose their ability to play on the stage if they do not.
About 65% of IT and business executives surveyed in the Tech Vision 2017 report believe that regulations in their industry have not been able to keep up with the pace of technology advancement. There is little doubt that new age entrepreneurs will continue to move faster than legislators.
Some form of self-regulation appears inevitable if progress is not to be hampered, but a new set of rules will need to be codified to set the boundaries. These developments are likely to include the pioneers themselves helping to form the laws and regulations that govern privacy, data ethics and security.
A few recent examples highlight how companies have realised they need to keep moving to ensure their idea is not stifled. Amazon announced its intent to pilot a service using drones to deliver packages. While an initial set of regulations around the concept was worked on in the US, Amazon took the concept overseas to conduct the pilot, fine tune the service and launch its first delivery in the UK at the end of 2016.
Businesses in Africa and across the globe are also assembling joint task forces or collaborating with competitors to write rules where nothing exists. Last year, 25 startups united to launch a Bitcoin Smart Contract Federation in the belief that Bitcoin offers a more mature, tested and secure alternative to other smart contract platforms. By building the platform, they are creating the rules for others who will join this ecosystem in the future.
In February this year Standard Bank joined the blockchain consortium R3 to explore the technology and its uses – 75 global financial institutions form part of the network, with Absa having joined in 2016.
It is clear that waiting on the sidelines for rules to change and technology standards to solidify is not going to work.
Other emerging technologies include:
•Differential privacy–Integrates digital ethics and privacy standards for companies by receiving data in such a way that individual identifiers are never collected.
•Smart contract technology–Offers an automated way to enforce contracts whether the counter-party is trusted or not. Smart contracts design-in the rules for a value exchange and can be self-exercising or self-enforcing.
•Homomorphic encryption–Implements data sharing and transformations that are performed exclusively with encrypted data, decrypting it only when a user needs to see a result.
In this dynamic new world businesses are not just creating new products and services but are shaping new digital industries. From technology standards, to ethical norms, to government mandates, in an ecosystem-driven digital economy, the Tech Vision survey highlighted that a wide scope of rules still needs to be defined.
To drive governance and accountability, leading enterprises will increasingly embed the newly defined rules and standards into the technologies themselves. It is therefore no surprise that 78% of the executives we surveyed agree that their organization feels it has a duty to be proactive in writing the rules for emerging industries.
We have to fast forward to a world in which advances increase a thousand fold from where they are today and consider how on earth rules will change quickly enough. There will be a need for some level of speedier automation in legislation, as well as a level of self-regulation when change overshoots existing rules.
True authentication and verification could, for example, take place through a bureau service. South Africa has an awesome opportunity to use its population register to create a digitally managed single point of authentication – you just link to it securely and get confirmation. This is also a fabulous way to prevent fraudulent transactions from taking place.
At the end of the day, speed and efficiency remain critical to maximising outcomes in the uncharted world of the future and to fulfil their digital ambitions, companies must take on a leadership role to help shape the new rules of the game. Third world growth economies have a huge opportunity as they are not bound by legacy structures and modes of thinking. African businesses in particular must seize the opportunities created by the eco-system driven digital economy. Discovery is already a great example of how a company can create a single platform which is then provided to global insurance companies.
The huge benefit Africa has is the lack of established retail networks – these are encumbrances of developed markets – Africa can leapfrog them as it embraces these new channels for doing business, which in the future will be far more profitable than traditional bricks and mortar structures.
It will also be important to realise that to successfully implement an idea on the scale required, help from elsewhere will be needed. Most service organisations unfortunately still have pretty rigid conditions, terms and modes of thinking that will only prove to be a barrier to entry. The Google’s and Amazon’s of the world will not wait for you.
However, as rules are not yet advanced enough and much of the current processes within companies are outdated, it is important to keep in mind that when you release your innovation you must make sure you are secure enough and anticipate potential loopholes.
There’s a whirlwind of disruptive activity happening across industries and as these early pivot points of new industries develop, organisations will need to changes the way we see the world and how they embrace risk.
There is no doubt companies will be able to partner best with others that have the same security and technology standards, as well as similar ethical values and commitment to social responsibility.
Wannacry still alive
One and a half years after its epidemic, WannaCry ransomware tops the list of the most widespread cryptor families and the ransomware has attacked 74,621 unique users worldwide.
These attacks accounted for 28.72% of all users targeted by cryptors in Q3 2018. The percentage has risen over the last year, demonstrating more than two thirds growth against Q3 2017, when its share in cryptor attacks was 16.78%. This is just one of the main findings from Kaspersky Lab’s Q3 IT threat evolution report.
