<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.gtconsult.com/blogs/tag/Technology/feed" rel="self" type="application/rss+xml"/><title>GTconsult - Blog #Technology</title><description>GTconsult - Blog #Technology</description><link>https://www.gtconsult.com/blogs/tag/Technology</link><lastBuildDate>Thu, 23 Apr 2026 07:37:02 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Sujata Excels in MS 900 Exam!]]></title><link>https://www.gtconsult.com/blogs/post/sujata-excels-in-ms-900-exam</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Sujata Thumbnail.jpg"/>With six years of experience in testing and quality control, Sujata has become highly skilled and knowledgeable in her field. Her tenure at GT for nea ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_0qtso2nASkeaKV11QKiimQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_PGlbe2GHRq-8MdioXn_yAg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_BUoaXPGuT6a4wQoivZ2KhQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_qLtAQfTvTyW_qfPP8SQXMw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qLtAQfTvTyW_qfPP8SQXMw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p align="center"><span style="font-size:22.5pt;">Sujata&nbsp;Excels in MS 900 Exam!&nbsp;</span></p></div></div></h2></div>
<div data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw"] .zpimagetext-container figure img { width: 435px !important ; height: 613.5px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw"] .zpimagetext-container figure img { width:435px ; height:613.5px ; } } @media (max-width: 767px) { [data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw"] .zpimagetext-container figure img { width:435px ; height:613.5px ; } } [data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/The%20Team/sujata-gtconsult.com.jpg" width="435" height="613.5" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="font-size:12px;"><p><span style="font-size:11pt;">With six years of experience in testing and quality control, Sujata has become highly skilled and knowledgeable in her field. Her tenure at GT for nearly two years has demonstrated her immense value as an asset to the team.&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">Driven by her desire to enhance her skills, Sujata recently embarked on a journey to improve herself further by taking the MS 900 Microsoft Fundamentals exam.&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">The MS 900 exam is specifically designed for individuals seeking to demonstrate their foundational understanding of cloud-based solutions that enhance productivity and collaboration in various settings, including on-site, at home, or a combination of both.&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div style="font-size:12px;"><p><a href="https://learn.microsoft.com/en-us/certifications/exams/ms-900/" target="_blank" rel="noreferrer noopener"><span style="font-size:11pt;">https://learn.microsoft.com/en-us/certifications/exams/ms-900/</span></a><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p><span style="font-size:11pt;"><br></span></p><div style="color:inherit;"><div><p><span style="font-size:11pt;">You might be wondering how Sujata fared in this exam. Well, it would be rather awkward if we were to write about an exam she didn't pass, wouldn't it? Fortunately, not only did she pass, but she did so with flying colors!&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">When asked about her motivation to pursue this certification, Sujata expressed her belief that it would enable her to better serve clients.&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">“If a client asks me anything about SharePoint, I can answer them smartly and confidently. Previously, I was a little bit confused when it came to the differences and the functionalities under SharePoint. Now, I know it better.”&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">She also emphasized how the certification has benefited her testing process, particularly in understanding requirements and finding improved ways to optimize SharePoint.&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><div style="color:inherit;"><div><p><span style="font-size:11pt;">Sujata's commitment to achieving her goal was evident in her rigorous exam preparation. She attributed her success to the comprehensive 500-page book &quot;Microsoft 365 Fundamentals&quot; by Craig Zacker, noting that studying this resource helped her gain a deeper understanding and ultimately pass the exam.&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">“Because I’m a tester, I don’t work in the back end, so I don’t know the coding and other stuff. That’s why this book was really helpful.”&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">Sujata also expressed gratitude towards her colleagues for their contributions to her success, including recommending study materials, offering study strategies, and providing encouragement.&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">Upon learning of her results, Sujata described her elation, admitting to feeling a bit nervous before the exam, unsure of what to expect.&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">“When I finished, I closed my eyes, opened them a little and saw, OK, I passed. I was literally dancing. And then I realized, OK, the camera is still on, they are still recording.”&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">Sujata's unwavering dedication to her work and constant pursuit of self-improvement are truly commendable. It is no surprise that she already has her sights set on the next certification, which we will undoubtedly be eager to share here.&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">Sujata, your hard work, and commitment to excellence are truly inspiring. Keep shining brightly! We eagerly anticipate witnessing your future accomplishments.&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div></div></div></div></div></div></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 01 Jun 2023 09:06:48 +0000</pubDate></item><item><title><![CDATA[Jacqui is determined to stay ahead!]]></title><link>https://www.gtconsult.com/blogs/post/jacqui-is-determined-to-stay-ahead</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Thumbnail Jax.jpg"/>Jacqui just passed her MS600 Exam!]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_e802GDSQQ0ezRKER6pQQIQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_6SFoCyoZTQyk8irxKHbZgw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_OIlMn553QmWKZnQrMH8ijQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_dg5iQBKPSgeGZ6VfOyQRhg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_dg5iQBKPSgeGZ6VfOyQRhg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>A write up on Jacqui Smit's latest achievement.&nbsp;</p></div>
</div><div data-element-id="elm_ubuM6DyDC_nBKeeGhThweg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_ubuM6DyDC_nBKeeGhThweg"] .zpimageheadingtext-container figure img { width: 385px !important ; height: 422.4px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ubuM6DyDC_nBKeeGhThweg"] .zpimageheadingtext-container figure img { width:385px ; height:422.4px ; } } @media (max-width: 767px) { [data-element-id="elm_ubuM6DyDC_nBKeeGhThweg"] .zpimageheadingtext-container figure img { width:385px ; height:422.4px ; } } [data-element-id="elm_ubuM6DyDC_nBKeeGhThweg"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Jacqui%20write%20up%20picture.jpg" data-src="/Blog%20Site/Jacqui%20write%20up%20picture.jpg" width="385" height="422.4" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">Jacqui is determined to stay ahead!</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><br></div><div>Boasting 20 years of experience in SharePoint, Jacqui Smit is definitely a force to be reckoned with within this industry. She has worked at GT for 2 years, 1 of them as a developer and the other as a software development manager. In this role, she manages the day to day with our world-class development team, ensuring that our clients get nothing but excellence from GT.</div><div><br></div><div>“Different people in the team have different types of skills, so it’s my job to know and guide them and ensure that they have the information they need to get the work done.”&nbsp;</div><div><br></div><div>Jacqui has grown and developed her skills while at GT, assimilating and internalizing GT’s mission and values, ensuring that she is able to enable productivity. She takes great pride in delivering high-quality work that meets or exceeds the expectations of her clients and colleagues.</div><div><br></div><div>With that in mind, she has often taken it in her stride to stretch herself for her own good as well as the good of our company and clients.</div><div><br></div><div><div style="color:inherit;"><div>When the opportunity arose for her to advance her skillset, it was a no brainer, Jacqui took it. The opportunity being referred to is the MS 600 exam.&nbsp;</div><div><br></div><div>The exam measures the ability to complete technical tasks such as:</div><div><br></div><div>-Design collaborative app solutions and existing app integration,&nbsp;</div><br><div>-Implement Microsoft identity,&nbsp;</div><br><div>-Build apps with Microsoft Graph&nbsp;</div><br><div>-Extend and customize Microsoft 365 with SharePoint Framework</div><br><div>-Extend Microsoft Teams</div><br><div>-Test, deploy, monitor, and maintain modern enterprise-grade app solutions.</div><div><br></div><div>https://learn.microsoft.com/en-us/certifications/exams/ms-600</div><div><br></div><div>When asked about why she decided to take the exam, Jacqui showed great understanding of her industry, in that it is rapidly evolving, and so, to remain relevant or useful in the field you need to constantly adapt and grow.</div><div><br></div><div>“In order to stay relevant in development, you have to constantly learn. The technologies are constantly changing, they are upgrading all the time.”</div><div><br></div><div>She further noted that what she learns allows her to lead her team better by imparting what she has learned and helping them to elevate their capabilities. Essentially, she believes that this achievement will not only serve her, but her colleagues and clients alike.</div><div><br></div><div>So, with that in mind, she buckled down to prepare for the exam, sacrificing time with her family and other areas of her life that required her attention in order to ensure she was successful, and all that sacrifice paid off. Sure enough, after her hard work and dedication to achieving her goal, despite the obstacles she had faced, she passed!</div><div style="color:inherit;"><div style="color:inherit;"><div>On the 22nd of March, Jacqui wrote and passed the MS 600 exam, stretching herself more for her role and career.</div><div><br></div><div>“I was super excited. I was stressing because Microsoft exams are tough. They’re not to be played around, they’re not to be trifled with at all.”</div><div><br></div><div>This is an amazing achievement that has to be acknowledged, one that highlights to the team and clients, the caliber of person they are dealing with. With this qualification (Teams Application Developer associate), Jacqui will be better equipped to lead her team and serve her clients with relevant expertise and extensive industry experience.