AXEL Network Products:

AXEL GO - share and store files securely.

LetMeSee - photo sharing app.

  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

AXEL.org

  • Network
  • Technology
  • Applications
  • Blog
  • About
    • Team
    • Press
    • Careers
    • Patents
  • Contact Us
  • Login
    • AXEL Go
    • AXEL Cloud

October 12, 2020

A Story of Data Custody in the Modern Age: Part I

A Story of Data Custody in the Modern Age

Meet Lucas

Lucas is a 25-year old tech support specialist for a medium-sized company in Richmond, Virginia. He’s worked there for the last three years and has risen from a junior employee to his current salaried position. Throughout his time at the company, he’s learned a great deal about computing technology and general cybersecurity best practices. He now reads popular cybersecurity blogs to stay up-to-date and knowledgeable about his field.

“To be honest, in college, I never really kept up on cybersecurity trends. I guess I was too busy keeping tabs on who was attending what party. But after I graduated and got my first real job, I started paying more attention.”

While doing this, however, he has discovered some concerning trends.

“That’s when I noticed two things: 1) Hacks and breaches occur WAY more often than I thought; and 2) Companies are tracking, buying, and selling a LOT of personal data.

When you start following these cybersecurity blogs, there are articles almost every day about massive data breaches or hacks fetching million-dollar ransoms. Then, when you get into the details, you see 10 million, 40 million, 200 million personal records breached. It’s crazy!”

Upon further inspection, Lucas found the sheer number of records breached to be less troublesome than other aspects.

“But that’s only the beginning of the rabbit hole. You start to unpack these breaches and find that the company that left hundreds of millions of personal records vulnerable didn’t have hundreds of millions of users. So, where did those records come from?  Well, they bought them from other giant companies that are doing the same thing they’re doing; mining their users for advertising information. It gets really gross. You finally realize that the individual has no clue about who has their data or how it’s being used and sold.”

“And, it’s kind of a sad progression. You go from feeling shocked, to upset, to powerless in a short period of time. It’s difficult to know where to start in the fight against these kinds of data collection policies. You eventually settle into a hopeless feeling of acceptance. The companies responsible make too much money for anything to change.”

The end of the story?

Luckily, this story does not have to end on such a sour note. There are other tech companies out there, fighting for data privacy and protection. You just have to know where to look!

In an upcoming article, we’ll follow Lucas on his journey as he searches for alternative ways to utilize modern technology. Will Lucas have his hope rekindled? Is there a plausible future that treats individuals like people and not statistics? Check back soon to see how the next chapter plays out.

  • Share on Twitter Share on Twitter
  • Share on Facebook Share on Facebook

Filed Under: Lifestyle Tagged With: big data, customer data, cybersecurity, data analytics, data breach, data collection

Primary Sidebar

Recent Posts

  • AXEL News Update
  • AXEL Events
  • Biggest Hacks of 2022 (Part 2)
  • Biggest Hacks of 2022 (Part 1)
  • The State of Government Cybersecurity 2022
  • Privacy for the Future
  • File Sharing 101: How to Easily Share Large Files
  • Web3 Beyond Crypto
  • Your Privacy and The Internet of Things
  • Personal Vehicle Telematics and Privacy Oversights
  • Why IPFS is the Future of Internet Storage Systems
  • Protecting the workplace from Day 1 Exploits
  • How User Experience Impacts Cyber Security
  • Protecting your Privacy With End-to-End Encryption
  • Devastating Hospital Hacks
  • The Dangers of Leftover Attachments
  • How Secure Are Your Apps, really?
  • ABA GPsolo Roundtable Roundup
  • Our Continued Loss of Privacy
  • Casting a Shadow of Protection
  • Why Digital Sharding is the Future of File Storage
  • The Practical Applications of Web3
  • Archival With the Future in Mind
  • IPFS: Securing Our Privacy Future
  • What Do We Do About Social Engineering?
  • Five Simple Security Tricks
  • IPFS: The InterPlanetary Solution to Small Business Problems 
  • Schools: Our Cybersecurity Blindspot

Recent Comments

  • Anonymous on Five Simple Security Tricks

Footer

Sitemap
© Copyright 2023 Axel ®. All Rights Reserved.
Terms & Policies
  • Telegram
  • Facebook
  • Twitter
  • YouTube
  • Reddit
  • LinkedIn
  • Instagram
  • Discord
  • GitHub