Old School worked for a reason

July 2010 News & Events

The Internet has changed much of the way we work and interact. Communications with friends, family and business associates is now easier, cheaper and faster with this medium, although this may not always be true when trying to decipher the abbreviated languages young people use to communicate these days. The Net has even made security services more accessible as you can use the Internet to view a camera over your mobile phone with ease these days.

The availability of information is also vastly superior today than it was before we were all connected to the Web, although some may question the viability and the accuracy of much of that information. Blogs, for example, can be highly entertaining to read, but one has to always be aware that there are no rules for bloggers to work to. We have already seen cases where corporations have bought good reviews by giving bloggers products. Of course I would never stoop that low, mainly because no-one has offered me any cool gadgets.

Fortunately, the more successful business bloggers subscribe to journalistic principles for the specific purpose of maintaining their credibility.

Now we have social media and a bunch of people claiming this is the new way we are going to live and communicate in future. Social media is even less organised, but has a large following. Whether these social media products will have a significant impact on the business world at large again depends on whom you speak to, but their influence is being felt. Personally I do not really see the necessity of everyone knowing where I am and what I am doing at all times – that would be called BoredBook.

One of the advantages and disadvantages of social media is that information is disseminated immediately, sometimes before it is really ready to be publicised. And this ‘new age’ information flow is already seeping into traditional media. Hi-Tech Security Solutions was responsible for some irresponsible reporting recently when I wrote a column about a recent security installation. Although the column was anonymous, some parties involved in the project felt that the full picture was not conveyed and pertinent information was left out – an oversight on my part in not doing the appropriate research.

So, while social media is the cool thing these days, it is always good to remember that the Old School ways worked for a reason. Instant everything is good for coffee and chatting to your friends via Twitter, Facebook or instant messenger, but it does not always work when dealing with real-world issues that require a more focused and research-oriented approach.

That is not to say social media does not have its place. If you have any views on the relevance of social media, please let me know, we could always start a Hi-Tech Security Solutions twitter stream with the latest in security news.

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From the Editor's desk: Apathy is a cybercriminal
Technews Publishing News & Events
      Welcome to SMART Security Solutions’ first print publication of the year, the SMART Access & Identity Handbook 2025. This year’s print issue is smaller than usual, so we include some articles in the ...

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Balancing security and ease-of-use
Technews Publishing SMART Security Solutions Access Control & Identity Management Security Services & Risk Management
Fraud incidents have financial repercussions and erode consumer trust, leading businesses to become more aware, though this awareness does not necessarily translate into confidence in their identity authentication processes.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...
Integration and IoT made easy
Technews Publishing SMART Security Solutions Access Control & Identity Management
The security industry is built on silos, be it surveillance, access control, alarms and others, but integration has become a critical issue in recent years. SMART Security Solutions speaks to Integr8 Systems about its local hardware and software.

Read more...
Mobile credentials taking off
Technews Publishing SMART Security Solutions Paxton Secutel Technologies Access Control & Identity Management
Mobile smartphone access is becoming more common, with use cases ranging from Bluetooth, NFC (Near-Field Communication), or QR codes to manage secure access to commercial and personal locations.

Read more...
SMARTpod talks to Armata’s Richard Frost
Technews Publishing SMART Security Solutions Videos
SMARTpod, the podcast by SMART Security Solutions, recently spoke to Richard Frost from Armata about the company's new 'all-in-one' cybersecurity bundle designed to relieve cyber stress in the SMB market.

Read more...
From QR code to compromise
Information Security News & Events
A new attack vector involves threat actors using fraudulent QR codes emailed in PDF attachments to bypass companies' phishing security measures by requiring users to scan the code with their mobile phones.

Read more...