&nbsp;</div><div><br></div><div>If that’s not enough to convince you that GT has the crème de la crème when it comes to staff, honestly, we don’t know what will.&nbsp;</div><div><br></div><div>Jacqui, is only one of the many highly talented and hardworking people who form part of the GT team. Our staff seek to achieve excellence in their work, upholding the company’s mission: To empower people and business to become sustainable and capable in an ever changing digital world, continuously challenging the status quo.</div><div><br></div><div>We are immensely proud of what Jacqui has achieved, and can’t wait to see what’s next!&nbsp;</div><div><br></div><div>Onwards and upwards, Jax!</div><br><div><br></div></div></div><br><div><br></div></div></div><br><div><br></div></div></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 29 Mar 2023 07:33:53 +0000</pubDate></item><item><title><![CDATA[Optimism is the key to 2021]]></title><link>https://www.gtconsult.com/blogs/post/optimism-is-the-key-to-2021</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.comhttps://images.unsplash.com/photo-1581090464777-f3220bbe1b8b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MXw0NTc5N3wwfDF8c2VhcmNofDR8fHRlY2hub2xvZ3l8ZW58MHx8fA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080"/>While there is a lot of optimism about 2021, managing expectations and looking towards specific areas of innovation will be the key to surviving the year.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_LhRSfD07Rni45DnymQ-3qQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Wi-c5j1YSBuOq8cfn-7p0A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_7V7SUVggTl-r7iV_sr0TEQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_l9rHhhI1Qc-MEP7fR8DbWw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">This year may not be as challenging as we think!</h2></div>
<div data-element-id="elm_PumakUXlSDCYo7-EhxS_Fg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p><img src="https://images.unsplash.com/photo-1485827404703-89b55fcc595e?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=MXw0NTc5N3wwfDF8c2VhcmNofDExfHx0ZWNobm9sb2d5fGVufDB8fHw&ixlib=rb-1.2.1&q=80&w=1080"></p><p><br></p><p style="text-align:left;"><span>Welcome back from the Festive Season break. GTconsult would like to take this opportunity to wish all of its employees, clients, and business partners all the best for 2021. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>I have no doubt in my mind that there not one single person who can comfortably say that Covid-19 <i>did not</i> impact their lives in some way or another. From remote work to self isolation and the loss of many family members and loved ones, 2020 is a year that most people will want to forget. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>There are a lot of people who are very optimistic about 2021. While optimism is goo, there is a fine line between being optimistic and unrealistically so. Most if the world is dealing with a second wave of Covid-19 infections, and until a viable vaccine is produced, the first half of 2021 may just be the third episode of 2020. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Fortunately, tech is changing the world and is making it easier to do your job. With the South African governments plans to increase access to spectrum, we are positioning ourselves as a country that could find itself at the epicentre of the explosion of the Gig Economy in Africa. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Tech will obviously play an important part in this and I read a few interesting articles about the tech that will shape the world in 2021. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>A massive step</span></b></p><p style="text-align:left;"><span>We will start in India which has long been a country that has been at the forefront of digital innovation. The Indian Express <a href="https://indianexpress.com/article/explained/covid-19-pandemic-technology-2021-7128180/">points out that</a> some of the tech that will shape the future will be a massive step for mankind. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article points out that We will be pushing the envelope in optimism if we expect to be back in office soon. Even with a vaccine, work from home has got acceptance across the world and businesses have not really seen a drop in productivity. So if last year #WFH was an act of desperation, in the new year you will see more technologies that act as enablers for remote employment at scale. We already have a host of companies that help collaboration among colleagues in real time, but we could see startups emerge with out-of-the-box ideas on creating virtual offices that take away the requirement for being in a physical space.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>There is already lot of talk about extended reality, or XR, being extended to fill the gaps in our work environment. XR is a mix of augmented reality (AR), virtual reality (VR) and mixed reality (MR) that combine the realms of the real and virtual. In a few months, you could be back sitting next to your colleagues in office, though they are spread all over the country, thanks to a 5G-powered XR headset you are wearing to work from home. Or explaining a new project to customers in a virtual boardroom as they walk around scaled-down models, moving them with virtual swipes. Companies like Qualcomm are already close to this rather confusing reality, which is already used to train people before they get to work on high-value assets.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that then a lot of bells and whistles that are impacting the very experience of work from home could get polished. For instance, laptop makers might finally start making a Full HD camera a standard feature because it has suddenly become the most important feature in the device. You could also see laptops with wireless connectivity become more common as these try to unfetter from Wi-Fi and offer a connectivity backup to those working remotely. This is where 5G could become an important part of enterprises in the coming year.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Better homes</span></b></p><p style="text-align:left;"><span>The article points out that as people the world over spend more time at home, there is a huge opportunity to offer them indoors what they are missing outside. This is why you could see a boost in how home entertainment technologies improve in the coming months. Television screens could become larger, offering immersive experiences and theatre-quality sound. We have already seen a bit of this with projectors that can create cinematic sound. This push will also come with increased affordability of better technologies. While this would mean curtains on many cinemas, new streaming services will try and cater to all kinds of content demands to cash in on the urge to be entertained.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>A lot of the smart home technology so far has been worked around scenarios where the residents would want to control gadgets from their places of work. Now with all these users stuck inside the homes, smart home software will have to improvise and improve the experiences of people who have nowhere to go, keeping them entertained, informed and healthy.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Also, expect gaming to enter our homes like never before. And no, it will not be limited to the younger ones. The segment is already in the midst of a boom thanks to the pandemic and now there will be new consoles and services that make gaming the vent for all your indoor frustrations, irrespective of age.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Health for all</span></b></p><p style="text-align:left;"><span>The article points out that your doctor is now more accessible than before, often just a tap away on an app. But these virtual consultations hit a hurdle as soon as there is a need to look at data. While smart watches and other gadgets now offer more data on different aspects of the user’s health and wellness, the quantified self is going to get more attention now. In early 2020, for instance, the Consumer Electronics Show had a lot on show around sleep technology. These products are now becoming available to people, tracking their vitals as they sleep and alerting them of anomalies as they wake up.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Expect more wearables and smart gadgets near your body keeping a tab in not just the vitals, but also alerting you of what could be the early symptom on an underlying condition. There will also be a lot more assistance in the wellness space, especially with stress management.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Boutique tech</span></b></p><p style="text-align:left;"><span>The article adds that, as our dependence on technologies increases, at least those who can afford it will start pulling out of the mainstream to subscription-based services that are niche, but offer a better quality and experience because of this. Companies are already working on products that offer a different experience from what the Internet offers for free. So you will see companies like Neeva that offer an ad-free search service and more publishers and production houses offer premium content behind a paywall.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The movement towards niches will also be a reaction to big tech, which is slowly losing user trust. While governments try to regulate how big and powerful these companies can be, the lack of trust is already moving users to scaled down environments where they are more confident of not being exploited as just a data binary.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Intelligent data</span></b></p><p style="text-align:left;"><span>The article points out that, while we have been hearing about artificial intelligence for decades, the pandemic has presented these models with use cases at unprecedented scale. As countries try to figure out how to vaccinate sizeable chunks of their populations, intelligent systems like IBM’s Watson will come into play in helping figure out the rollout of the vaccines. Since we are literally talking about everyone in the world, these are not figures that are easily manageable without help of AI-driven models. And it is not just about the vaccines: AI is already being used to alert about new Covid-18 hotspots based on early trends that are plotted against patterns seen elsewhere. Also, when there will be the question of how to tackle the surge in information demand from people as vaccinations starts, here too it could be computers that answer queries because of the sheer scale.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>A new set of gadgets</span></b></p><p style="text-align:left;"><span>the Indian Express article ends off by predicting what may change when it comes to gadgets. 