Helping you organise and protect your personal information

Friday, July 29, 2011

Are you keeping up with Smart Phones?

Smart Phones are everywhere and they're not just being used to make phone calls. Over 60 per cent of the use of Smart Phones is now for social networking, email, browsing the net, conducting business activity, listening to music, taking pictures and playing games.

This change of use often means there is significant personal information either stored, emitted (e.g. location and usage) or accessible from your Smart Phone. These added functions offer real benefits to users but also risks, not only to the individual, but to businesses. But firstly, what is driving this market growth in Smart Phones?

Apple gave the market a real move-on kick over the last few years with their stylish iPhone range. This has been so succesful that it has helped Apple become the world's second most valuable company behind Exxon. Such market dominance attracts competition though, and we have seen phones using Google's Android operating system recently overtake Apple in terms of devices being shipped. Meanwhile, traditional phone vendors such as Nokia have fallen well behind.

The growth in this market also comes at the expense of the PC market. IDC is telling us that in the fourth quarter of 2010 there were more Smart Phones sold globally than PCs as more people make their phone their primary IT device.

This trend is not abating and we have seen the traditional PC market players realising the importance of the Smart Phone market and start investing to be part of it. For example, HP has recently launched their Veer Smart Phones and Microsoft is attempting to shore up market share by purchasing Skype and has teamed up with Nokia who is now shipping their new phones with the Windows operating system at their core.

Traditional mobile telecommunication carriers are also being impacted. They see the value in their brand diminished by the brand of the device manufacturer and application provider and risk being relegated to providers of core infrastructure bandwidth alone.

This growth in Smart Phones is attracting significant investment. On a recent trip to Silicon Valley, I saw this first hand when I learnt that one leading venture capital firm alone, Kleiner Perkins, has a US$400 million fund for iPhone apps as well as a US$400 million fund for Android. That level of investment will drive better applications for the user and will further accelerate growth in sales of Smart Phones.

One result of this massive growth is the "consumerisation" of IT. What this means is that new information technology emerges first in consumer markets and then spreads into businesses and not the other way around as we have seen in the past. We find that often our home based IT equipment and services are both more capable and less expensive than what is provided in the workplace.

At the recent Net Hui, I facilitated a session around "The changing face of the internet - Mobile and Security". Over a hundred people were in the session and the core of the discussion centred around two things, the desire of people to increasingly bring their own technology into the work place and the need for increased security on mobile devices.

Consumerisation is fuelling tension between the traditional business model of providing staff a corporate phone and controlling the use of the device and the information on it via corporate policies and you wanting to Bring Your Own Device or Technology (BYOD or BYOT) to the workplace.

We discussed this at length at the NetHui session and it was clear that many users were being forced to carry at least two cell phones, which is not ideal. Some organisations (mainly smaller ones) had already moved to allow staff to have their own devices. However, all agreed that there needs to be a clear policy within organisations to explaining to staff what the rules are regarding their Smart Phone use in either scenario.

This is not simple though, and there are many real issues that need to be considered. What happens when a device is lost? If it is, is the business able to direct that all information, including personal data, is wiped from the phone?

What happens to company information on the phone when the user leaves the company? What behaviour can the business expect from the staff member on the device to ensure the reputation of the business is not impacted?

Who shares the cost for the device? Should the company be able to restrict access to certain sites the user wants to use on the device? Who is responsible for keeping the phones operating system up to date with security patches?

I cannot provide answers to all of these questions here. Each organisation needs to do this for itself based on its own position. It is clear that many businesses are having to update their mobile phone and security policies and there is an opportunity for collaboration here to help each other and avoid us all having to reinvent the wheel.

The NetHui provided an online forum for discussion on this topic that will be left open until the next Hui. I encourage all of you who are interested or concerned about this area to make use of the forum to post your thoughts, questions, and provide answers if you can. You can even post copies of policies that are working for your organisation or those that are not.