A series of cyberattacks with WannaCry cryptor occurred in May 2017 and is still considered to be one of the biggest ransomware epidemics in history. Even though Windows released a patch for its operating system to close the vulnerability exploited by EternalBlue 2 months prior to the start of the attacks, WannaCry still affected hundreds of thousands devices around the globe. As cryptors do, WannaCry turned files on victims’ computers into encrypted data and demanded ransom for decryption keys (created by threat actors to decipher the files and transform them back into the original data) making it impossible to operate the infected device.
The consequences of the WannaCry epidemic were devastating: as the victims were mainly organisations with networked systems – the work of businesses, factories and hospitals was paralysed. Even though this case demonstrated the dangers cryptors pose, and most of PCs around the world have been updated to resist the EternalBlue exploit, the statistics show that criminals still try to exploit those computers that weren’t patched and there are still plenty of them around the globe.
Overall, Kaspersky Lab security solution protected 259,867 unique users from cryptors attacks, showing a substantial rise of 39% since Q2 2018, when the figure was 158,921. The growth was rapid yet steady, with a monthly observed increase in the number of users.
“The rising share of WannaCry attacks is another reminder that epidemics don’t end as fast as they start – there are always long-running consequences. In the case of cryptors, attacks can be so severe that it is necessary to take preventive measures and patch the device, rather than deal with encrypted files later,” said Fedor Sinitsyn, security researcher at Kaspersky Lab.
To reduce the risk of infection by WannaCry and other cryptors, users are advised to:
- Always update your operating system to eliminate recent vulnerabilities and use a robust security solution with updated databases. It is also important to use the security solution that has specialised technologies to protect your data from ransomware, as Kaspersky Lab’s solutions do. Even if the newest yet unknown malware does manage to sneak through, Kaspersky Lab’s System Watcher technology is able to block and roll back all malicious changes made on a device, including the encryption of files.
- If you have bad luck and all your files are encrypted with cryptomalware, it is not recommended to pay cybercriminals, as it encourages them to continue their dirty business and infect more people’s devices. It is better to find a decryptor on the Internet – some of them are available for free here: https://noransom.kaspersky.com/
· It is also important to always have fresh backup copies of your files to be able to replace them in case they are lost (e.g. due to malware or a broken device), and store them not only on the physical object but also in cloud storage for greater reliability (don’t forget to protect your cloud storage with strong hack-proof password!)
· If you’re a business, enhance your preferred third-party security solution with the newest version of the free Kaspersky Anti-Ransomware Tool.
· To protect the corporate environment, educate your employees and IT teams, keep sensitive data separate, restrict access, and always back up everything.
· Use a dedicated security solution, such as Kaspersky Endpoint Security for Business that is powered by behaviour detection and able to roll back malicious actions. It should also include Vulnerability and Patch management features that automatically eliminates vulnerabilities and installs updates. This reduces the risk of vulnerabilities in popular software being used by cybercriminals.
· Last, but not least, remember that ransomware is a criminal offence. You shouldn’t pay. If you become a victim, report it to your local law enforcement agency.
Nokia 6.1 gets slice of Pie
HMD Global has announced that the Nokia 6.1 will start receiving Android 9 Pie – the second smartphone in the portfolio to receive the latest version of Android less than a month after the update arrived on the Nokia 7 plus.
Packed with Google’s newest software and building on the features of Android 8.0 Oreo, Android 9 Pie’s focus on artificial intelligence and machine learning gives owners a more customised and tailored experience.
Powered by the Qualcomm Snapdragon 630 Mobile Platform, the Nokia 6.1 is over 60% faster than its predecessor. Also, now offering enhanced Dual-Sight, ZEISS optics, USB-C fast-charging, Nokia spatial audio and pure, secure and up-to-date Android Oreo.
The Nokia 6.1 has been selected by Google to join the Android One family and therefore users get exclusive access to Apps Actions – a feature only available to Android One and Google Pixel devices. App Actions helps users get things done faster by predicting their next move and displaying the right action on right away.
Now with Android 9 Pie, the Nokia 6.1’s already impressive battery life is further complimented with the introduction of Adaptive Battery, an update that uses deep learning to understand usage patterns and prioritise battery power on the most important apps.
Other key features of Android 9
· Slices – Identifies relevant information on favourite apps to make them more easily accessible when needed
· Adaptive Brightness – Automatically adapts phone brightness by learning from interactions with different settings
· New system navigation – Features a single home button that provides intelligent predictions and suggestions (user enabled)