2020 has been a weird year of makers of smartphones and other technologies. After a few weeks when sales dried up, most experienced a surge because of the pent-up demand. There was also the new opportunity created by online education. At the same time, a lot of the product thinking went out the window at least for a couple of years as it went down in the priority list.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>In 2021, expect smartphones and all other devices to pack more computing power because that will be what they need to focus on, more than cameras and battery life — which are not such big pain points if you are not stepping out. With Apple entering the silicon space with its M1 processor, you will see the personal computing segment undergo some revolutionary changes with rivals trying their best to catch on the processing power and battery life this new entrant can offer. So by end of the year, expect more laptops to offer all-day battery life.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>You will see folding, rolling, swivelling smartphones in the new year too, but they will stay well within the fringes and the consumers will be more bothered about the devices that will work long hours without tiring, offering good screen clarity and front cameras for video calls. There will also be a spate of affordable computing devices that try and offer a viable alternative to the budget smartphone that is now being used for online education in many households. Clearly the focus will be on the functional and not the gimmicky.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>An <a href="https://www.livemint.com/">article on livemint.com</a> has pointed to the fact that the Covid-19 pandemic has inspired tech innovation. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article pointed out that one key area, better webcams for our constant video calling, was significant. Samsung has already announced that its forthcoming Galaxy smartphone, expected in early 2021, will improve video recording and calling. We anticipate laptop makers will do the same and finally ditch their crappy, low-resolution webcams.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Portable versions of UV sanitizers for cleaning your phones and gadgets are on the way to keep in your car or your pocket. Another thing we may eventually never leave home without? High-tech masks. Expect a range of built-in features: Bluetooth and microphones (see Maskfone), a fan-powered wearable air purifier (see LG PuriCare), a mask with a UV LED (see the UV Mask). Look for air-quality sensors, contact-tracing assistance and more.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Laptops Arm Up</span></b></p><p style="text-align:left;"><span>The article pointed out that, suddenly, laptops aren’t the most boring gadget in the world. Our reliance on them for at-home work and school spurred demand the category hadn’t seen in years. (“Children, let me tell you about the Great Chromebook Shortage of 2020.&quot;) Then, in November, Apple released a MacBook Air and MacBook Pro that ditched Intel inside for Apple’s own M1 chips. The result? Machines that have never been so quiet and cool, and lasted so long on one charge.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The move from chips based on Intel’s x86 architecture to ones based on lower-powered Arm technology, like the ones inside phones, is setting the entire computing industry on a new course. Lenovo, Acer and Microsoft have begun releasing Windows or Chrome OS laptops with chips from Qualcomm, whose processors power the most popular Android phones. This will only accelerate in the coming year, with nearly every major Windows PC maker working with Qualcomm on laptops and some models even gaining 5G, said Qualcomm President Cristiano Amon.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article added that Apple, which plans to transition its entire Mac lineup to its own processors by 2022, is also expected to release a long-anticipated new iMac, among other things. And it won’t come as a surprise when more tech giants, including Amazon and Microsoft, embrace their own custom chips in everything from laptops to servers to wearables.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Reality: Assisted, Not Augmented</span></b></p><p style="text-align:left;"><span>Remember the ambitious Google Glass concept. The world was either so excited for it that they were prepared to invest heavily in a pair, or the world was bemoaning how tech was becoming massively intrusive. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ultimately, the Google Glass project failed, but that didn’t mean the end for artificial intelligence (AI). The Live Mint article rightly points out that AI will only get better over the years. When will Apple release a pair of smart glasses? Probably not 2021. And while Google made a big step in this category this summer by acquiring North, a pioneer in projection glasses, it canceled the second version of North’s glasses as it plots its future. It’s actually Facebook that declared it will launch smart glasses in 2021—and they’ll be Ray Bans.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Facebook Chief Executive Mark Zuckerbergsaid in September these glasses will be “the next step on the road to augmented reality.&quot; They won’t feature virtual objects that appear to interact with the real world. AR headsets like Microsoft’s HoloLens might deliver an immersive experience, but they’re still expensive and cumbersome.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that <i>assisted reality</i> glasses—which project text, images and even video feeds into a person’s field of view—are of more value now, says Brian Ballard, CEO of remote-expertise company Upskill. Businesses have found utility in remote video conferencing that hovers in workers’ field of view, or turn-by-turn directions they don’t have to look down to follow.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>E-commerce ≠ Amazon</span></b></p><p style="text-align:left;"><span>The article pointed out that the pandemic packed 10 years of consumer e-commerce adoption into a single quarter, and forced every company that wasn’t Amazon—especially those with large retail footprints—to scramble to offer consumers new and better ways to shop from home.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Target saw an explosion in curbside pickup from online orders, while warehouse retailer Costco reported unprecedented growth in e-commerce. Walmart launched a Prime-like membership program called Walmart+, and rapidly added features to keep up the competition. (Walmart recently eliminated order minimums and shipping fees on Walmart.com orders, and provides no-fee delivery on grocery carts totaling $35 or more.) Shopify, which powers payments for many small businesses online, expanded its own network of fulfillment centers so those businesses could get goods to customers more quickly and efficiently, without turning to Amazon.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article added that, now that fast, free shipping is table stakes and retailers recognize they won’t see the foot traffic they counted on pre-pandemic, consumers finally get an online version of an old retail staple: comparison shopping. In 2021, Amazon’s value proposition—that if it isn’t always the least expensive way to shop, it’s at least the most convenient—will be tested. Meanwhile, its market power—along with Google’s, Facebook’s and Apple’s—will continue to be the focus of regulatory scrutiny.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Return of the Trust Fall</span></b></p><p style="text-align:left;"><span>Remember doing these exercises at work team building outings. You would spend a significant amount of time praying that you didn’t have to do this exercise with the creepy man/woman four desks down from you. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The Live Mint article points out that while remote work has many advantages, building trust between employees isn’t one of them. Online, there is no water cooler, no nearby coffee shop for informal brainstorms, no place to grab a drink after work. But companies whose employees worked remotely long before the pandemic already had a solution: the off-site retreat.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Buffer, a fully remote company, gets its entire, globe-spanning team together at least once a year. Dozens of other companies whose employees work mostly or entirely at home do the same thing, which has led to a cottage industry of firms that will plan these retreats for you.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that one reason companies have embraced remote work is that it makes employees happier, but another is that it saves companies money on office space. In 2021, expect to see many of the millions of employees who have permanently shifted to remote or hybrid work piling into party buses, doing group yoga and seeking inner peace in the presence of their bosses—for far less than the cost of the rent on the offices they left behind.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>The platform contributor</span></b></p><p style="text-align:left;"><span>We have given significant focus to the gadgets what with shape 2021, and the innovation that certain companies are planning, but we cannot forget the role that technology based platforms played in 2020 and the <a href="https://www.thedrum.com/opinion/2020/12/21/the-four-technology-trends-you-need-know-about-2021-and-one-miss">influence that they will have in 2021</a>. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Blockchain</span></b></p><p style="text-align:left;"><span>The article points out that it has taken a long time for blockchain to shift centre stage, but as people increasingly trust algorithms, which it’s based on, its time has come. Decentralised finance will continue to grow over the next few years because of the increased demand for online financial products, but it will need to continually address the balance between decentralisation, security and scalability.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Increasingly, government bodies are leveraging blockchain for their activities, moving from incredulity to embracing the technology. With this, we’re going to see regulation surrounding blockchain become ever more pronounced. Our client Block.one reported this year that Google Cloud is taking steps to become a network block producer, a sign that the world’s largest companies are committed to ensuring that information on public blockchains is secure. In five years time, using blockchain could feel about as edgy as banking with HSBC.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Customer learning experience</span></b></p><p style="text-align:left;"><span>The article adds that consumer sales have seen major disruptions in 2020 due to Covid-19 and new restrictions the pandemic has brought to in-person interactions. Businesses have been pushed to accelerate adoption of digital solutions as replacements for traditional aspects of the sales cycle. Attracting and educating customers on the benefits of specific products and features has required a digital-first approach, with e-commerce solutions integrating video, webchat and even augmented reality. