AXEL Network Products:

AXEL GO - share and store files securely.

LetMeSee - photo sharing app.

  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

AXEL.org

  • Network
  • Technology
  • Applications
  • Blog
  • About
    • Team
    • Press
    • Careers
    • Patents
  • Contact Us
  • Login
    • AXEL Go
    • AXEL Cloud

Blog

March 18, 2022

Artificial Intelligence is Here to Stay. How Will That Affect Businesses, Individuals, and Our Privacy?

For years, the idea of advanced robots and machines completing common tasks has tantalized authors, filmmakers, and the general public. Works that took place in an idealized future, such as the 1960s animated sitcom The Jetsons, were immensely popular, and for good reason. Who wouldn’t want to live in a world where robots can vacuum your house, control your lights, or even start your car? This prevalence of these hypothetical technologies made everyone dream of a future where machines could handle many of the minute, everyday tasks that many abhorred.

Today, that future has undoubtedly arrived. With the necessary hardware, everyday people can tell their machines to turn on the lights, vacuum the house, and start their car. Many of the technological wonders that were fictionally highlighted in The Jetsons are a reality now. Simply put, we are living in an idealized future, thanks to artificial intelligence (AI). While AI has been in the works for decades, it has truly flourished in the past ten years. Now, nearly every new piece of technology utilizes AI in some form or another. So, as we enter a future that is likely to be dominated by artificial intelligence, it’s important to be aware of the history, uses, drawbacks, and future of this fledgling technology.

The History of AI

In the 1940s, neurologists discovered that the brain is powered by neurons, cells that can communicate using electricity. This breakthrough suggested that, if the brain could make decisions using electricity, so could a machine. Following this revelation, programmers and scientists worked vehemently to research the possibility of artificial intelligence. In 1950, famed computer scientist Alan Turing developed what he called an “imitation game” using artificial intelligence[1]. In this game, there are three participants: A player who asks questions, a human who responds to the player’s questions, and a computer that responds to the player’s questions. While this test didn’t really determine if machines could think like humans, it determined if machines could come to the same conclusions as humans. While Turing’s experiment was only a game at the end of the day, it was a promising first step for the theory of artificial intelligence.

For decades after Turing, artificial intelligence remained mostly experimental. However, beginning in the 1990s, the exponential increase in computer processing power allowed AI to be developed into useful products. In fact, in 1997, IBM’s chess software, Deep Blue, became the first AI program to beat a reigning world chess champion[2]. Additionally, in 2011, IBM’s question-answering program Watson handily beat two of Jeopardy’s winningest contestants in a match of the famous quiz show[3]. While these two examples were only used in games, they publicly showed just how powerful AI could be.

However, during the development of these innocuous AI software programs, another form of AI was being developed as well: Facial recognition software. Although certainly different from quiz shows and chess programs, facial recognition programs use similar AI techniques to analyze faces from images. Using AI, these systems are able to analyze a face, then match that face to a picture in an existing database. As the technology advanced, businesses began to sell the technology nationwide, particularly to law enforcement groups[4]. Ultimately, while innocent AI programs like Watson and Deep Blue enjoyed national press, programs that had serious consequences were being developed quietly as well.

The State of AI Today

In the business sector today, AI is utilized in nearly every facet of operation. One department that especially uses AI is marketing and customer acquisition. From automated emails to AI-powered chatbots, artificial intelligence can be used to advertise your business to new and existing customers. In human resources, AI can sift through applications quickly, allowing managers to spend less time searching for qualified candidates. In manufacturing, AI can track inventory and even anticipate demand[5]. Today, the most successful businesses utilize artificial intelligence in order to maximize their efficiency. These powerful machines can do things at a speed that humans simply can’t reach. It’s no wonder why AI has been embraced so extensively by the business world.

While efficiency-maximizing AI has been welcomed around the world by businesses, more controversial forms of AI have been embraced as well. In recent years, facial recognition programs have grown more popular, and are being used by law enforcement, security companies, and even social media sites. Additionally, many AI programs built for consumers are little more than extra ways to collect data. For example, Amazon’s Echo device was one of the first AI assistants and quickly became popular after release. Soon, Amazon set the Echo’s price so low that the company was selling them at a loss[6]. However, because of the vast amount of valuable data Amazon would get back, this strategy was sound. Ultimately, AI has become extremely popular for both businesses and consumers, significantly due to companies’ everlasting desire for our data.

Concerns of AI and Facial Recognition

Every AI program runs on datasets, but if those datasets are biased, then the entire program can be biased as well. And when it comes to bias, few programs are more criticized than facial recognition software. In fact, researchers found large amounts of racial and gender bias in AI programs sold by IBM, Amazon, and Microsoft[7]. In this research, the author found the programs’ facial recognition software had an extreme amount of bias. For example, the software had less than a 1% error rate for lighter-skinned men, but a 35% error rate for darker-skinned women[7]. This is because the datasets that these AI programs run on simply aren’t diverse enough. Unfortunately, these errors can have devastating consequences. False positives from facial recognition software have led to a countless number of unjustified arrests, disproportionately harming racial minorities[8]. Although facial recognition has been helpful to some degree, its unequal consequences cannot be ignored.

While it’s true that AI programs can offer extraordinary benefits, those benefits don’t come free. In reality, they’re further eroding what little privacy we have left. We’re willingly buying listening devices from a massive company with a less-than-stellar record on privacy in exchange for convenience. While some people may be willing to make this sacrifice, it doesn’t have to be this way. The incredible benefits of AI don’t have to be paired with this massive violation of privacy.

So, what’s the solution for better AI? First, datasets need greater diversity, particularly in the case of facial recognition. In order to truly be effective, AI needs to be representative of the general population. But because of biased AI datasets, these programs are helping some, but actively harming others. Additionally, legislation ought to be passed that minimizes Big Tech’s reliance on data collection. Today, many people refuse to try the most popular AI programs because of their overreliance on data collection. If Big Tech became less obsessed with our data, we could enjoy the benefits of AI without trading away our information.

