Over the past decade, as a result of millions of dollars of marketing effort, business decisions were made and the push to the cloud began. It took business owners a while to follow the herd as individuals flocked to free 3rd party cloud services but eventually the desire to reduce corporate expenses won and data exchange, storage, and cybersecurity was handed over to cloud companies.
Let’s face it, most people do not have the training or domain knowledge to understand exactly what is happening once they click the Save button on their document or spreadsheet application. Most people understand the value of what they can see or touch or hold behind locked doors but few understand or perceive the value of the One’s and Zero’s that make up the data that is their document.
That data in its state as a file does not bear the tangible components of the physical world so we don’t apply any emotional value and subsequently don’t have the alarm bells ringing when it disappears from our control.
Tell me the last time you checked for your keys to your apartment, condo, home, or car. How often in a day do we look for or think about where those keys reside? These tangible physical objects have a value meaning in our lives so we guard and control them to the best of our ability.
What about my data? In a business all of your data is your intellectual property which has unmistakable value yet we copy, save, hold, and forget this data inside other companies! To compound the issue, these companies refuse to take any responsibility for the loss or theft of this information. We don’t give it a second thought and how can we when this invisible intangible information is transacted and managed in ways most people do not understand.
Currently there are no codified laws or precedent established cases to guide legislation in defining that an intangible magnetic field is property of its creator. This action and subsequent laws will take decades to argue in the courts all the while you are subjected to data theft, exposure, and loss due to a legacy internet architecture that was never designed for this level of commercialization.
It is more important today then ever before that you consider how you control and protect your Data, your Research, your HR records, your C-SUITE conversations, your Clients right to privacy, when you consider just following the herd. Remember your company will end up being the accountable party providing restitution for breaches that impact your clients when your cloud provider fails, and they will.
I was prompted to write this article as I read through a ZNet article “New Windows 10 tool: This free Microsoft app helps you recover deleted or corrupted data…For photos, documents, videos and more, Windows File Recovery supports many file types to help ensure that your data is not permanently lost.”
So tell me your Cloud provider can’t already do the same thing? 8 years ago I was able to recover data on a dead hard-drive which included documents, spreadsheets and photos.
So tell me your Cloud provider, their employees, and hackers can’t access your data even after you hit delete. What happens to those hard-drives that fail, do you think your Cloud provider cares? Even it they do there are tools to extract your data.
Let’s pause for a moment and consider just the top 20% of your corporate data you need to protect from 3rd party exposure.
- Law firms cannot protect your Client – Solicitor Privilege through the use of 3rd party services such as Email or Cloud or Chat tools
- HR departments hold precious personally identifiable information if exposed may result in identity theft or fraud
- C-SUITE consider conversations that involve M&A, HR, Litigation between board members and leadership, if you are publicly traded this could spell disaster
- Financial Services cannot protect your privacy and guard your social security, banking, and tax return data through Cloud services
Now let’s pause and take a breath. It’s not the end of the world, although today it may seem like it, there are simple, easy, and cost effective ways you can protect your data, remove third party exposure and treat your digital data just like physical property.
Connect with me on linked in or subscribe to our blog posts to learn more. The more we talk and share details about this issue the less scary it is to come up with an actionable plan that does not require years of technical knowledge or tens of thousands of dollars.
Wouldn’t it be nice if you could get paid while you surf on the web, drive your car down the street, or walk through the mall? What if you could earn a little money every time you read an article online, click an ad, punch in directions on your GPS or texted photos to your family?
The world is changing and the reality is you will be paid in the future. Consider that the most successful, fastest growing companies in the world are getting rich from tracking and selling all your online transactions, daily movements, and personal connections. We posted a short article last week with a link outlining how telcos get rich from data.
Yesterday, former Presidential Candidate Andrew Yang, the only candidate to address data privacy and propose that data should be owned by the individual, during his campaign announced the Data Dividend Project to fight for people’s data rights
LA TIMES further explains the issues faced globally:
- “Whenever you sign up for a new social media service or website, or download an app onto your phone or computer, you’ll typically see some long disclaimer language written in legalese. You scroll through it quickly and click the “I agree” button.
- Our phones and computers can track our every movement and action, while Facebook and Google log every like or click on their sites. There are numerous ways in which our data are collected, used, shared and sold by countless businesses. The largest tech companies profit most.
- Facebook is now worth $650 billion, with annual revenue of $70 billion. Google is worth nearly $1 trillion, with annual revenue of $160 billion. The business of these companies is primarily based on advertising directed at us, built on the backs of our data.
- They are also influencing our actions and attitudes by feeding us information that maximizes our engagement on those platforms. We ourselves have become the product, and we are being sold to those with the means to buy access to every detail of our behavior — and to shape what we do next.
- This needs to stop. The data generated by our activities should be owned by us. We should decide what is being done with that information. And if anyone is making money on our data, it should be us.”
Cicer One was created by Bob Embleton after he spent months reading the fine print that is typically ignored and realizing that no one really owns their most valuable asset and we often surrender it without consideration of the consequence. SCUTE was created to offer enterprises the ability to protect their data as property and enable them to offer their customers a safe and private exchange of data. SCUTE provides protection from the powerful algorithms that are constantly scanning, monetizing, and storing forever the secrets that could sink an enterprise if they fall into the hands of a competitor or foreign government.
For the readers who don’t indifferently shrug their shoulders and want to begin to take ownership of their data as their property you can:
- Contact us to be put on the mailing list to be notified as we create data reimbursement solutions.
- Schedule a demo to discuss how we enable protection of your data today.
- Mention the Data Independence Day by July 4, 2020 and we’ll give you an additional 75% discount on the first year of our patented disaster recovery service