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>For complex products that require training, including consumer electronics, automotives and software, companies are investing in Learning Management Systems - or tailored equivalents designed to meet the goals of their specific learning experience- to provide customers with instructive content. These LMS solutions allow businesses to create custom branded courseware, training programs, documentation and video guides to deliver complete digital learning experiences. The article adds that, with big data and analytics, companies can implement in-depth tracking of customers on their learning journeys to rapidly gain insights and improve their offerings.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>As restrictions on in-person shopping and in-person learning begin to relax in the post-pandemic future, digital learning experiences for customers will continue to grow in popularity, with new opportunities to enhance e-commerce and post-purchase experiences.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Cloud-based tech</span></b></p><p style="text-align:left;"><span>The article points out that the world shifted irreversibly in 2020 as so many of us migrated from our old workspaces to predominantly work from home. Beyonders scattered far and wide; I now head up technology from our Lisbon hub. That, of, course, is only possible with greater use of cloud-based technology, including workplace applications.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>With the rise in ecommerce we’re seeing cloud-based platforms pushed and we’ll see their full potential through 2021 and beyond. Cloud native technology will continue to power digital transformation: by the end of 2021 60 per cent of companies will leverage containers on public cloud platforms and 25 per cent of developers will leverage serverless, according to predictions from ForresterNow Predictions 2021: Cloud Computing report.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that technology design is evolving in tandem and we’re building modular, composable architectures that can shift and transform in an agile way, not dissimilar to how we build multi platform, multi stack software. As Google Cloud Partners, we design our composable architectures with plenty of flexibility, but primarily with people in mind.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Cautious optimism</span></b></p><p style="text-align:left;"><span>We mentioned at the beginning of the blog post that most people will need to manage their expectations of 2021. And this is not a bad thing as it is likely going to be a challenging year. However, there are <a href="https://www.geekwire.com/2021/2021-predictions-leaders-tech-life-sciences-investing-government-look-year-ahead/">some global tech leaders</a> who feel that 2021 will be a good year for tech innovation. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Magdalena Balazinska, professor and director of the Paul G. Allen School of Computer Science &amp; Engineering at the University of Washington</span></b></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><i><span>How will this year’s events — the pandemic, social justice movements, economic recession — affect the technology industry in 2021? While the COVID-19 vaccines are rolling out and providing us with hope that 2021 will be a better year than 2020, we are not out of the woods yet and we should plan for 2021 being fundamentally a highly disrupted year.</span></i></p><p style="text-align:left;"><i><span>&nbsp;</span></i></p><p style="text-align:left;"><i><span>That said, if we consider 2021 and perhaps a little beyond, I would say that:</span></i></p><p style="text-align:left;"><i><span>&nbsp;</span></i></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span></span><i><span>2020 really demonstrated that working from home can be effective in many industries. I expect that the tech industry will be rethinking their long-term policies regarding working from home and hiring remote employees;</span></i></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span></span><i><span>Diversity, equity, and inclusion will remain high priorities for the technology industry, and for academia;</span></i></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span></span><i><span>The tech industry has contributed to polarization through the various social media platforms that we developed. Our next step in 2021 needs to be on developing tools to help bring people together;</span></i></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span></span><i><span>The tech backlash is real. The industry needs to take this challenge seriously — to become a rising tide that lifts all boats, not just the captain’s barge.</span></i></p><p style="text-align:left;"><i><span>Software engineers will increasingly question the technology they are developing and the business models of the companies they are working for. Graduates will consider not just the salary but also the type of product that a company is creating, their DEI statement, and more when they choose their employment.</span></i></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Leslie Alexandre, president and CEO of Life Science Washington</span></b></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><i><span>What will be the most pressing issue facing the tech industry in 2021? Again, speaking from a biotech/life science perspective … we are witnessing breathtaking innovation in new treatments — and even some cures — for horrible diseases and conditions thanks to a new generation of platform technologies, such as gene editing and other cell therapies. These treatments are improving the quality of life for thousands of Americans every day, but come at a very high price tag, commensurate with the costs of their development.</span></i></p><p style="text-align:left;"><i><span>&nbsp;</span></i></p><p style="text-align:left;"><i><span>As a society, if we want broad access to these life-saving treatments, we must figure out how to pay for them. And as an industry, we must come to the table with sound policy options that facilitate continued investment in innovation and a resolution to drug pricing issues that are becoming barriers to that investment.</span></i></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Peter Lee, CVP of Research and Incubations at Microsoft</span></b></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><i><span>The most overhyped technology of 2021: I guess three of the technologies that are always mentioned on these “most overhyped” lists are blockchain, virtual reality, and self-driving cars. Blockchain and VR are getting a lot of new hype, with blockchain mentioned in areas like vaccine credentials, and VR to make home isolation more fun. But as great as they are, both probably need more time to flip from hype to hot. And self-driving cars, well, while we may actually see some really interesting products hit the market in 2021, there is a lot less driving going on nowadays. We’ll want to revisit all three in 2022…</span></i></p><p style="text-align:left;"><i><span>&nbsp;</span></i></p><p style="text-align:left;"><i><span>Advice to startups and entrepreneurs for 2021: Think of the three phases of a global crisis: Response – Recovery – Resilience. If 2020 was about Response, 2021 will be about Recovery. Your company/investment needs to be relevant to that. But even more important is to think about the technologies you are developing for the next long phase, which is about Resilience for the future.</span></i></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>GTconsults view</span></b></p><p style="text-align:left;"><span>From a GTconsult perspective, we are convinced that Cloud Computing and AI will be big innovators during the year. With this comes the need to increasingly trust technology and see it as innovative and enabling rather than intrusive and overbearing. We applaud Governments view on spectrum and hope that this project can gain significant momentum. This will see new tech startups and entrepreneurs who can not only grow our economy, but provide a future for their families.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>We also hope that technology will improve access to healthcare as well as innovative ways to diagnose and treat diseases. We are seeing how tech is playing a role in the Covid-19 vaccine, but we need to see these advancements take place more rapidly. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="color:inherit;"></span></p><p style="text-align:left;"><span>Finally, technology <i>must</i> play a role in education. We have already seen the beginning of it in remote teaching and many students have adapted well to the new normal that has been placed on them. We now need to advance this. Coding needs to be taught at school and students need to be given the skills to prosper in the Gig Economy. If we can get this right, 2021 will be a good year.&nbsp;</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 03 Jan 2021 08:16:51 +0000</pubDate></item><item><title><![CDATA[Is cyber security still just a fad?]]></title><link>https://www.gtconsult.com/blogs/post/Is-cyber-security-still-just-a-fad</link><description><![CDATA[g&nbsp; This is the last week of Cyber Security Awareness Month, and hopefully you have navigated it with any incident. &nbsp; Risk management plays an i ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_2L32EXdTQgKydpDzmAbWXQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_yHK4fP1qQByOjroTd4VAOg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ZUzXvOZmTbu3Zx-ua0bNag" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_yhBEDDFMRVGUm-3UIJM1yA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true"></h2></div>