About AXEL

At AXEL, we know the best businesses have valued privacy for decades. Now, in a world full of cybercrime and data collection, digital privacy is more important than ever before. That’s why we created AXEL Go. AXEL Go uses military-grade encryption, blockchain technology, and decentralized servers to ensure it’s the most secure file transfer software on the market. Whether you need to transfer large files or send files online, AXEL Go is the best cloud storage solution. If you’re ready to try the most secure file-sharing app for PC and mobile devices, download AXEL Go for free here.

Footnotes

[1] “Turing Test.” Encyclopædia Britannica. Encyclopædia Britannica, inc. Accessed March 16, 2022. https://www.britannica.com/technology/Turing-test


[2] Saletan, William. “The Triumphant Teamwork of Humans and Computers.” Slate Magazine. Slate, May 11, 2007. https://slate.com/technology/2007/05/the-triumphant-teamwork-of-humans-and-computers.html


[3] Markoff, John. “Computer Wins on ‘Jeopardy!’: Trivial, It’s Not.” The New York Times. The New York Times, February 16, 2011. https://www.nytimes.com/2011/02/17/science/17jeopardy-watson.html


[4] Valentino-Devries, Jennifer. “How the Police Use Facial Recognition, and Where It Falls Short.” The New York Times. The New York Times, January 12, 2020. https://www.nytimes.com/2020/01/12/technology/facial-recognition-police.html


[5] Marr, Bernard. “10 Business Functions That Are Ready to Use Artificial Intelligence.” Forbes. Forbes Magazine, December 10, 2021. https://www.forbes.com/sites/bernardmarr/2020/03/30/10-business-functions-that-are-ready-to-use-artificial-intelligence/?sh=2df649c43068


[6] Smith, Rich. “Did Amazon Lose $100 Million Selling Its Most Popular Item?” The Motley Fool. The Motley Fool, January 8, 2018. https://www.fool.com/investing/2018/01/08/did-amazon-lose-100-million-selling-its-most-popul.aspx


[7] Buolamwini, Joy. “Artificial Intelligence Has a Racial and Gender Bias Problem.” Time. Time, February 7, 2019. https://time.com/5520558/artificial-intelligence-racial-gender-bias/


[8] Najibi, Alex. “Racial Discrimination in Face Recognition Technology.” Science in the News. Harvard University, October 26, 2020. https://sitn.hms.harvard.edu/flash/2020/racial-discrimination-in-face-recognition-technology/

Filed Under: Business, Tech Tagged With: communication, customer data, cybercrime, data analytics, data privacy, data protection, marketing, Security, Social Media, technology

March 11, 2022

Big Tech is Talking Privacy. What Does That Mean for the Future of Our Data?

If someone only watched Big Tech advertisements, they’d believe that these massive conglomerates are bastions of digital privacy. In the past few years, companies like Facebook and Google have inundated the airwaves with ads that highlight the companies’ efforts to protect user privacy. However, the one company that has worked the hardest to cultivate a secure and private image is Apple. Privacy was even the subject of a slick, wide-ranging marketing campaign for the company[1]. Today, digital privacy is being marketed like a new product, and every company is claiming to value and protect your data. But how much of the marketing is accurate, and how much is just PR?

Here’s the truth: Big Tech corporations have taken steps to better protect users’ data in recent years, but there’s still a long, long way to go. Overall, it is a positive step that corporations are claiming to value digital privacy. After all, these widespread marketing campaigns have increased consumer awareness of digital privacy and its importance. However, while these companies claim they value privacy, they ultimately value the status quo more. This has led to the situation we’re in now: Companies are making small digital privacy improvements, primarily for good PR, but avoid going after the root of the problem.

What Steps Has Big Tech Taken?

You probably already know this, but Big Tech has mountains of data on billions of people around the world. These companies collect as much information as possible and then use that information to target you with specific advertisements. From simple things like name and date of birth to more private pieces of information like political affiliation, religion, and relationship status, Big Tech knows a lot about you, and they use this information to inundate your computer with personalized ads[2]. And don’t think that ads are just a small part of Big Tech’s revenue. 98% of Facebook’s revenue comes from advertisements[3], highlighting just how vital data collection is to these Silicon Valley corporations.

This is why you should take Big Tech’s privacy claims with a grain of salt. Collecting mounds of user data is the lifeblood of Big Tech giants, so they aren’t about to make any changes that significantly impact their bottom line. So the next time you see a Google or Amazon ad claiming that they care about data privacy, just remember how those companies really earn their money. Judging by their revenue streams, the Big Tech giants aren’t really technology companies — they’re middlemen between you and advertisers.

But here’s the thing: Some companies actually have taken positive steps to better protect users’ digital privacy. For example, Google is phasing out the third-party cookie, a notorious program that tracked users and permanently stored their data[4]. Additionally, Apple has begun to allow users to “ask apps not to track” their data[5]. These are undeniably positive steps that put more power in the hands of users. While these changes won’t end Big Tech’s data-hungry behavior, overall, it’s a positive development.

What’s Behind Big Tech’s Privacy Push?

Unfortunately, Big Tech’s changes don’t go nearly far enough. Most of the changes that Big Tech companies have implemented simply alter how companies handle data once it’s already been collected. Now, is Google’s alternative to the third-party cookie more secure? Definitely. But the company is still collecting your data and storing it on their servers in order to advertise to you. The fundamental process of data collecting has not changed one bit, making it seem that Big Tech companies are simply looking to score PR points, rather than committing to actual change. Could that change in the future? It’s possible, but remember: Big Tech’s main clients are advertisers, not us. Unless a new way to deliver targeted ads without data collection is discovered, the current situation will likely continue.

We may have to get used to incremental change, rather than a digital privacy revolution. After all, nearly every Big Tech company spends millions each year in lobbying to shoot down bills that threaten their data collection processes. In fact, Facebook alone spent over USD $20 million in 2021 to lobby Congress to oppose any new regulations that give too much choice to consumers[6]. Big Tech companies don’t just stop at lobbying either. In Virginia, Amazon and Microsoft supported a privacy bill that, while adding some new regulations, failed to put power in the hands of users. The new bill is filled with loopholes and explicitly forbids users from suing tech companies for violating their privacy[7]. Big Tech loves to talk a big game regarding digital privacy, but when it comes down to it, they’ll do everything possible to prevent changes to the status quo.

