Nowhere Man is not referring to the frequency of posts on this blog recently :-), nor to the Beatles song. I’m recalling a 1990s TV series about a journalist whose life was erased. Imagine (if it happened today) finding none of your credit cards or id cards work, your email’s locked out, your Facebook’s erased and even your wife and friends don’t know you.
Erasing a life may require national intelligence agency level APT capabilities and even for “them” it would hopefully be hard – if, like me, you bought your wife flowers AND an iPhone 5 for her birthday
Unfortunately, erasing all or part of – just – a person’s digital life is much easier and within the capabilities of the common scoundrel. Recall the epic hacking of Mat Honan, a writer for Wired whose Apple and Amazon accounts were exploited, online reputation attacked, and irreplaceable baby pictures deleted along with the rest of his Mac’s hard drive. And you thought the Mac was safe! In his story about it, Mat ruefully wishes he’d used Gmail’s free two factor authentication capability. If you’re reading this and use Gmail, please do that!
However, although two factor authentication in Gmail would have stopped the exploit against Honan, it isn’t enough to stop a competent hacker (or administrative screw up at a personal cloud service) from finding some other attack vector. This a business problem as well as a personal one – the same weak password authentication and account management techniques that left Honan vulnerable could threaten any organization through its users.
As a writer myself the Wired story, like the Nowhere Man show before it, affected me personally. As a result I’ve done some additional things to harden my digital life and I’d like to do more to help friends and clients. In a coming series of blog posts I’m going to write about how account recovery is a weak link and explore what we can do about it, both personally and as businesses.
- How Not To Get Hacked
- Wired: How Apple and Amazon Security Flaws Led to My Epic Hacking
- Nowhere Man TV Series
Read Complimentary Relevant Research
Predicts 2017: Artificial Intelligence
Artificial intelligence is changing the way in which organizations innovate and communicate their processes, products and services. Practical...
View Relevant Webinars
How to Live Without Mobile Device Management
This webinar addresses the growing trend of users refusing to have enterprise management of their mobile devices due to privacy concerns....
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.