<div data-element-id="elm_2VXzld2qSxOhHxpeUScgSQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><img src="https://images.unsplash.com/photo-1586772002345-339f8042a777?ixlib=rb-1.2.1&q=80&fm=jpg&crop=entropy&cs=tinysrgb&w=1080&fit=max&ixid=eyJhcHBfaWQiOjQ1Nzk3fQ">g&nbsp;</p><p style="text-align:left;">This is the last week of Cyber Security Awareness Month, and hopefully you have navigated it with any incident.<br></p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Risk management plays an important role in the financial services industry. Insurers and credit providers take a serious look at risk and invest a lot of time and capital in developing models that will address the identified risk. It gives them an idea of where they are and where they need to be. Its true benefit can be seen in achieving identified deliverables. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Risk management also plays a significant role in the technology industry. However, because of the nature of the evolution of this risk, models need to be fluid and have to be extremely adaptable.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Serious complexity </b></p><p style="text-align:left;">Let’s revisit the financial services industry for a second. The reason why risk management plays an important role in this industry is that it is an effective way to address risk. This is only true because the risks that the industry faces haven’t changed much over the past ten years. The reason why risk management in the technology space becomes a challenge is because cyber security is <a href="https://www.forbes.com/sites/elenakvochko/2020/10/25/why-cyber-security-is-still-so-complex/#4bffb47ef974">seriously complex</a>. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that consumers, businesses, and entire systems all over the world are under threat on a daily basis. Valuable personal and financial information is exposed and ready for the taking. Simple tasks like using a credit card, a phone, or a computer provide an opportunity to take our money, our identities, and your ways of life. Data breaches are capable of rendering large, powerful companies vulnerable.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">As the world evolved and became more technological, attacks evolved along with the new developments. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>A new window to climb through</b></p><p style="text-align:left;">The article points out that when humans learned to domesticate animals and grow food, larger settlements were established and societies started to flourish in multiple locations across the world. </p><p style="text-align:left;">Sedentary societies then placed value not only in food and clothing, but in things such as cattle, crops, land, houses, and machinery. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Commerce was created, value was placed on a new concept - money. Goods were then exchanged for precious metals such as gold, silver, and bronze in the form of coins and paper money years later. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that the value of money prompted societies to create impenetrable fortresses and sophisticated vaults to keep valuables away from the hands of criminals.&nbsp; As societies became more complex, both crime and remediation efforts evolved along with them. Before the rise of computers, trespasses were much easier to prevent. All we had to do was keep a door locked. The internet has given a new window to climb through for digital assets.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">This tells us that security has also evolved alongside attacks to give rise to holistic security. Today, digital assets have the highest value. Our neighbourhood is now the entire globe. In response to this new type of cyber criminal, organizations have developed an equally evolved security system. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Be prepared!</b></p><p style="text-align:left;">The article points out that, because of our daily interaction with connected devices, computers, smartphones, and tablets, it’s important that everyone - from the CEO and software developers to suppliers and employees - to be aware. Everyone can play an important part in keeping information safe. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that ransomware has become a headache for businesses and individuals alike. This type of attack can hold data hostage via encryption, which is the process of converting data into unreadable code to prevent access, until the victim pays a large amount of money to get the description keys. Organizations can fall victim to ransomware through drive-by downloads and phishing emails. Millions of people around the world reported encounters with ransomware.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">While attackers are finding new, innovative ways to threaten the security of an organization, holistic and complete security will give enterprises a chance to fight against any attack and protect their data.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that everyone in the company should have the following questions in mind:</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>CEOs; how secure is your company? What risks are you exposed to?</p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>Technical Teams; how can you make data easy and accessible to your team without compromising security?</p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>Product Owners; at what stage do you integrate security? And </p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>Employees; what is your role in cybersecurity? What can you do to protect your company’s data?</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that it is important for cybersecurity to be a company-wide approach - a combination of people, processes and tools. Organizations should develop security operation centres, which are intelligence-led and are focused on creating high-level defence, cyber hygiene, education, and awareness.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The goal? To stress-test your systems, identify, contain and remediate the negative impact fast.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Cyber literacy</b></p><p style="text-align:left;">When my parents were at school, my mom had to do typing lessons as a school subject. It was the same for me when I was at school where a module of Computer Literacy Classes focused on typing. Spoiler alert, I still type with a single finger on each hand looking at the keyboard the whole time. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">We digress. There is a significant push for subject matter such as coding and cyber security to be included in computer literacy classes in classrooms around the world. Cyber risk literacy should be <a href="https://www.helpnetsecurity.com/2020/10/27/cyber-risk-literacy/">part of every defensive strategy</a>.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that while almost 95% of cybersecurity issues can be traced back to human error, such as accidentally clicking on a malicious link, most governments have not invested enough to educate their citizens about the risks, according to a report from the Oliver Wyman Forum.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Cyber risk literacy of the population</b></p><p style="text-align:left;">The article adds that cyber literacy, along with financial literacy, is a new 21<sup>st </sup>century priority for governments, educational institutions, and businesses.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Cyberattacks are now one of the fastest growing crimes globally and are expected to cost organizations more than $600 billion dollars a year by 2021,” Paul Mee of the Oliver Wyman Forum told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“The situation has become even more pressing during the pandemic as our reliance on the internet has grown. Yet many citizens still lack the basic skills to keep themselves, their communities, and their employers safe.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Fifty geographies were assessed, including the European Union, on the present cyber risk literacy of its population, and the nature of related education and training available to promote and enable future cyber risk literacy.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that the index measures five key drivers of cyber risk literacy and education: the public’s motivation to practice good cybersecurity hygiene; government policies to improve cyber literacy; how well cyber risks are addressed by education systems; how well businesses are raising their employees cyber skills, and the degree to which digital access and skills are shared broadly within the population.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>How are assessed countries doing?</b></p><p style="text-align:left;">The article added that Switzerland, Singapore and the UK topped the list because of their strong government policies, education systems and training, practical follow through and metrics as well as population motivation to reduce risk.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Switzerland, the number one ranked country, has a comprehensive implementation document that lays out specific responsibilities along with what national or provincial legislation is required. Specific milestones are set, and timelines are assigned to ensure accountability regardless of who oversees the government.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Singapore, which is ranked second, has prioritized cybersecurity education efforts from early childhood to retirees. It established the Cyber Security Agency of Singapore to keep its cyberspace safe and secure. Its cyber wellness courses occur over multiple grades and focus on social and practical safety tips such as understanding cyber bullying.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that The UK ranked third, has the most integrated cyber system because it incorporates cyber risk into both primary and secondary education. The UK’s National Cyber Security Strategy of 2016-2021 is also one of the strongest plans globally. The US ranked 10th.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Countries that rank lower lack an overall national strategy and fail to emphasize cyber risk in schools. Some countries in emerging markets are only beginning to identify cybersecurity as a national concern.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Governments that want to improve the cyber risk literacy of their citizens can use the index to strengthen their strategy by way of adopting new mindsets, trainings, messaging, accessibility and best practices,” Mee told helpnetsecurity.com. “With most children using the internet by the age of four, it is never too early to start teaching your citizens to protect themselves.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Problematic issues</b></p><p style="text-align:left;">Another article by helpnetsecurity.com pointed out that cybersecurity <a href="https://www.helpnetsecurity.com/2020/10/23/cybersecurity-is-failing-due-to-ineffective-technology/">is failing due to ineffective technology</a>.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">A failing cybersecurity market is contributing to ineffective performance of cybersecurity technology, a Debate Security research reveals.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that, based on over 100 comprehensive interviews with business and cybersecurity leaders from large enterprises, together with vendors, assessment organizations, government agencies, industry associations and regulators, the research shines a light on why technology vendors are not incentivized to deliver products that are more effective at reducing cyber risk.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The report supports the view that efficacy problems in the cybersecurity market are primarily due to economic issues, not technological ones. The research addresses three key themes and ultimately arrives at a consensus for how to approach a new model.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Cybersecurity technology is not as effective as it should be</b></p><p style="text-align:left;">The article pointed out that 90% of participants reported that cybersecurity technology is not as effective as it should be when it comes to protecting organizations from cyber risk. Trust in technology to deliver on its promises is low, and yet when asked how organizations evaluate cybersecurity technology efficacy and performance, there was not a single common definition.