How to Make Big Tech Prioritize Privacy

The best way to prioritize user privacy is to pass wide-ranging, enforceable legislation that would actually make Big Tech uncomfortable. For so long, these companies have collected and stored mountains of data on billions of people, while only making trivial improvements to their digital privacy policies. Ultimately, that’s why we can’t trust Big Tech to regulate itself — they’ll never voluntarily change their fundamental business model. Therefore, it’s up to politicians and regulators to force Big Tech into making legitimate, lasting change for good.

One law that has made a significant impact is the European Union’s General Data Protection Regulation (GDPR). Under GDPR, websites must ask users for consent to collect their data, and it allows users to request the deletion of their personal data from a site[8]. Make no mistake; these are genuinely positive steps toward empowering users. But for the people that live under GDPR’s jurisdiction, many feel that little has changed.

This feeling can be attributed to the “opt-out” nature of data collection under GDPR. Websites like Google and Facebook make it much easier to agree to data tracking than opting out of it. Agreeing to data collection requires just one click, while getting out of it requires navigating complicated options menus for every site. Big Tech knows that this model isn’t too disruptive, as the vast majority of people will simply accept tracking, rather than dealing with the headache of opting out. A truly effective solution would be to change data collection into an “opt-in” feature. Under this method, users would automatically be excluded from data collection, but could opt-in if they wished. Of course, this method would undoubtedly draw the ire of Big Tech, but it would be a significant improvement for data privacy. In 2019, Edward Snowden called GDPR “a good first effort … but it’s not a solution[8].” Ultimately, although GDPR and other regulations aren’t as effective as we may have hoped, they’re still positive steps toward a more secure, private Internet for all.

About AXEL

Big Tech may not care about your digital privacy, but we do. At AXEL, we know millions of individuals and businesses demand affordable, secure, and intuitive file-sharing software. That’s why we created AXEL Go. AXEL Go uses military-grade encryption, blockchain technology, and decentralized servers to ensure it’s the most secure file transfer software on the market. Whether you need to transfer large files or send files online, AXEL Go is the best cloud storage solution. If you’re ready to try the most secure file-sharing app for PC and mobile devices, download AXEL Go for free here.

[1] Wuerthele, Mike. “’Privacy. That’s iPhone Ad Campaign Launches, Highlights Apple’s Stance on User Protection.” AppleInsider. AppleInsider, March 14, 2019. https://appleinsider.com/articles/19/03/14/privacy-thats-iphone-ad-campaign-launches-highlights-apples-stance-on-user-protection

[2] Moscaritolo, Angela. “What Does Big Tech Know About You? Basically Everything.” PCMAG. PC Magazine, January 18, 2022. https://www.pcmag.com/news/what-does-big-tech-know-about-you-basically-everything

[3] “Facebook Ad Revenue 2009-2020.” Statista, February 18, 2022. https://www.statista.com/statistics/271258/facebooks-advertising-revenue-worldwide/#:~:text=In%202020%2C%20about%2097.9%20percent,increase%20in%20comparison%20to%20the

[4] Low, Cherlynn. “Google Is Testing a New Replacement for Third-Party Cookies.” Engadget, February 28, 2022. https://www.engadget.com/google-topics-api-privacy-sandbox-third-party-cookie-replacement-130049935.html

[5] Mayo, Benjamin. “What Does ‘Ask App Not to Track’ Mean?” 9to5Mac, April 27, 2021. https://9to5mac.com/2021/04/27/what-does-ask-app-not-to-track-mean/

[6] Birnbaum, Emily. “Facebook’s Lobbying Spending Surged to a Record in 2021.” POLITICO. POLITICO, January 21, 2022. https://www.politico.com/news/2022/01/21/facebook-lobbying-spending-2021-527577

[7] Tsukayama, Hayley. “Virginians Deserve Better than This Empty Privacy Law.” Electronic Frontier Foundation, February 24, 2021. https://www.eff.org/deeplinks/2021/02/virginians-deserve-better-empty-privacy-law

[8] Hare, Stephanie. “These New Rules Were Meant to Protect Our Privacy. They Don’t Work.” The Guardian. Guardian News and Media, November 10, 2019. https://www.theguardian.com/commentisfree/2019/nov/10/these-new-rules-were-meant-to-protect-our-privacy-they-dont-work

Filed Under: Business, Tech Tagged With: communication, customer data, cybercrime, data analytics, data privacy, data protection, marketing, Security, Social Media, technology

March 4, 2022

How Technology Changed Business (And What That Means for the Future of the Industry)

What comes to mind when you think of the word “business?” Many people will think of stereotypical corporate activities, like signing documents, sitting in cubicles, or swimming in a sea of never-ending black and blue suits. While all three of these things still permeate throughout the business world, all three are also becoming less popular. Think about it: Physically signing documents is a rarity; many businesses use e-signatures today. Cubicles are being phased out in favor of remote work. And instead of fancy suits, we’re seeing our coworkers in more casual clothes (if we even see them in the office at all).

Business is changing. Of course, this shouldn’t come as a surprise. After all, every industry changes with time. But business is different. In order to survive, businesses have to evolve constantly and embrace new technologies that give them an edge over the competition. If they don’t, they’ll be left in the dust by smarter, more modern companies. Because of this, businesses have often been the first to widely adopt and implement innovative technology. But they aren’t just using technology to complement their existing practices; tech is now the backbone of every facet of business. Ultimately, the industry’s willingness to try new technology has helped usher in the digital era that we live in today. Technology hasn’t just helped business; it has evolved business from the ground up.

How Tech Changed Communications

It’s easy to forget, but just a few decades ago, business communication was radically different than it is today. Before the Internet, businesses relied on physical papers and snail mail to communicate. Internally, businesses needed a dedicated mail worker who transferred documents from one employee to another. For team-wide updates, papers had to be posted on a bulletin board to be seen. For external communications, businesses could use telephones to communicate, but if they needed to send a document, they had to rely on mail services. While, individually, none of these tasks are particularly burdensome, that lost time lost adds up. Mail could take a few hours to organize, international shipping could last weeks, and office telephones only worked when employees were at their desks. Before the Internet, businesses tried their best to maximize efficiency, but without modern technology, communications could be painfully slow.

