Being technologically active in this age is the need of the hour, says Vaibhav Patkar, CISO at Orient Technologies

0
443
Being technologically active in this age is the need of the hour, says Vaibhav Patkar, CISO at Orient Technologies
Being technologically active in this age is the need of the hour, says Vaibhav Patkar, CISO at Orient Technologies

Use technology for the betterment of society and the world we live in.

This is an exclusive article series conducted by the Editor Team of CIO News with Vaibhav Patkar, CISO at Orient Technologies Pvt. Ltd.

With great power comes great responsibility. A proverb popularized by Spider Man comics and movies.
One might wonder about the proverb mentioned above and what it has to do with the topic of the article. Well, it is very much linked. Let me elaborate on it.

Technology has become an essential part of our lives. Whether using mobile phones to book tickets for travel or leisure activities like movies and concerts, or using smart cars or smart devices like TVs, A/C, fans, and lights, their use is imperative. We use digital technology in particular, such as phone, email, and web browser applications, to access information, be in touch with our loved ones, and also with our business associates. The list is endless. But are we using these technologies optimally, that is, for maximum benefits with minimum drawbacks? Let us look at these aspects.

Digital Citizenship: We are connected to the world almost all hours of the day through various social media platforms. We crave attention and post a lot of things on these platforms at times without realizing the consequences. Given below are some issues worth pondering.

  • Do we think, even for a moment, before we post or forward messages or news? Do we verify their authenticity as well as their source?
    • We cannot hide behind a phrase such as forwarded as received. As responsible citizens, we should not spread something we don’t know about its origins or credibility.
  • Do we really know what can happen after we post?
    • If you post your ongoing far-away vacation photos on social media, people looking out for robbery opportunities plan to break into your home merrily.
    • Sometimes these posts hurt someone or can be taken in a negative or offending manner, and your relationship with that person may get spoiled. So, be aware that everyone has a point of view of their own that may differ from yours. It is therefore essential to respect others and behave in a civilized manner.
  • Do we really know the legal consequences of what we post or tag on social media?
    • Often, we post personal and private information like our real name, phone number, address, school or college name, and so on without realizing its impact. This may put us on a tricky wicket. For instance, publishing photos of minors without their parent or guardian could land us in conflict with the respective authorities.
    • It is advised to blur the photos and avoid location tagging, especially for a minor child, without fail.
  • Do we give credit, mention, or provide a reference to the origins of somebody’s work while writing our article?
    • We do considerable research to write an article, and at times we use reference material from several sources. It is expected to provide a reference to the original article or web site that formed the basis for our work. This professional approach is usually appreciated by peers and readers in general.
    • Most often, we forward or copy and paste other people’s work and post it as our own. This is blatant plagiarism, taking away credit from someone who would have spent considerable time preparing the document in the first place.
  • Do we provide our personal information on demand to get some freebies, either knowingly or unknowingly?
    • Remember, there is nothing free in the world. You would have subscribed to some sites that provided the name of the caller every time you got a call. Yes, this is a great feature, but to get this feature, you have agreed to upload your contact list to their database at no cost to them. They can use yours and millions of other people’s contact lists to get a huge database of confirmed contact details with names, sell it off to marketing agencies at a premium, and make a huge amount of money.

Good Practices:

  • Avoid unnecessary forwarding of messages unless they are essential and to the point with checking for their authenticity.
  • Avoid posting personal information, interests, or travel schedules.
  • Check the terms and conditions of any new app or tool before accepting them.
  • Always give credit to the person or website used to prepare your article, as it is their intellectual property.
  • Don’t copy and forward anybody’s work without thinking about the likely consequences.
  • Look at the mobile settings and curtail the permissions of the apps installed to the minimum.
  • Do not install apps from any third-party stores or a link. Use only authorized stores.

Digital Wellness: We are connected to the world almost all hours of the day, leading to the potential for addiction, mental imbalance, and often neglecting real-world connections along with our physical well-being. Do we really need to engage in the tech world all the time?

  • Do we really give too much importance to social media buddies rather than physical friends?
    • There are numerous cases where people immersed in social media or in game zones day and night are often ignoring their normal routine, meeting up with family or friends, and living a make-believe life. That has its own challenges, such as social withdrawal, decreased productivity, and mental health.
  • Do we really know the effect of viewing the screen for a long time?
    • Continued exposure to computer monitors or mobile screens can lead to eye strain, dry eyes, headaches, sleep disturbances, and physical discomforts such as neck, shoulder, and back pain, along with a reduced attention span.