What is the long term solution then? Maybe we can look to the wider market where we are seeing function move from the end user devices up into the cloud, enabling use of the utility scale that offers lower price, improved security and simplified management. Will we see the same happen with Smart Phones? Will that mean we will see Smart Phones become less smart over time and become just a mobile access point to services in the cloud? This way, personal and business applications could be accessed from different cloud based services, making them easier to turn off and on as the needs of the user, and who they work for, changes.

Sunday, July 17, 2011

Is Anyone Safe in Cyberspace?

I have just read the US Department of Defense (DoD) Strategy for Operating in Cyberspace (July 2011). Within the document it is states that the "DoD networks are probed millions of time every day, and successful penetrations have led to the loss of thousands of files from U.S. networks and those of U.S. allies and industry partners". If the DoD cannot protect its information in cyberspace who can?


It is great to see that the DoD recognises the pervasiveness of technology in our lives today and that we are dependent on technology to run critical infrastructure (e.g. Transportation, Communication), to facilitate trade and for markets to operate.


Balancing this need for security and protection, is the reliance on the inherent openness of cyberspace to enable "new forms of entrepreneurship, advances in technology, the spread of free speech, and new social networks that drive our economy and reflect our principles".


This openness means that "the Internet was designed to be collaborative, rapidly expandable, and easily adaptable to technological innovation. Information flow took precedence over content integrity; identity authentication was less important than connectivity."


It is great to see the DoD making such a policy available in a transparent way, sharing their thinking and recognition of this issue so that we can all work together to resolve the issues that the Internet presents while protecting the opportunities it presents.

Perhaps the most unexpected comment for me was the recognition that the threat to Intellectual Property is seen as the most pervasive threat today and seen as more important than the threat to critical infrastructure - "Every year an amount of intellectual property larger than that contained in the Library of Congress is stolen from networks maintained by US businesses, Universities, and Government Departments and Agencies." Clearly information is power and businesses and economies rely on managing and protecting protect such information for their survival just as we as individuals need to manage and control our own personal information in the cyberworld we live in.

Here is the link to the document if you are interested - It is only about 12 pages long and very readable. DoD - Strategy for Operating in Cyberspace

Monday, July 11, 2011

Who is Shaping the Internet?

Internet New Zealand recently ran a three day Net Hui (conference) in Auckland to discuss key issues around the internet. Over 500 people from all walks of life attended the event, making it a rich environment to hear a wide range of views and perspectives.

There were lively discussions on topics ranging from copyright law, access and diversity, digital citizenship, human rights, the future of digital content, who controls or governs the internet, censorship, and much more.

I could not possibly cover all the issues or ideas discussed and would encourage you to go to the Hui website (http://nethui.org.nz/ ) where you can still access the discussion forums and notes from each session. You can also view YouTube videos from some of the major sessions including the well received key note speaker, Professor Lawrence Lessig. ( http://www.youtube.com/NetHuiNZ )

The key things that hit me personally from the conference were:

1. The internet is changing the world we are living in. We all know the internet is a powerful tool and that more and more people are using it, but at the Hui, I heard real examples about how the internet is revolutionising business models (e.g. the media industry), empowering people to learn about the world in which they live, and even helping bring change in governments.

2. Privacy and security issues are clearly mainstream. The truth is out about how Facebook and Google earn their money, and it is from our personal Information. With hundreds of millions of people using such services, people are becoming aware of the need to control and protect their personal information and manage it in a way that helps them derive value from it, not others.

3. There is a need for continued education regarding the internet. It was a clear reminder that the average internet user is not a very sophisticated user, but is someone who is using email, social networking, searching for information and maybe buying and selling online. While the internet needs to be simple for all to use, some of the issues and challenges the internet presents are not that simple. There is a need for ongoing discussion and education about the internet so that it continues to be a system that helps us live the lives we want to lead not hinder it.

Well done Internet New Zealand for hosting such an event and bringing discussion on these issues into the public arena. The internet is here to stay and we all need to shape its future together so that it helps us live our lives in the way we want to.