Needless to say, communications at top businesses aren’t like this anymore. The turning point for businesses was the invention of email. All of a sudden, employees could communicate with each other immediately, and even attach documents digitally. As soon as email adoption became widespread in business, the business tech floodgates opened. Today, business software like Slack and Microsoft Teams allows coworkers to communicate instantaneously.

However, this tech isn’t without drawbacks. Because of how easy it is to communicate with coworkers, many employees feel like they can’t escape the office. After all, today’s smartphones can easily handle emails and video calls, ensuring that the office will always be able to contact us, no matter where we are. To that point, many businesses even require workers to respond to emails on weekends and vacations. Ultimately, business communication has become so fast and simple that many workers have trouble escaping the constant connection of their workplace.

How Tech Helps Reach Customers

One of the most difficult aspects of running a business is consistently finding new customers. Regulars are great, but in order for a business to truly thrive, it needs a plan to find and convert leads into customers. Before the Internet, this process was relatively simple. Word-of-mouth, networking, and the occasional newspaper ad were the only ways businesses could seek out new customers. Of these three, word-of-mouth was the most important, as businesses lived and died based on their reputation. Before modern technology, reaching new customers wasn’t all that costly. After all, positive word-of-mouth is just about the one thing a business can’t buy.

Today, word-of-mouth is still one of the most important parts of finding new customers, especially for small businesses. The difference, however, is that there are now dozens of ways for businesses to generate that word-of-mouth. Today, the most popular way is utilizing Facebook advertisements. A full 66% of all small business owners in the United States used Facebook to advertise their business[1]. Ultimately, very few businesses can thrive without the help of the modern Internet. Think about it: If your business has no website, no social media presence, and isn’t listed on Yelp or Google Maps, your business might as well not exist. While finding new customers is much more complex today, the multitude of ways to find new leads helps level the playing field between businesses. Now, your business doesn’t need a century-long reputation in order to succeed; it just needs high-quality digital marketing.

The Rise of Data Analysis

Many business owners may not even be aware of this, but every business uses data analysis to some degree. Simply put, data analysis is the inspection of data about a business and its customers, and making inferences based on that data. One common example is when a coffee shop increases its staffing during the morning rush. The owner knew from previous data that mornings were busier, and then decided to increase staffing to alleviate the rush. For businesses, the simple formula is to collect data, identify patterns in that data, then make predictions based on those patterns[2]. Even before modern technology, businesses regularly used data analysis to increase productivity and minimize downtime.

So, what’s different about data analysis today? Well, we’re usually not the ones doing it anymore. These days, most high-level data analysis is being done by computers. This makes sense, as computers are able to identify patterns in data much more accurately and quickly than humans. Additionally, data analysis isn’t just used for simple things like managing employee scheduling or choosing what items to stock. For the most successful businesses, data analysis is used in every area of business. From customer acquisition and targeted campaigns to new item development and supply chain management, data analysis helps businesses maximize their efficiency[3]. 

So, What’s Next?

After looking at all the ways technology has evolved business practices, one thing is for sure: Businesses are not done changing. Simply put, if there’s a way for businesses to increase their revenue, it will be utilized. And the fact is, businesses are becoming more and more reliant on computers and technology than ever before. Things like employee scheduling and data analysis, previously done by workers, are now done by computers. And, frankly, this trend is unlikely to reverse any time soon. Now, this doesn’t mean computers will be the ones running businesses in a few years. But let’s face it: They are already making many of the big decisions at businesses across the world. 

Ultimately, technology makes businesses more efficient. Unfortunately, as businesses rely more on technology, this also means they rely less on workers. Positions including warehouse jobs, customer service, and banking services are slowly being overtaken by technology[4]. It’s a sad reality, but businesses can simply be more successful with unpaid bots, rather than salaried employees. Again, technology is unlikely to replace human workers en masse any time soon. But as technology becomes more and more advanced, the most successful businesses will rely on tech more than ever before.

About AXEL

Technology is useful in every facet of business, but particularly in the area of cybersecurity. Cybercrime poses a threat to businesses big and small, highlighting the need for affordable cybersecurity solutions. That’s why we created AXEL Go. AXEL Go uses military-grade encryption, blockchain technology, and decentralized servers to ensure it’s the most secure file transfer software on the market. Whether you need to transfer large files or send files online, AXEL Go is the best cloud storage solution. If you’re ready to try the most secure file-sharing app for PC and mobile devices, download AXEL Go for free here.

[1] “Leading Social Media Networks Used by Small Businesses to Advertise in the United States in 2021.” Statista, November 18, 2021. https://www.statista.com/statistics/208971/effective-social-media-marketing-tools-for-small-us-businesses/

[2] “Why Data Analytics Is Critical for Small Businesses.” AirSlate, August 17, 2021. https://blog.airslate.com/why-data-analytics-is-critical-for-small-businesses/

[3] Mills, Terence. “Council Post: Five Benefits of Big Data Analytics and How Companies Can Get Started.” Forbes. Forbes Magazine, December 10, 2021. https://www.forbes.com/sites/forbestechcouncil/2019/11/06/five-benefits-of-big-data-analytics-and-how-companies-can-get-started/?sh=48b2320117e4
[4] “Council Post: Tech Experts Predict 13 Jobs That Will Be Automated by 2030.” Forbes. Forbes Magazine, December 10, 2021. https://www.forbes.com/sites/forbestechcouncil/2019/03/01/tech-experts-predict-13-jobs-that-will-be-automated-by-2030/?sh=3fc53ffb22bf

Filed Under: Business, Tech Tagged With: communication, customer data, cybercrime, data analytics, data privacy, data protection, marketing, Security, Social Media, technology

February 25, 2022

Small Business Tech Trends of 2022

When you think of small businesses, you may think of classic mom-and-pop, Main Street stores with just a few employees, and even fewer expenditures. Even TV and movies love to paint small businesses as old-fashioned shops with carefree owners who spend their time lounging and chatting up regulars. While this rosy picture may be accurate for a few small business owners, for the vast majority, this couldn’t be further from the truth.