Good Practices:

  • Try to limit the use of mobile phones or computers for accessing social media to a minimum. It is better to have a schedule to limit access to specific timings only and ensure that you adhere to it.
  • Try to be physically connected with family and friends and enjoy those moments.
  • Avoid looking at the computer or mobile screens for a long time. Use the 20-20-201 principle with regards to digital screen viewing, namely, after every 20 minutes, take a break to look at a tree or any other object located 20 feet away for 20 seconds.
  • Take a break and get involved in some other activities away from the screen.

Digital Security: The online world provides a lot of information but comes with its share of malware and hacking attacks on individuals and corporate environments.

  • Do we all really use the right security measures for conducting our online activities?
    • We often get links for attractive offers that promise impressive returns. These are ploys by fraudsters inducing you to provide your personal information, which could lead to compromising your account details, stealing your identity, and siphoning money from your bank account.
  • Do we really use only passwords as an authentication mechanism?
    • When computers were developed, there was no need to have any formal or elaborate security mechanisms for accessing them due to their complexity and very limited options. But as this technology and its variants became simpler to operate for an ordinary user, the need for security has arisen. Since then, passwords have been used for authentication to access the required digital resources. However, due to advancements in technology, password cracking time is getting shorter. As a result, in addition to passwords, other mechanisms, such as hard or soft tokens (mobile or on a computer), along with biometrics, are being used to restrict access to the right people.
  • Do you really always update the software, like applications and operating systems?
    • Operating system and application vendors keep on updating and upgrading their products for a great customer experience and to maintain the security of the product. If any vulnerability is identified and a subsequent patch or workaround is published, then only after proper testing will the patch or workaround be implemented.

Good Practices:

  • Always use another mechanism for authentication in addition to the passwords, such as getting a passcode on your mobile phone (OTP), using some biometrics (fingerprint or retina), etc.
  • Keep your operating systems, applications, and firmware up-to-date with their respective latest patches.
  • Do not click on any links coming from unknown sources unless you are absolutely sure about them.

Digital Family Person: We conduct most of our financial transactions, even buying or selling stocks online, which is a really great and convenient way to avoid going to the bank or broker.

  • Have you nominated someone from your family, usually your spouse, parents, or similar ones, for all of your bank and demat accounts and also for your property?
    • Nowadays, it has become mandatory to have nominees defined in your bank and demat accounts, so in case of death, the account can be operated or transferred to your nominee after due process with the submission of the required documentation.
  • Have we really made any arrangements in case we are not able to use these accounts for some reason?
    • Though it may sound a bit odd, if any emergency strikes and you are incapable of conducting the online bank or trading transactions yourself, then it is really a pain to get the account reset or to be used by your nominee or heir. They often need to go through a lengthy procedure to get these accounts accessed or transferred so they can be used by them.

Good Practices:

  • Always ensure the credentials of your bank, demat, or similar accounts are known to your spouse or nominees.
  • If you don’t want to share the details now, have them written on paper and keep them in an envelope with instructions to open only if you are not available due to injury or accident or, in the worst-case scenario, death.

Being technologically active in this age is the need of the hour, but it always comes with its own advantages and disadvantages. The pointers mentioned above should act as a guideline for being a responsible citizen by using technology for the betterment of society and the world we live in.

References:

1 – https://www.healthline.com/health/eye-health/20-20-20-rule

2 – https://www.rbi.org.in/commonperson/English/Scripts/Notification.aspx?Id=47

3-https://investor.sebi.gov.in/market-nomination.html#:~:text=Nomination%20is%20a%20facility%20that,of%20demise%20of%20the%20investor

Also readUnveiling the Ethical Imperatives: Navigating the Intersection of AI and Cybersecurity

Do FollowCIO News LinkedIn Account | CIO News Facebook | CIO News Youtube | CIO News Twitter 

About us:

CIO News is the premier platform dedicated to delivering the latest news, updates, and insights from the CIO industry. As a trusted source in the technology and IT sector, we provide a comprehensive resource for executives and professionals seeking to stay informed and ahead of the curve. With a focus on cutting-edge developments and trends, CIO News serves as your go-to destination for staying abreast of the rapidly evolving landscape of technology and IT. Founded in June 2020, CIO News has rapidly evolved with ambitious growth plans to expand globally, targeting markets in the Middle East & Africa, ASEAN, USA, and the UK.

CIO News is a proprietary of Mercadeo Multiventures Pvt Ltd.