facebook linkedin twitter

Computerware Blog

What If All Data Was Leaked at Once?

What If All Data Was Leaked at Once?

When you take a long look at cybersecurity, you need to understand that the main purpose of it is to protect people’s ideas, people’s identities, and people’s effort. It isn’t all about protecting money, even though that obviously is a consideration. This notion led us to a thought experiment that Gizmodo recently undertook: What would happen if all the data stored in the world was suddenly leaked, open for the world to see? We’ve put together some of the responses. 

You Would See Immediate Indignation

One of the experts suggested that an immediate and total loss of data privacy would result in utter chaos. You would see people being fired by the dozen. A large percentage of marriages would fail immediately. The amount of litigation you would see immediately afterward would be incredible, and most people would have their most sensitive moments shared online, creating a culture of shaming. 

After this initial whirlwind, however, something known as the Privacy Paradox would likely stabilize things. The Privacy Paradox, is the theory that people quickly adapt to any new news, even if it is shocking. It’s fair to assume that since everyone would be in the same situation, people would accept the things that would normally be shocking to find out about another person. In a world of no secrets, you may find that you are “normal” compared to people you looked up to. 

People would quickly get tired of scandal, because the morality and ethical norms would be so much different than they are today when most people’s search histories, browser histories, messages, etc. remain private. That’s not to say that people would be accepting of evil deeds, just that the deeds that would be considered immoral or unethical would not be as immoral or unethical when it came out that a large percentage of people participated in the same behaviors.

It’s also fair to assume that the first notion people would have is to look up the data of the people they come into contact with the most, but we posit that most people would immediately look themselves up to see what kind of data they have out there. It doesn’t matter how subversive a person’s dataset would be, it would be shocking for everyone to have to live down their worst actions online as they sift through years and decades of online data. 

Wealth Disparity Would Increase

Another popular opinion amongst the polled group is that the information asymmetry (a situation where one person knows more than the other) would result in relationships that were formed on the basis of trust, to fall apart quickly. In business, this would have dire consequences for many relationships; and it would destroy the idea of a trade secret. This would give the people with more wealth the ability to overtake any business they choose, since intellectual property would be effectively public information. This would result in small businesses failing at an alarming rate and a society where a large percentage would be quickly impoverished. 

Total Societal Entropy

The first part of this has to do with how this massive data dump is presented to people. If it is just dumped on society, it would take millions of years to sift through it, but if it were dumped on society in the form of a giant searchable database, it would be overwhelmed almost immediately. No computing structure in the world could welcome that kind of traffic. 

The second part would be the end of organized society as we know it. The financial institutions, the governments, and any other major private or public institution would have to halt operations immediately to account for all the nefarious activities that would go on. 

The third part would be a complete restructuring of everything. Any security that was mitigated by the giant data dump would have to be rebuilt, which would take years.

What’s worse is that if this happened, people would be in fear of it happening again. It would send society back at least 100 years, but more likely it would either be an extinction event or it would unify society. 

Pretty bleak? Yes. Thankfully, it’s just a conceptual thought experiment. It goes to show how important your privacy is.

Luckily, the horrific event of a massive data dump that would expose all the world’s information is not something that will happen if we have anything to say about it. If you need help securing your business’ data, or to learn more about what we can do to give you options regarding data privacy, call us today at (703) 821-8200.