Small businesses and their owners face unique, difficult challenges that have no clear solution. This was especially clear when the COVID-19 pandemic began to rage in early 2020. While big businesses had the technological infrastructure to weather the storm, many small businesses simply couldn’t survive, through no fault of their own. For the businesses whose doors didn’t shutter in the early months of the pandemic, they soon found that innovation was the only way they could survive. From Zoom meetings to online ordering, COVID-19 forced small businesses to evolve. And even as the pandemic reaches its two-year anniversary, these involuntary changes aren’t leaving any time soon. As the country (and the world) continue to live with the pandemic, more small businesses are beginning to utilize these new technology trends to survive in this new normal.

Automation and Artificial Intelligence

When it comes to saving time, there is no better tool for small businesses than automation. Automation can complete many of the small, minute tasks that add up. Things like welcome emails, communications with leads, and inventory management can all be automized, allowing more time for business owners to focus on profit-driven tasks. Best of all, there are useful automation software for nearly every facet of business. Spending a lot of time setting up meetings? Try out Calendly, a useful tool that minimizes the time-consuming back-and-forth of arranging appointments. Want to set your social media posts weeks in advance? Try Hootsuite or Sprout, two programs that can post to your company’s social pages automatically. More and more small businesses are utilizing tools like these to cut down time spent on tasks that don’t affect the bottom line.

This increased adoption of tech shouldn’t come as a surprise. After all, small businesses that extensively utilize digital tools earn twice as much revenue per employee than businesses that don’t[1]. It’s simple: When businesses let technology handle small, everyday tasks, they become more successful. However, this doesn’t mean that once a business automizes some things, it’ll magically increase profits. Small businesses have to constantly be on the lookout for programs that give them an advantage over their big-business competitors. One of these programs is quickly growing in popularity, and could even be considered an evolution of automation: Artificial Intelligence (AI).

One of the most popular AI programs for small businesses is chatbots. With these bots, businesses can communicate with web visitors and determine if they need help automatically. More uses include creating marketing content and streamlining inventory management[2]. Although similar to automation, AI goes one step further: It can analyze data and make logical decisions for your specific situation. From resume scanners to employee schedulers, Artificial Intelligence is becoming more useful (and more affordable) for small businesses that seek to prioritize their efficiency.

Digital Advertising is Changing

For the past decade, there has been a single, dominant platform in the social media advertising business: Facebook. It has long been known that advertisements are the lifeblood of the world’s most popular social media site. In fact, Facebook makes a whopping 98% of its revenue from ads[3]. Because of its unending data collection, Facebook can target ads at the micro-level, allowing them to charge advertisers even more. However, extensive data collection and ad-supported social media aren’t exclusive to Facebook anymore. While the company is still making a gaudy amount of money from ads, cracks are beginning to show.

One thing is certain: Facebook is getting older. Now, if your business’s target demographic is 45+, you won’t have much of a problem. But if your business is targeting the coveted 18 to 34 demographic, you may need a more complex marketing strategy. That’s because young people simply don’t use Facebook as much as they used to. In 2016, 60% of teens used Facebook at least once a month. In 2021, that number dropped to 27%[4]. Apps like Snapchat, Instagram, especially TikTok are simply more popular with young people, creating the need for multi-front digital marketing strategies.

Software Integration

The great thing about tech is that there are a virtually infinite number of programs that can help increase efficiency and revenue at small businesses. The bad thing is that, sometimes, too many programs can cause diminishing returns. After all, if you’re uploading data to a dozen different software programs every day, are you really saving time? Additionally, if you’re uploading the same data, over and over again, there’s a higher likelihood of data errors as well. That’s why small business owners have begun to embrace software integration. With integration, not only does software help you complete tasks, but it also communicates with your other software programs. Uploading information from a new lead? With software integration, you can simply add the information once, and it’ll be available on all your integrated programs. Employees need to communicate in order to get work done efficiently. Why can’t software do it too?

While the dream of completely seamless integrated software isn’t quite here yet, there are a number of programs tailored for small businesses that are incredibly convenient. Software like Quickbooks and Xero integrate accounting, expenses, and even employee scheduling. With these tools, small business owners are realizing just how much time, money, and effort they can save by utilizing software integration. 

Cybersecurity Risks

By now, you’ve almost certainly heard the risks of having poor cybersecurity infrastructure. Without protection, small businesses put themselves, their data, and their customers at risk every day. Thankfully, more and more small businesses have realized this risk, and have taken steps to minimize their chances of a catastrophic data breach. In fact, over half of small and medium-sized businesses now have a cybersecurity plan in place[5]. And as cybersecurity programs continue to become more available and affordable, this number is certain to rise in the coming years. While cybersecurity risks are, of course, ever-present, the rising popularity of cybersecurity solutions among small businesses is incredibly promising. Cybercrime risks are unlikely to completely disappear any time soon, but if more and more businesses begin to prioritize cybersecurity, nefarious cybercriminals will have to work harder to wreak their havoc.

Unfortunately, reality isn’t that rosy, at least not yet. While some small businesses have finally taken action to protect their cybersecurity, for many businesses, there’s still work to do. Only 9% of small businesses have cyber liability insurance. Therefore, it’s no surprise that 83% of small and medium-sized businesses are not prepared for the financial consequences of a cyberattack[5]. Ultimately, many small businesses have not reached true cybersecurity protection. While it’s great to see more small businesses finally begin to take cybercrime seriously, there’s still a long way to go. And while companies that have invested in cybersecurity can do business with peace of mind, those that haven’t will be at risk every single day.

About AXEL

No matter what industry your business is in, cybercrime poses a very real threat. At AXEL, we want to help you keep yourself (and your customers) safe from the threats of ransomware and data breaches. That’s why we created AXEL Go. AXEL Go uses military-grade encryption, blockchain technology, and decentralized servers to ensure it’s the most secure file transfer software on the market. Whether you need to transfer large files or send files online, AXEL Go is the best cloud storage solution. If you’re ready to try the most secure file-sharing app for PC and mobile devices, download AXEL Go for free here.