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Pressure has been placed on improving people and process related issues, but ineffective technology has become accepted as normal – and shamefully – inevitable.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>The underlying problem is one of economics, not technology</b></p><p style="text-align:left;">The article added that 92% of participants reported that there is a breakdown in the market relationship between buyers and vendors, with many seeing deep-seated information asymmetries.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Outside government, few buyers today use detailed, independent cybersecurity efficacy assessment as part of their cybersecurity procurement process, and not even the largest organizations reported having the resources to conduct all the assessments themselves.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">As a result, vendors are incentivized to focus on other product features, and on marketing, deprioritizing cybersecurity technology efficacy – one of several classic signs of a “market for lemons”.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Coordinated action between stakeholders only achieved through regulation</b></p><p style="text-align:left;">The article pointed out that, unless buyers demand greater efficacy, regulation may be the only way to address the issue. Overcoming first-mover disadvantages will be critical to fixing the broken cybersecurity technology market.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Many research participants believe that coordinated action between all stakeholders can only be achieved through regulation – though some hold out hope that coordination could be achieved through sectoral associations.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article added that, in either case, 70% of respondents feel that independent, transparent assessment of technology would help solve the market breakdown. Setting standards on technology assessment rather than on technology itself could prevent stifling innovation.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Defining cybersecurity technology efficacy</b></p><p style="text-align:left;">The article pointed out that participants in this research broadly agree that four characteristics are required to comprehensively define cybersecurity technology efficacy.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">To be effective, cybersecurity solutions need to have the capability to deliver the stated security mission (be fit-for-purpose), have the practicality that enterprises need to implement, integrate, operate and maintain them (be fit-for-use), have the quality in design and build to avoid vulnerabilities and negative impact, and the provenance in the vendor company, its people and supply chain such that these do not introduce additional security risk.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“In cybersecurity right now, trust doesn’t always sell, and good security doesn’t always sell and isn’t always easy to buy. That’s a real problem,” Ciaran Martin, Advisory Board Member at Garrison Technology told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Why we’re in this position is a bit of a mystery. This report helps us understand it. Fixing the problem is harder. But our species has fixed harder problems and we badly need the debate this report calls for, and industry-led action to follow it up.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Company boards are well aware that cybersecurity poses potentially existential risk, but are generally not well equipped to provide oversight on matters of technical detail,” John Cryan, Chairman Man Group told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Boards are much better equipped when it comes to the issues of incentives and market dynamics revealed by this research. Even if government regulation proves inevitable, I would encourage business leaders to consider these findings and to determine how, as buyers, corporates can best ensure that cybersecurity solutions offered by the market are fit for purpose.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“As a technologist and developer of cybersecurity products, I really feel for cybersecurity professionals who are faced with significant challenges when trying to select effective technologies,” said Henry Harrison, CSO of Garrison Technology told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“We see two noticeable differences when selling to our two classes of prospects. For security-sensitive government customers, technology efficacy assessment is central to buying behaviour – but we rarely see anything similar when dealing with even the most security-sensitive commercial customers. We take from this study that in many cases this has less to do with differing risk appetites and more to do with structural market issues.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Be cyber smart</b></p><p style="text-align:left;">Cyber security is advancing at a rapid rate. Companies are no longer able to keep a constant eye on their employees and offer the protection that they need. a measure of this responsibility rests on the shoulders of <a href="https://www.dqindia.com/5-cybersecurity-tips-secure-data-become-cybersmart/">those below board level</a>. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Use a strong password</b></p><p style="text-align:left;">The article points out that having to manage a large number of applications and software, the easiest option for most users would be to pick a password that is easy to remember, and then apply it across the board. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">While this might be a convenient option, it is definitely not the safest. Cybercriminals these days use tools that sniff out passwords reused on other sites to make their work easier and to make the stolen passwords and data more lucrative on the dark web. Hence, it is recommended that you choose strong passwords, using different alpha-numerical combinations, as well as change them periodically.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Opt for two factor authentication</b></p><p style="text-align:left;">The article adds that the rule of thumb should be when creating any digital account, always set up two-factor authentication (2FA). </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">It’s a common practice to login to accounts using multiple devices, most often of colleagues, or people we trust. Just trusting the person is never enough. It is their machines that you must trust. In case, you have logged into a network on a PC with malware, you are essentially letting cybercriminals access your data. In such cases, having 2FA, helps to prevent egregious attacks where a cybercriminal tries to login to your account and steal your data.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Safeguard your entry points</b></p><p style="text-align:left;">The article points out that all it takes is one weak entry point, to allow a cybercriminal access to your entire network. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">By forgetting to close down the access points that are not being used, this can be an open door for hackers to enter, and place malware on to your network.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Lookout for signs of a scam</b></p><p style="text-align:left;">The article points out that phishing attacks have become increasingly common these days, and are using several tactics to target vulnerable users. At the same time, there are often several tell-tale signs of a scam in the making, which you can easily spot, if you keep a sharp lookout for them. For example, emails with improper grammar, and spelling mistakes are one of the biggest giveaways. Additionally, links that promise freebies and then request you to enter card details too are illegitimate.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Frequently update your system</b></p><p style="text-align:left;">The article adds that inexpensive home internet devices are prime targets for hackers. A best practice is to update these frequently, and apply all security patches quickly. In the case of older devices, which no longer receive firmware updates, they should be immediately switched out for newer models, to prevent hackers from controlling traffic through routers, and implementing various attacks.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Cybercrime is advancing at a rate which we can no longer afford to take lightly, or ignore. No organization or user today can be considered too small to be a potential victim, hence there is a strong need to create awareness on phishing or targeted attacks. Furthermore, the increased dependence on technology to stay connected, and ensure business continuity, has opened the floodgates to a whole new set of potential cybersecurity vulnerabilities that users must be conscious of. By practising these simple tips and maintaining good IT hygiene, we can be cybersmart, and safe on the internet.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">There are other helpful, yet simple, <a href="https://whnt.com/news/online-safety-tips-for-national-cyber-security-awareness-month/">tips to follow</a>: </p><p style="text-align:left;">- increase your online privacy. Protect your online accounts by implementing multifactor authentication and using strong passwords, which consist of letters, numbers and special characters. Individuals should also refrain from accessing banking information or making online purchases when connected to an unsecured public network;</p><p style="text-align:left;">- stay secure while you work. As more employees work virtually during the COVID-19 crisis, they should be more vigilant about internet scams and online fraud. Business and personal information should be treated with the same care; avoid sharing it with unfamiliar parties or over unsecured networks. It is important to keep the security software on your business devices up to date, because only one employee needs to be compromised for an entire organization to experience a data breach;</p><p style="text-align:left;">- use social media responsibly. Social media is a great way to connect with friends and family, but it can also allow scammers and cybercriminals to target you. Only accept friend requests from people you trust, avoid clicking links in messages from strangers, and refrain from posting your personal information online. Remember to be careful about what you share. Remember, there is no “delete” button online.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><span style="color:inherit;"><span style="font-size:11pt;">“The responsibility to fight cyber crime is upon all of us. We cannot stand back and say that it should be an issue that needs to be tackled at board level. We are all exposed and we can all take a stand against this. Simple interventions, and being aware, can definitely go a long way to address this. Are you going to play an active role?” asks Craig Tarr, CEO of GTconsult.&nbsp;</span></span><br></p></div>
