Disruptive technology is generally seen as good because it has the potential lead to the creation of new markets and value networks. Deployment of the latest and greatest technologies can allow organizations to gain a competitive advantage and increase efficiency. Unfortunately, as with any technology, it can be used for illegal activity or provide a security threat. Most recent threats are enabled or created by technology. It is challenging for organizations to embrace disruptive technology, while also protecting against threat. Nowadays, security is a number priority for all organizations across the globe, especially governments.
Australian Opposition Leader Bill Shorten told Parliament yesterday “we live in an era where disruptive technologies present genuine threats to our national security.” He specifically warned against the use of 3D Printers, bomb-making instructions readily available on the Internet, and cyber attacks. Individuals can easily access inexpensive technology to conduct illegal activities.
To counter this, government agencies must be innovative and adaptable. Shorten strongly encourages the creation of new ideas and turning those ideas into new technology so that the defense forces can quickly and effectively respond to threats.
Recently, the Australian government amended the Firearms Act, which now makes the possession of digital blueprints for the manufacture of firearms on 3D printers or electronic milling machines an offense carrying maximum penalty of 14 years imprisonment.
In South Korea, dozens of the brightest college students practice hacking each other as a part of the government’s program to train them to fight against some of the world’s best. There is an urgency to train ethical hackers as nations and organizations are attempting to safeguard digital information. Many nations benchmark against South Korea’s systems given that they are constantly squaring off with North Korea.
The risk of cyber attacks increases with every additional device connected to the network. The Internet of Things will only cause this threat to worsen. Organizations are eager to deploy IoT, but they must ensure they are taking proper consideration of the security implications. Cyber criminals are already able to fairly easily hack into smart phones. When every other object in the world is connected, the possibilities for cyber criminals are endless and for most organizations, there isn’t enough due diligence being done in the development of IoT systems.