[1] “Small Business Technology Trends: Deloitte Us.” Deloitte United States, May 20, 2020. https://www2.deloitte.com/us/en/pages/technology-media-and-telecommunications/articles/connected-small-businesses.html

[2] Rist, Oliver. “Small Businesses Are Using AI-Sometimes.” PCMAG. PCMag, December 7, 2021. https://www.pcmag.com/news/small-businesses-are-using-ai-sometimes

[3] “Facebook Ad Revenue 2009-2020.” Statista, February 18, 2022. https://www.statista.com/statistics/271258/facebooks-advertising-revenue-worldwide/

[4] Leonhardt, Megan. “Teens Have Been Losing Interest in Facebook for Years.” Fortune. Fortune, October 26, 2021. https://fortune.com/2021/10/25/facebook-teens-usage-harm-studies/

[5] “10 Small Business Cyber Security Statistics That You Should Know – and How to Improve Them.” Cybersecurity Magazine, May 20, 2021. https://cybersecurity-magazine.com/10-small-business-cyber-security-statistics-that-you-should-know-and-how-to-improve-them/

Filed Under: Business, Tech, Trends Tagged With: cybercrime, cybersecurity, data privacy, data protection, marketing, Privacy, Security, Social Media, technology

February 18, 2022

After the Cyberattack: What Happens to your Data Following a Breach?

In 2022, cybercrime seems like everyday news. And in a way, it literally is. Simply search “data breach,” and you’ll find a wealth of businesses across the country dealing with the fallout of cybercrime. Businesses large and small fall victim to these attacks every day, putting more and more people’s personal information in jeopardy. And for consumers, your information leaking isn’t something you have to worry about for a few weeks, then move on. Because of the unique way personal data is stolen and sold, victims of data breaches have to keep an eye on their social media and bank accounts for years. 

On the business side, you’ve likely heard the horror stories of businesses losing millions of Social Security Numbers, or even having confidential documents leaked. From retail stores like Target to digital forums like Facebook, businesses from every industry have fallen victim to cybercrime. Unfortunately, this digital devilry has only become more prevalent. 2021 was the worst year on record for businesses and consumers, with nearly 6 billion accounts breached by cybercriminals[1]. There’s a decent chance even some of your personal information has been leaked without your knowledge. But if nearly 6 billion accounts across the Internet have been compromised, well, where is that information?

Where Does Your Personal Data Go?

When a data breach is reported, the most reported statistic is the number of accounts affected. Data breaches can have anywhere from a few victims, all the way up to 3 billion. When news of a breach breaks, reporters like saying that consumer data has been “leaked” or “published.” However, a more accurate term to describe a breach is that consumer data has been “auctioned off.” This is because the perpetrators of cyberattacks rarely use the data that they just stole. Rather, they simply sell your information to a multitude of low-level digital scammers, who try to make their money through simple phishing scams and the like, rather than complex cyberattacks.

Of course, stolen data can’t be sold on traditional commerce websites. And any public website that tried to sell the data would be taken down quickly for distributing a stolen good. After all, you can’t really Google “stolen data near me” and find what cybercriminals looking for. So, once all that data is stolen, where does it go on sale? On a section of the Internet few know about, and even fewer have visited: the Dark Web. 

The Dark Web is a “layer” of the Internet that can only be accessed through special software. Estimated to be almost 500 times larger than the standard web, the Dark Web is a hub for cybercriminals and their illegal activities[2]. After a data breach, the hackers will typically post about their haul on a Dark Web forum and offer the data to other users for a specific price. Depending on the price and quality of the stolen data, there could be anywhere from a few to hundreds of buyers. Even just hours after a data breach, your personal information could be in the hands of dozens of scammers all across the globe.

How Valuable is My Personal Data?

Not all data breaches are created equal, and not all information is equal either. Think about it: If you were a cybercriminal, would you want three million Twitter usernames and passwords, or one million credit card numbers? Considering Twitter logins are worth just USD $35, and credit card numbers are worth up to $240, most would choose the credit card numbers[3]. Some pieces of information are simply more valuable than others, and cybercriminals know this. That’s why, when a data breach occurs, measuring the impact solely on the number of affected accounts is inaccurate. A leaked Facebook password could cause headaches, but besides a few spam posts, it probably won’t affect your life too much. A leaked passport number, however, could lead to something as serious as identity theft.

This showcases how stolen data itself isn’t particularly valuable, and is only valuable if you know what to do with it. After all, if you hand a random passerby your Social Security Number, it’s unlikely they’ll know how to steal your identity. Unfortunately, these Dark Web cybercriminals have all the knowledge they need to cause chaos in victims’ lives. Even information as simple as phone numbers and corresponding names can be a cash cow for scammers. The disparity in value between pieces of information highlights just how wide-ranging the damage from a data breach can be. So next time there’s a major data breach in the news, don’t just look at the number of accounts affected to judge the severity. Look at what was stolen to truly determine how damaging a cyberattack is.

What About Stolen Documents?

Of course, personal information isn’t the only data that is put at risk during a cyberattack. If cybercriminals target a business, law firm, or government agency, confidential documents could be leaked as well, especially in ransomware attacks. The problem, however, is that this confidential information simply isn’t valuable to cybercriminals. Therefore, when these documents are stolen, cybercriminals often demand a ransom and threaten to publish the confidential information unless it’s paid. For businesses that suffer this type of attack, they typically only have two choices: Pay the ransom, or face a public relations (or even legal) nightmare. 

However, not all cyberattacks are typical. Some cybercriminals couldn’t care less about the money, and only seek to embarrass specific businesses. In one case, a Swiss hacker published confidential data from dozens of companies and government agencies as a protest against mass surveillance[4]. For these companies and agencies, once the hacker gets the data, it’s gone, regardless of the ability to pay a ransom. This highlights how no two cyberattacks are exactly the same. Although most hackers are in it for the money, some simply seek to make a statement, regardless of the financial consequences. That’s why, when it comes to cybersecurity, it’s important to be prepared for anything and everything.