</div><div data-element-id="elm_0nA7lU8VRRKuqFetk31NYQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 27 Oct 2020 08:38:59 +0000</pubDate></item><item><title><![CDATA[The Weakness We Are Ignoring]]></title><link>https://www.gtconsult.com/blogs/post/the-weakness-we-are-ignoring</link><description><![CDATA[We are living in an ever increasingly connected world. Not only are we engaging with each other in traditional methods, but we are increasingly engagi ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_p5I12zPhR-OC4CO-rS2NSw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ncckjAnEQJi4vXbKu-QgdA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_gFtdrioWQMCJLPo09z3PRQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_PF8ZOCc_SEy8dsI6uLossw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><p></p><p>We are living in an ever increasingly connected world. Not only are we engaging with each other in traditional methods, but we are increasingly engaging with each other using technology.</p><p>This is not a bad thing, don’t get me wrong. I am not saying that we need to start creating a movement to plunge us back into the dark ages of having no technology. What I am saying though is while we are living in a world of unparalleled technological brilliance, we are opening ourselves up to new risks by adopting technology on the scale that we are at the moment.</p><h4 id="theweaklink">The weak link</h4><p>One of these new risks that technology has brought about is cyber terrorism and cyber crime. Hardened criminals no longer have to roam the streets with a gun or a knife; they can sit in a room with a laptop and cause just as much damage as the best bank robber.</p><p>What role does the internet of things (IoT) play in this? In a recent interview with enterpriseinnovation.net, Wally Lee – Principal Cyber Architect from Quann – shared his insights on the current state of IoT security today.</p><p>Because IoT devices connect to the internet, a significant risk exists. The significantly expanded threat surface has increased the vulnerability of enterprises and their networks.</p><p>“Not only are things now talking to each other, but the people are talking more and more through machines, resulting in the enormous amount of data generated. As more data is gathered, it is presumed that more security patches will become available as the number of entry points for cyber criminals only appears to be rising,” said Lee.</p><p>However, most IoT devices are highly vulnerable to cyber attacks. Lee added that right now, attackers are having a lot of success simply exploiting known credentials, such as default usernames and passwords or hard coded backdoors because they know that 70% of IoT devices contain inherent vulnerabilities, such as insufficient authorisation requirement, lack of in-transit encryption, insecure web interface, and inadequate software protection.</p><h4 id="moresophistication">More sophistication</h4><p>The article references a report from Gartner which forecasts that 8.4 billion connected things will be in use worldwide in 2017 and will reach 20.4 billion by 2020. This means that attack surfaces will be expanded dramatically. Also, the accelerated adoption of cloud-based computing, storage, processing, and even infrastructure adds complexity to the security of IoT.</p><p>The enterpriseinnovation.net article pointed out that the weakest link in cloud security is not in its architecture per se but the millions of remote devices accessing cloud resources. Given the potential for both mayhem and profit, we expect that more sophisticated attacks will be designed to exploit the weaknesses in the IoT communications and data gathering chain – endpoint devices. Gartner also predicts that by 2020, more than 25% of identified enterprise attacks will involve IoT.</p><h4 id="attackpotential">Attack potential</h4><p>Again, the purpose of this article is not to scare people away from technology, we need to be aware of the risks we face so that we know what we need to do when we are building up our defences.</p><p>Lee was asked about the potential impact an IoT based cyber attack can have, his answer was eye opening.</p><p>“In 2013, a dam in New York suffered a cyber-attack by Iranian hackers. The attackers only managed to breach the back office systems, through a cellular modem. But had they hacked into the operational systems of the somewhat small dam – just 20 foot tall – and remotely opened its sluice gate, 140 structures could have affected. A flood in 2007 caused more than $80 million in damages. Speculation was that this attack on an obscure dam was a practice run for a large-scale attack,” said Lee.</p><p>He added that in the Ukraine, three power distribution centers were hit in a coordinated attack, taking down power grids and leaving 230 000 residents in the dark for one to six hours. The attack was carefully planned and took down backup power supplies as well. These power centres were not unprotected. They were well-segmented with robust firewalls. But it was the remote access that workers use to log into the SCADA network that proved to be their undoing. During the attack, the hackers overwrote firmware on critical devices at 16 of the substation, leaving them unresponsive to remote commands, even six months after the attack.</p><p>Finally, the article pointed out that in Singapore, connected devices control critical functions as well. The patients’ real time health condition can be monitored remotely, and should there be warning signs of medical emergencies, alerts can be sent to care providers. Some IoT health equipment can also disperse medication autonomously based on real-time analysis of a patient’s health status. Should these devices be hijacked and their data tampered with, the subsequent medical intervention would be affected and incorrect, resulting in severe consequences for the patients.</p><h4 id="thefutureofsecurity">The future of security</h4><p>So, it is clear that we need to beef up security when it comes to IoT devices and risks. What is the future of this?</p><p>Lee said that fundamentally, IoT, IT and OT devices are similar in that they are now highly interconnected. Each of them can be used to deliver payloads.</p><p>“IoT devices are just beginning to be exploited. The variety of devices, OS’s and versions provide a near-term resistance to attacks because only a few companies have a large enough installed base to attract cyber thieves. Enterprises have several options available for managing security issues that IoT devices and networks introduce, such as access control and network segmentation. On the other hand, consumers have none,” said Lee.</p><p>As predicted by Gartner, through 2018, over 50% of IoT device manufacturers will not be able to address threats from weak authentication practices. We foresee that IoT devices will still remain the weakest link IoT security in the near future unless IoT manufacturers take immediate and direct action to enhance the security of their devices at the design stage.</p><p>The article ended off by saying: if IoT manufacturers fail to secure their devices, the impact on the digital economy could be devastating.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 28 Aug 2017 15:35:11 +0000</pubDate></item><item><title><![CDATA[Understanding the Technology Risks Landscape]]></title><link>https://www.gtconsult.com/blogs/post/understanding-technology-risks-landscape</link><description><![CDATA[Understanding the Technology Risks Landscape The emerging technologies of the Fourth Industrial Revolution (4IR) will inevitably transform the world in ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_xzMDMjKNSlq1t06h6vHWug" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_NYuTZJBLRdOuRjSSzQfvtQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_4b2A0autRW2ret0uIyt20Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_IdM9eS0lQZ-RqeDJGzFTyA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><h3 id="understandingthetechnologyriskslandscape">Understanding the Technology Risks Landscape</h3><p>The emerging technologies of the Fourth Industrial Revolution (4IR) will inevitably transform the world in many ways – some that are desirable and others that are not.</p><p>The extent to which the benefits are maximized and the risks mitigated will depend on the quality of governance – the rules, norms, standards, incentives, institutions, and other mechanisms that shape the development and deployment of each particular technology.</p><p>This was the preamble of the recently released World Economic Forums Global Risk Report (GRR). The report lists a number of risks but discusses technology disruption in depth as it is one of the most pertinent risks we face today.</p><h4 id="extremedebates">Extreme debates</h4><p>Too often the debate about emerging technologies takes place at the extremes of possible responses: among those who focus intently on the potential gains, and others who dwell on the potential dangers.</p><p>The report points out that the real challenge lies in navigating between these two poles: building understanding and awareness of the trade-offs and tensions we face, and making informed decisions about how to proceed.</p><p>This task is becoming more pressing as technological change deepens and accelerates, and as we become more aware of the lagged societal, political and even geopolitical impact of earlier waves of innovation. Over the years, The Global Risks Report has repeatedly highlighted technological risks. In the second edition of the Report, as far back as 2006, echoes of current concerns were noted in one of the technology scenarios we considered, in which the “elimination of privacy reduces social cohesion”. This was classified as a worst-case scenario, with a likelihood of below 1%. In 2013, the Report discussed the risk of “the rapid spread of misinformation”, observing that trust was being eroded and that incentives were insufficiently aligned to ensure the maintenance of robust systems of quality control or fact-checking. Four years later, this is a growing concern.</p><h4 id="governancedilemmas">Governance Dilemmas</h4><p>How to govern emerging technologies is a complex question. Imposing overly strict restrictions on the development of a technology can delay or prevent potential benefits. But so can continued regulatory uncertainty; investors will be reluctant to back the development of technologies that they fear may later be banned or shunned if the absence of effective governance leads to irresponsible use and a loss of public confidence.</p><p>The GRR points out that, ideally, governance regimes should be stable, predictable and transparent enough to build confidence among investors, companies, and scientists, and should generate a sufficient level of trust and awareness among the general public to enable users to evaluate the significance of early reports of negative consequences. For example, autonomous vehicles will inevitably cause some accidents; whether this leads to calls for bans will depend on whether people trust the mechanisms that have been set up to govern their development.