“Allow App to Access Contacts?”: Corporate Data Security and Logistics
Photo credit: http://www.extremetech.com/

Photo credit: http://www.extremetech.com/

Remember when Angry Birds was all the rage among casual mobile gamers? Temple Run? Candy crush? Or maybe you prefer the more recent Flappy Bird- the concept is the same. These were apps that too the market by storm, with mobile users around the globe rushing to download them and share their scores with friends, providing viral marketing for the products. This phenomenon is not just limited to gaming apps; a friend with an interest in cooking may refer you to a recipe app, or you may discover a schedule planning app that you believe will boost your productivity. Quick question: before clicking ‘download’ how many of you take the time to really read through the permissions the app requires?

We’re guessing the answer is a resounding silence. It is this insidious loophole that makers of even the most innocent apps have taken advantage off to allow themselves to quietly slip your personal data right out of your phone. This information may be shared with advertisers or even malicious 3rd parties in a way that is perfectly legal since you signed on the virtual dotted line by ‘accepting’ the permissions required by your app of choice.

It is from here that we draw today’s logistics lesson on data security. With personal data breaches being taken so seriously that the the technology has been created to have a hack-proof phone known as the “Blackphone”, imagine how much higher the stakes are for corporate data security.

The key concern for any company, logistics firms included, is the risk of customer data being stolen or divulged. A worrying trend in cyber crime is the ‘ransom hit’. Here, companies’ client databases, containing sensitive parameters such as ID numbers, addresses and confidential information are hacked into. The hackers then threaten to release or sell this information to the highest bidder with less than moral uses for the data unless the victim company pays a certain ransom amount. Any supply chain manager would be terrified at the thought of this scenario: not only is it our responsibility to protect customer information, such a breach could cost the firm revenue as consumers would be unwilling to deal with a company that cannot safeguard their information.

Photo credit: http://www.bubblews.com/

Photo credit: http://www.bubblews.com/

In arenas where corporate competition is not guided by a code of ethics, logistics companies must be wary of competitors launching a digital attack in a bid to obtain an edge in service provision, perhaps by sabotaging relations with vendors or stealing trade secrets, although this is more common in sectors with specialized formulas to protect, e.g. soft drinks, perfumes, food industry and so forth.

Another possible type of attack on company data security involves the destruction or alteration of data, as opposed to outright theft. Here company records are preyed upon, with cyber criminals going the extra mile to delete important information, such as inventory records, or logs of payments due to the company, thereby hampering or even crippling information where no back ups were available.

Perhaps the greatest risk in this day and age of interconnected business involves spreading the blight of data tampering to corporate partners. With supply chain managers encouraged to link their systems with those of important stakeholders in the business for efficiency of information flow, where one system has been compromised, all others at risk of being corrupted.

With cyber thugs becoming more and more savvy each day, the onus is upon us in the logistics industry to stay one step ahead and fortify our online security systems. Perhaps we can start by thinking twice about downloading that hot new app with a lengthy list of permissions? Wishing you all a cautious week. 

13 Comments
  1. Pirate bay proxy safe
    Reply
    Turn free movement back on and they will follow you forward. The pirate bay is really a long term project as stated by the organization Piratbyr. Table 3 implies that intention correlated significantly challenging other variables.
  2. football
    Reply
    I all the time emailed this web site post page to all my friends, since if like to read it afterward my contacts will too.
  3. Maryann
    Reply
    I just like the valuable info you provide to your articles. I will bookmark your blog and test again right here frequently. I'm fairly sure I'll be told lots of new stuff proper here! Good luck for the following!
  4. daily deal business
    Reply
    As the admin of this site is working, no doubt very shortly it will be well-known, due to its quality contents.
  5. Carla
    Reply
    There's definately a great deal to know about this issue. I like all the points you made.
  6. 351-001 dumps
    Reply
    There are several options that you can select from cds, journals, pdf to practice exams. Our CISCO 642-832 sample test is always updated to provide you the most actual information available and this is done with the help of our Cert - Magic. • Definition & Characteristics, Principles, Processes & Concepts.
  7. Best keyword tools for beginners
    Reply
    hi!,I really like your writing so so much! proportion we be in contact extra about your post on AOL? I need an expert on this house to unravel my problem. Maybe that's you! Having a look ahead to see you.
  8. Jamison
    Reply
    The World Wide Web is an important marketing medium and to gain success in this arena a marketer should have well planned online marketing strategy. An online marketing system is the perfect way to get started online, because you get to build your list and get educated at the same time. Learn how to market your home based sewing business online and in your local community.
  9. ลดหน้าท้อง
    Reply
    Arthritis researcher Professor David Hunter, who works at the Royal North Shore Hospital in Sydney, argued that too many doctors and patients believe osteoarthritis is an inevitable consequence of ageing. This will not only help the digestion process but will also stop the snacky feeling in between meals. Include any salad vegetables and chopped fruits of your favorite.
  10. wholesale michael kors for sale
    Reply
    Oh my goodness! Awesome article dude! Thank you, However I am encountering troubles with your RSS. I don't know the reason why I cannot join it. Is there anyone else having similar RSS issues? Anyone who knows the solution will you kindly respond? Thanks!!
Leave a Comment

Your email address will not be published. Required fields are marked

This site uses Akismet to reduce spam. Learn how your comment data is processed.