Cyber Security - America's Achilles Heel - Threatens People and Corporations

Cyber security has failed to keep up with the criminal element stalking the internet in search of unaware victims. Soon an exciting new generation of mind boggling technology may arrive to protect you.
By: Coltons Point Times
 
Nov. 18, 2010 - PRLog -- For over 15 years I have been writing about the Internet and cyber security, in particular the sorry state of cyber security on the Internet.  During that time internet theft, hacking and multi-billion dollar business losses have become the cost of doing business in our modern world.

The dot.com bust of 2000, just ten years ago, demonstrated how the booming Internet was way over-valued by the greed mongers on Wall Street and in less than two years Internet companies lost an astonishing 78% of their valuation sending many an investor in hot Internet stocks to the poor house.

It was the first real sign of the immaturity of the Internet corporate culture.  After ten years of progress the business plans and expanded use of the Internet have been apparent, but the evolution of cyber security has been dismal.  While processing power and software sophistication has been leaping generations ahead in recent years, computer security through legacy systems, those that have been around for years, remain stuck in first generation technology trying to meet a need far beyond the capabilities of the past.

The Internet, with it's lack of government regulation and no borders, has become the premiere and preferred method of crime in the 21st century extending from no holds barred pornography to forced child prostitution, from stealing music and movies to raiding bank and credit card accounts, from stealing proprietary corporate information to hacking into top secret government files.

So complete is the saturation of crime into the Internet that it reigns supreme in terms of bank, credit card and cell phone theft, pornography and child slavery, prostitution and illegal gambling, theft of music and movies to pedophiles stalking our children.  Yet there have been no real innovations in computer security for nearly a decade.  Then again, the legacy security providers are making billions of dollars selling virtually obsolete cyber protection so why would they change?

As General Motors and anyone involved long term in technology knows, the minute you rest on your laurels and rely on products of the past to meet future needs you become a technology Neanderthal.  Like GM, you then fall from number one in the world into the throes of bankruptcy.  In the world of cyber security, if you rely on older systems to meet new technological problems you become victims of the cyber criminals who have stayed one step ahead of existing security systems.

Are you or your children safe on the Internet?  Of course not.  Can you be safe with the right cyber security?  Of course not if it is a legacy system because it is like trying to play a digital download on an old cassette recorder.  Legacy systems were the first generation security and they are now technically obsolete.  But there are new generation security systems coming to the market that are designed to meet your needs of the future, not just the past.

Using fascinating new technologies to enhance the stealth or invisible appearance of your records and personal information, using algorithms never before in existence and incredible cloning techniques that may only be found in the most technologically advanced intelligence and defense security systems, there is hope for internet users, especially the unsuspecting youth who have become obsessed with the Internet.

We have been made aware of impending announcements of historical new achievements in Internet or cyber security that will finally make the protection of computer users the first consideration instead of the last consideration in the evolvement of computer technology.  You should watch for these announcements and check them out as it may finally give you the piece of mind that big brother and the cyber thieves may no longer control the Internet as our dependence on the Internet continues to grow at warp speed.  There are new ways of protecting your rights and records on the immediate horizon.

# # #

Ivy Hollow Media publishes the Coltons Point Times with a readership in all 50 states, DC and over 100 foreign countries. Daily articles cover politics, national and state issues, elections, the economy,and political parties from an independent view.
End
Source:Coltons Point Times
Email:***@yahoo.com Email Verified
Zip:20626
Industry:Computers, Internet, Security
Location:Coltons Point - Maryland - United States
Account Email Address Verified     Disclaimer     Report Abuse
Ivy Hollow Media PRs
Trending News
Most Viewed
Top Daily News



Like PRLog?
9K2K1K
Click to Share