Big data has enhanced IT security

Posted on November 14, 2013 10:38 am

At the university, we were taught that computer is communal and when it’s more than one user machine, the gray haired professor made it clear that it was important to make sure that password-protected login and logout were enabled all the time. If memory can server me well, the gray haired man also taught us that if a website one is using on a regular basis offers more than one authentication process, it would be ideal to make good use of all procedures. Back then, detection-only defenses conducted inspection at a single and initial and had no memory. I vividly recall how during one of my practical lessons they couldn’t recognize threat and even forgot that the file ever existed. Unlike my days in California, modern day malware writers have innovations that were only a dream to their predecessors and a recent research has shown that they have been using a variety of techniques to obscure malware and have made it much harder to detect. In my past posts, I have always advocated that once first process is activated, user should proceed to the second option which is normally a pin code that is usually sent to a mobile phone for validation. This means that even if an online crook has copied down all of details, unless they also steal your mobile phone, they won’t be able to access your accounts.

It is important to detect, understand and stop these increasingly evasive threats and as a user you need new tools and techniques that enable you to always watch, never forget and then take action should a your private information end up in a crooks hand. Big data powered continuous capability and retrospective security is one solution that adds and enhances security. However, I am of those who believe that users should not save passwords in browsers. Personally, I have invested in a paid for password management and locker tool. That way I have been able to create random, fiendishly difficult to crack and impossible to remember unique logins for the websites I have subscribed because they store them all together in one very secure place behind one master password.  When I need to fill in a password, as long as the management tool is open it immediately populates the field. The widespread availability of affordable storage capacity and processing power, along with sophisticated data-mining techniques, means I no longer have to discard my old data and am able to identify which of my devices have been exposed to malware. Big data provides me with capabilities to identify the point of entry and prevent reinfection.

Contador Harrison