Protect Yourself from Cybercrime

Ultimately, the best way to protect yourself from cybercrime is to prepare. Thankfully, there are simple, inexpensive ways to greatly minimize the risk of a cyberattack on you or your employer. First, encryption is everything when it comes to cybersecurity. Encryption is like splitting your files into thousands of different puzzle pieces, so even if hackers got into your network, your documents are completely illegible to the attackers. Next, updating your security software is the easiest way to mitigate risk. Cybercriminals are always on the lookout for security holes, and those holes are much more prevalent in older versions of software. Keeping your software up-to-date could be the difference between safety, and one of the worst cyberattacks in history. Just ask Equifax.

Finally, one of the best ways to consistently prevent cyberattacks is to encourage a culture of security. This means educating all employees on the risks of cybercrime and how to minimize those risks. From teaching employees how to spot phishing emails to creating an incident response plan, simply prioritizing cybersecurity before a breach is one of the best ways to prevent cybercrime. Prioritizing cybersecurity doesn’t have to be expensive or time-consuming, but it’s the key to protecting your most valuable documents and data.

About AXEL

If you and your business are ready to prioritize cybersecurity, AXEL Go is the solution for you. AXEL Go uses military-grade encryption, blockchain technology, and decentralized servers to ensure it’s the most secure file transfer software on the market. Whether you need to transfer large files or send files online, AXEL Go is the best cloud storage solution. At AXEL, we believe that privacy is a human right and that your information deserves the best protection. To try the most secure file-sharing app for PC and mobile devices, get two free weeks of AXEL Go here.

[1] Mello, John P. “Data Breaches Affected Nearly 6 Billion Accounts in 2021.” TechNewsWorld, January 18, 2022. https://www.technewsworld.com/story/data-breaches-affected-nearly-6-billion-accounts-in-2021-87392.html

[2] “After the Data Breach – What Happens to Your Data?” BlackFog, May 6, 2021. https://www.blackfog.com/after-the-data-breach-what-happens-to-your-data/

[3] Sen, Ravi. “Here’s How Much Your Personal Information Is Worth to Cybercriminals – and What They Do with It.” PBS. Public Broadcasting Service, May 14, 2021. https://www.pbs.org/newshour/science/heres-how-much-your-personal-information-is-worth-to-cybercriminals-and-what-they-do-with-it

[4] “U.S. Charges Swiss ‘Hacktivist’ for Data Theft and Leaks.” NBCNews.com. NBCUniversal News Group, March 19, 2021. https://www.nbcnews.com/tech/security/us-charges-swiss-hacktivist-data-theft-leaks-rcna448

Filed Under: Business, Cybersecurity, Privacy Tagged With: cybercrime, cybersecurity, dark web, data privacy, data protection, Privacy, Security

February 11, 2022

Has School Surveillance Gone Too Far?

When it comes to education, pen and paper simply aren’t enough these days. Even just twenty years ago, the most technology students would see in a classroom was the occasional TV cart for educational films. However, in today’s schools, classroom technology is far more than the occasional classroom movie. These days, it’s a necessity. 

Even before the COVID-19 pandemic forced classes online, education technology was revolutionizing the way students learn. From software programs like Schoology to the prevalence of SMART Boards, education technology is used in a variety of ways with one overarching goal: To help students learn and retain information better. To help achieve this goal, many schools have begun to distribute laptops and tablets to students. After all, many projects must be completed and turned in online, and issuing school laptops can ensure all students have equal access to their assignments. While this free distribution of education technology is a noble act, particularly for students who can’t afford premium technology on their own, the technology comes with a massive caveat.

In nearly all cases, school-issued technology is installed with monitoring software. While monitoring software is necessary in some capacities, like ensuring students aren’t playing games on their laptops during class, many software programs are concerningly complex. As education becomes more and more digitized, it’s fair to ask: How much should schools know about their students?

The State of Surveillance

Monitoring students during school isn’t anything new. After all, schools act as students’ guardians during the school day, so it makes sense to observe, monitor, and occasionally report students for illicit or unsafe activities. However, with the rise of technology in schools, students began to spend much of their time online. Naturally, a school’s desire to observe, monitor, and report extends to the digital world as well. Today, a wealth of software programs including Bark, Gnosis IQ, Gaggle, and Lightspeed are installed on student devices to monitor their online interactions[1]. 

And this monitoring isn’t limited to school either. Even outside of the classroom, these software programs utilize artificial intelligence and human moderators to monitor students’ private chats, documents, and emails[1]. If a student searches for something related to, say, self-harm, the software can send an alert to the school district, allowing teachers to message students within minutes. While this strategy can help prevent self-harm, family abuse, and other dangerous situations, it’s clear that student privacy is sacrificed in exchange for this goal.

With the sheer amount of surveillance that students face, few would argue that student privacy isn’t violated. The question, however, is if this sacrifice of privacy is worth it. Proponents of school surveillance argue that it helps schools keep tabs on students, so if a particular child is in danger, the school can take action. In fact, one of Gaggle’s main selling points is its claim that the software saves hundreds of lives per year[2]. While this statement may be exaggerated, the software certainly helps identify students in need quickly.

On the other hand, those against tracking argue that surveillance invades privacy and deters free speech. After all, if you know a live human is watching every email or message you send, you may be more careful about what you type. Ultimately, this tracking software expands the classroom walls to home life, making children feel like they’re being watched all day, every day. Although school surveillance works in some cases, it also has several unintended consequences.

The Harms of School Monitoring

First, the psychological harm to students from endless surveillance can not be understated. In fact, a study found that 53% of students don’t share their true thoughts online because of surveillance, and 77% say they’re more careful about what they search online[3]. After all, students aren’t dumb; they know when they’re being tracked, and would rather censor their own behaviors than potentially deal with their messages or searches being flagged. The study states:

Systematic monitoring of online activity can reveal sensitive information about students’ personal lives, such as their sexual orientation, or cause a chilling effect on their free expression, political organizing, or discussion of sensitive issues such as mental health[3].

Because of the surveillance, students are scared to have conversations about tough topics. This causes students to avoid talking about them at all to avoid potential punishment from schools.