Tip of the Week: 5 Warning Signs of a Phishing Att...
Do You Need to Extend Your Wireless Network?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, October 31, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Software Cloud Data Hackers Business Management Hardware Microsoft Workplace Tips Network Security Productivity Backup Business Hosted Solutions Managed Service Provider Email Productivity Malware IT Services Google Efficiency Saving Money Innovation Small Business Computer Collaboration User Tips IT Support Data Backup Quick Tips VoIP IT Support Network Smartphones Business Continuity Data Recovery Mobile Devices communications Disaster Recovery Microsoft Office Gadgets Android Cybersecurity Social Media Smartphone Upgrade Mobile Office Phishing Server Communication Virtualization Miscellaneous Mobile Device Management Passwords Ransomware Mobile Device Vendor Management Operating System Windows Holiday Users BDR Apps Outsourced IT Internet of Things Windows 10 Tech Term Managed IT Services Unified Threat Management Facebook Remote Monitoring Automation BYOD WiFi Remote Computing Apple Data Management Analytics Managed IT services Mobile Computing Windows 10 Cloud Computing History The Internet of Things Browser Marketing Training Artificial Intelligence Covid-19 Firewall Save Money Business Technology Help Desk Health Spam App Alert Encryption Big data Budget IT Consultant Two-factor Authentication Information Technology Bandwidth Office Managed Service Office 365 Antivirus Gmail Information Government Access Control Hard Drives Content Filtering Cybercrime Windows 7 VPN Going Green Blockchain Maintenance Printer Managed IT Bring Your Own Device Remote Work Search Networking Wi-Fi Document Management Hiring/Firing Healthcare Recovery Windows 8 Outlook Employer-Employee Relationship Saving Time Lithium-ion Battery Retail Computers Best Practice Cost Management Tech Support Virus Wireless Technology Project Management Phone System Customer Service Money Storage iPhone Computing Data Security It Management Travel IBM Data Loss Humor Hacking Education Augmented Reality Update Conferencing Laptop Administration Save Time Legal Downtime Current Events Wireless Regulations Avoiding Downtime Website Vendor Proactive IT Computer Repair Running Cable SaaS Law Enforcement Intranet Patch Management Value Applications Twitter Password Customer Relationship Management File Sharing Hard Drive Compliance Hacker Solid State Drive Data storage PowerPoint Voice over Internet Protocol Flexibility Risk Management Data Breach Mobility Chrome User Business Intelligence Digital Monitoring Websites Virtual Desktop Digital Payment Business Growth Social Meetings Router Employee/Employer Relationship Private Cloud Management Software as a Service Comparison Tablet Cooperation DDoS Vulnerabilities Telephony Paperless Office Company Culture Machine Learning Sports Telephone Systems Social Networking Disaster Word End of Support Fax Server Hosted Solution Robot Excel Cortana Securty Scam Google Maps Black Market Net Neutrality Social Engineering Cryptocurrency Google Docs Virtual Assistant Chromebook Memory Computing Infrastructure Hack How To Specifications Safety Experience How To Monitors Start Menu Tech Terms Managed Services Cleaning Computer Accessories Office Tips Managed IT Service Multi-factor Authentication Download Mobile Technology Documents Inbound Marketing Teamwork Co-managed IT Heating/Cooling User Error Entertainment Telephone YouTube Trending Uninterrupted Power Supply Mouse Processor Vulnerability Microchip Taxes Unified Communications Settings Bitcoin Distributed Denial of Service Pain Points Statistics Smart Devices Data Protection Lifestyle Programming Public Cloud Licensing Network Congestion Solutions eWaste Employees IT service Video Conferencing Professional Services Downloads Identity Theft Distribution Notifications Streaming Media Integration Redundancy Bluetooth Gaming Console Processors USB Virtual Reality Cost Politics Automobile Webcam Managed Services Provider Presentation Emails Text Messaging Evernote Scalability Device Management Supply Chains External Harddrive Directions Display Application UTM Content Motion Sickness Visible Light Communication Recording Technology Tips Optimization Trojan Human Resources Dark Web Free Resource Fake News Organize IT Plan Enterprise Resource Planning IT consulting Business Managemenet Electronic Health Records SSID Audit Legislation Error Messenger Tracking Content Management Financial Data email scam Addiction Memes Thin CLient Processing Accountants A.I. Rental Service 3D Health IT Ebay Data Warehousing CIO Cabling online Currency 2FA Smart Phones Emergency Wasting Time Hard Drive Disposal Digital Signature Web Server Advertising Flash Managing IT Services Access Logistics Virtual Machines Bookmark Microsoft Excel Migration Connected Devices Administrator Windows XP Surveillance Computer Care Cyber security Wireless Headphones Books Staffing Workers Google Wallet Telework Webinar Network Management Displays LinkedIn IT Leadership Google Play Telephone Service Equifax Fleet Tracking Supercomputer Society Remote Workers Adminstration Google Drive Pirating Information Employer/Employee Relationships Windows Server 2008 Worker Micrsooft Remote Managing Costs Device security MSP Virtual Private Network Spyware Microsoft 365 Mobile Payment PDF FinTech Browsers Best Available Keyboard Desktop Finance Skype Development Electricity Medical IT Printing Trend Micro Nanotechnology Social Network Reading Samsung Drones Archive Business Cards Service Level Agreement G Suite Security Cameras Threats Domains Startup Asset Tracking Employer Employee Relationship Data Storage User Tip Proactive Maintenance Unified Threat Management Backup and Disaster Recovery Navigation Virtual Machine Public Speaking Username Hacks Physical Security Permissions Point of Contact Language Procurement cache Television Organization Data Analysis Shortcut Gamification Banking Botnet Upselling WannaCry eCommerce Best Practives Screen Reader Customer Resource management Relocation Tablets Video Surveillance SQL Server Freedom of Information Entrepreneur Piracy Upload Sync switches Writing Communitications Corporate Profile GDPR Managing Risk Troubleshooting Smart Tech Music PCI DSS Printers Time Management Environment Fiber-Optic Database Recycling Upgrades Saving ZTime Tech Hypervisor HIPAA Microserver HTML CCTV Analytic Supply Chain Management Assessment SharePoint AI Fileless Malware Hybrid Cloud Tip of the week Competition Mobile Security Business Metrics Computer Malfunction LiFi Product Reviews Internet Service Provider Google Calendar Holidays Electronic Payment Telephone System Reliable Computing Proxy Server Touchscreen Debate Azure News Software License Trends In Internet of Things IT Assessment Harddrive VoIP Modem Strategy Get More Done Business Owner Multi-Factor Security Read Regulations Compliance Printer Server Fraud Tactics Deep Learning Term Knowledge Turn Key IP Address Devices Work/Life Balance Remote Working GPS Electronic Medical Records Consultation Transportation 3D Printing Capital Personal Information Productuvuty Financial Reviews Managing Stress CrashOverride Regulation

toner1