In addition to the psychological effects, surveillance software disproportionately harms minority students as well. Artificial intelligence programs are more likely to flag language spoken by Black students[4]. This is because of the lack of minority voices during the training of the AI, and the lack of diversity in the AI field in general[5]. This issue is exasperated by the fact that Black and Hispanic students use school devices at a higher rate than white students. Additionally, surveillance AI targets LGBTQ students as well, by flagging innocent words like “gay” and “lesbian[5].” Ultimately, it’s clear that student monitoring software does not judge every student equally.

Finally, vulnerabilities found in these software programs increase the risk of data breaches and other privacy incidents. In 2020, ProctorU, a software that monitors students during tests, was breached by cybercriminals, resulting in the leak of over 440,000 students’ emails, passwords, addresses, and phone numbers[6]. More concerningly, in 2021, researchers found vulnerabilities in Netop, another student monitoring software. In this case, they found a bug that could allow hackers to install malware, or even gain access to students’ webcams[7]. At the end of the day, software like this is just another way for cybercriminals to make a quick buck while wreaking digital havoc.

Can Safety and Privacy Coexist?

Here’s the thing: Keeping tabs on students isn’t a bad thing. In fact, that’s practically the entire purpose of a school. But as education becomes more digitized, there ought to be a balance between keeping students safe and respecting their privacy. Of course, some tracking is reasonable. Kids shouldn’t be playing games during instruction, and tracking software allows schools to see who isn’t paying attention. But monitoring students at home? At that point, students feel watched all day, thus less likely to type their true feelings. And making students feel like they have to constantly hide their true beliefs and feelings isn’t a recipe for success. Safety and privacy can coexist, but right now, there are too many severe consequences associated with student monitoring software to make the sacrifice of privacy worth it.

About AXEL

No matter if you work in education, law, or business, cybercrime poses a threat to your industry. Thankfully, AXEL makes it easy to protect yourself from the threat of ransomware and data breaches. At AXEL, we believe that privacy is a human right and that your information deserves the best protection. That’s why we created AXEL Go. AXEL Go uses military-grade encryption, blockchain technology, and decentralized servers to ensure it’s the most secure file transfer software on the market. Whether you need to transfer large files or send files online, AXEL Go is the best cloud storage solution. If you’re ready to try the most secure file-sharing app for PC and mobile devices, get two free weeks of AXEL Go here.

[1] Crispin, Jessa. “American Schools Gave Kids Laptops during the Pandemic. Then They Spied on Them | Jessa Crispin.” The Guardian. Guardian News and Media, October 11, 2021. https://www.theguardian.com/commentisfree/2021/oct/11/us-students-digital-surveillance-schools

[2] Haskins, Caroline. “Revealed: How One Company Surveils Everything Kids Do and Say in School.” BuzzFeed News. BuzzFeed News, November 3, 2019. https://www.buzzfeednews.com/article/carolinehaskins1/gaggle-school-surveillance-technology-education

[3] Hankerson, DeVan, Cody Venzke, Elizabeth Laird, Hugh Grant-Chapman, and Dhanaraj Thakur. “Online and Observed.” CDT.org. Center for Democracy and Technology, September 2021. https://cdt.org/wp-content/uploads/2021/09/Online-and-Observed-Student-Privacy-Implications-of-School-Issued-Devices-and-Student-Activity-Monitoring-Software.pdf

[4] Chung, Anna. “How Automated Tools Discriminate against Black Language.” MIT Center for Civic Media, January 24, 2019. https://civic.mit.edu/2019/01/24/how-automated-tools-discriminate-against-black-language/

[5] Kshetri, Nir. “School Surveillance of Students via Laptops May Do More Harm than Good.” The 74 Million, January 19, 2022. https://www.the74million.org/article/school-surveillance-of-students-via-laptops-may-do-more-harm-than-good/

[6] Abrams, Lawrence. “ProctorU Confirms Data Breach after Database Leaked Online.” BleepingComputer. BleepingComputer, August 9, 2020. https://www.bleepingcomputer.com/news/security/proctoru-confirms-data-breach-after-database-leaked-online/

[7] McCracken, Harry. “Popular Student Monitoring Software Could Have Exposed Thousands to Hacks.” Fast Company. Fast Company, October 15, 2021. https://www.fastcompany.com/90686770/netop-student-monitoring-software-hack

Filed Under: Culture, Cybersecurity Tagged With: cybercrime, cybersecurity, data privacy, education, Privacy, schools, Security, surveillance

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Interim pages omitted …
  • Page 27
  • Go to Next Page »

Primary Sidebar

Recent Posts

  • AXEL News Update
  • AXEL Events
  • Biggest Hacks of 2022 (Part 2)
  • Biggest Hacks of 2022 (Part 1)
  • The State of Government Cybersecurity 2022
  • Privacy for the Future
  • File Sharing 101: How to Easily Share Large Files
  • Web3 Beyond Crypto
  • Your Privacy and The Internet of Things
  • Personal Vehicle Telematics and Privacy Oversights
  • Why IPFS is the Future of Internet Storage Systems
  • Protecting the workplace from Day 1 Exploits
  • How User Experience Impacts Cyber Security
  • Protecting your Privacy With End-to-End Encryption
  • Devastating Hospital Hacks
  • The Dangers of Leftover Attachments
  • How Secure Are Your Apps, really?
  • ABA GPsolo Roundtable Roundup
  • Our Continued Loss of Privacy
  • Casting a Shadow of Protection
  • Why Digital Sharding is the Future of File Storage
  • The Practical Applications of Web3
  • Archival With the Future in Mind
  • IPFS: Securing Our Privacy Future
  • What Do We Do About Social Engineering?
  • Five Simple Security Tricks
  • IPFS: The InterPlanetary Solution to Small Business Problems 
  • Schools: Our Cybersecurity Blindspot

Recent Comments

  • Anonymous on Five Simple Security Tricks

Footer

Sitemap
© Copyright 2024 Axel ®. All Rights Reserved.
Terms & Policies
  • Telegram
  • Facebook
  • Twitter
  • YouTube
  • Reddit
  • LinkedIn
  • Instagram
  • Discord
  • GitHub