</p><p>But governance regimes also need to be agile and adaptive enough to remain relevant in the face of rapid changes in technologies and how they are used. Unexpected new capabilities can rapidly emerge where technologies intersect, or where one technology provides a platform to advance technologies in other areas.</p><p>Currently, the governance of emerging technologies is patchy: some are regulated heavily, and others hardly at all because they do not fit under the remit of any existing regulatory body.<br> Mechanisms often do not exist for those responsible for governance to interact with people at the cutting edge of research.</p><p>The report adds that even where insights from the relevant fields can be combined, it can be hard to anticipate what second or third-order effects might need to be safeguarded against history shows that the eventual benefits and risks of a new technology can differ widely from expert opinion at the outset.</p><p>To the extent that potential tradeoffs of a new technology can be anticipated, there is scope for debate about how to approach them. There may be arguments for allowing a technology to advance even if it is expected to create some negative consequences at first if there is also a reasonable expectation that other innovations will create new ways to mitigate those consequences.</p><p>Even if there is widespread desire to restrict the progress of a particular technology – such as lethal autonomous weapons systems – there may be practical difficulties in getting effective governance mechanisms in place before the genie is out of the bottle.</p><p>The growing popular awareness of the dilemmas associated with governing new technologies is revealed by media analysis: relevant mentions of such quandaries in major news sources doubled between 2013 and 2016.</p><p>But which technologies should we be focusing on? In the latest GRPS, we asked respondents to assess 12 technologies on their potential benefits and adverse consequences, public understanding and the need for better governance.</p><h4 id="thedisruptiveimpactofemergingtechnologies">The Disruptive Impact of Emerging Technologies</h4><p>The GRR rounds off its debate on technology risk by exploring the impact of emerging technologies. The potential of emerging technologies to disrupt established business models is large and growing. It is tempting to think of technological disruption as involving dramatic moments of transformation, but in many areas, disruption due to emerging technologies is already quietly underway, the result of gradual evolution rather than radical change.</p><p>Consider autonomous vehicles; we are not yet in a world of vehicles that require little or no human intervention, but the technologies that underpin autonomy are increasingly present in our ordinary cars. As the technological changes entailed by the 4IR deepen, so will the strain on many business models. The automotive sector remains a good example. It has been clear for some time that car manufacturers need to plan ahead for a world in which many of the factors that determine current levels of car ownership may no longer be present. Increasing evidence of this planning is now starting to shape commercial decision-making.</p><p>The GRR pointed out that in December 2016; Volkswagen launched a new mobility services venture (MOIA) in recognition of an ever-stronger trend away from owning a vehicle towards shared mobility as well as mobility on demand. The deep interconnectedness of global risks means that technological transitions can exert a multiplier effect on the risk landscape. One obvious channel through which technological change can lead to wider disruption is the labour market, with incomes pushed down and unemployment pushed up in affected sectors and geographical regions. This, in turn, can lead to disruptive social instability, in line with the GRPS finding this year that the most important interconnection of global risks is the pairing of unemployment and social instability.</p><p>Another prism through which to look at the interaction of risks and emerging technologies is that of liability – or, to put it another way, the question of who is left bearing which risks as a result of technological change. There are multiple potential sources of disruption here. The insurance sector is an obvious example when talking about liability; just as car manufacturers must prepare for a future of driverless vehicles, so the reduction in accidents this future would entail means insurance companies must prepare for plummeting demand for car insurance.</p><p>In the past, I have spoken about knowing your business intimately and understanding the environment that it operates in. Yes, technology can be a risk and a threat, but it can equally be a force for good and something that can add significant profit to your bottom line. The question you need to ask is: what do the 4IR and the rise of technology mean for my business?</p><p>Innovation is the key aspect that drives the growth of the fourth industrial revolution which will define the way we interact with our world.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 17 Aug 2017 16:47:05 +0000</pubDate></item><item><title><![CDATA[This is the story of technology]]></title><link>https://www.gtconsult.com/blogs/post/this-is-the-story-of-technology</link><description><![CDATA[There is no doubt that technology has changed the world. Without it, we would possibly still be rubbing sticks together to build a fire. There would b ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_9TeJiGwoR2ewjF2VTkyXwA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_oRNeQoCPT6if-sGX1TnObg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_YJF8T0RiQYeUH35TxjeciQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_tqjOF_ZXQe-2PDXuaP4Vpw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tqjOF_ZXQe-2PDXuaP4Vpw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>There is no doubt that technology has changed the world. Without it, we would possibly still be rubbing sticks together to build a fire. There would be no cutting edge medication which cures basic and sometimes deadly diseases, and we would be riding around on the back of pack animals as means of transportation.</p><p>Fortunately, the human brain is wired in such a way that it always tries to break the barriers that it is seemingly created for it. While we can argue now that technology is continually taking over our lives, it was humans that led technology to this stage.</p><p><strong>The case of exponential growth</strong></p><p>The growth of technology may be baffling to some. I often stand back in awe and wonder how we have come to a stage where a simple watch monitors not only the steps you take during the day, but also breathing and sleeping patterns.</p><p>This is because technology has grown exponentially over the years. This is because we need to look only at the past the rate of progress to see that it has always been continually accelerating.</p><p>To explain this whole idea let’s just start with a $1 bill and double it each day. After a week you would have $128, not a lot but a significant increase. In another week you would have $16 383.</p><p>It is now that the growth pattern really starts to kick off because by the end of week three you would have $4&nbsp;194 048. And the next week you would have $27&nbsp;574&nbsp;274; yes, heading for thirty million dollars. Five days later, you’re drowning in cash with $882&nbsp;376 768 dollars. The growth from here just keeps accelerating faster and faster but the vital point to keep in mind is that the first week only took you to $128.</p><p>Now three weeks later your have nearly a billion dollars but you only need five more days and you have over $14 billion. This is the nature of exponential growth and it is exactly what is going on with technology and has been since the very beginning. You hardly notice the growth at first. But the effect becomes increasingly clear over time.</p><p>This is the story of technology. If we take the last century, it did not equate to 100 years of progress at today’s rate, but was around 18 or 19 years because of the rapidly accelerating rate of progress. I estimate we will make more progress by the mid to late 2020’s than we made in the entire 20th century and that we will do it again by the mid to late 2030’s.</p><p>And Big Data will drive this. It is believed that 90% of the world’s data today was created in the last 2 years alone, every day 2.5 quintillion bytes of data is created (IBM Big Data). Data will be the commodity of the future.</p><p><strong>The good and the bad</strong></p><p>While the human brain is a fascinating thing, it can be argued that at times, humans can be too clever for their own good.</p><p>There is an idiom which states:&nbsp;<em>be careful what you wish for because it may come true</em>. Humans wanted to advance technology so much that it would make their lives easier. But in the process, has technology not changed the very essence of who we are.</p><p>The most palpable example of this is the growth of social media. A&nbsp;<a href="http://www.business2community.com/social-media/social-media-changed-us-good-bad-01000104#fF8rkBdklBrY8kzC.97">recent article</a>&nbsp;on business2community.com showed just how much social media has influenced our lives.</p><p>The article points out that in 2005, Facebook was still in its early stages of its spread across the world. Some users were signed up for it back then, but didn’t really see the point until a few years later. Twitter appeared around that time, but a lot of us saw it as a pointless&nbsp;<em>life casting toy</em>. LinkedIn was essentially a digital resume and, for some of us, a pseudo-Rolodex. And Google+ didn’t even come on the scene until 2011, followed later by Pinterest and other platforms.</p><p>Fast forward to 2014, and social media has become not only a key part of the modern lifestyle, but a useful marketing channel for businesses of all sizes. Recently, a friend commented that her young kids were stunned to know that phones were only used for conversations a few years ago. They were dumbfounded to hear that we didn’t even carry phones with us 15-20 years ago.</p><p>There is a generation of kids coming up who can’t even conceive of a world without smart phones and social networking. It has officially embedded itself in our culture.</p><p>How has social media affected human relationships?&nbsp;<a href="http://www.socialmediatoday.com/technology-data/bryan-kramer/2015-09-15/how-technology-affects-human-relationships">An article</a>&nbsp;on socialmediatoday.com sums it up perfectly. The writer’s biggest issue with technology and relationships is the inability to detect tone. You can never really know when someone is being sarcastic, funny, not funny, serious or joking.</p><p>I can’t tell you how many times I’ve wondered what someone meant by their words – whether on social media, in a text or via email. Unless you see the person’s face, hear their voice and understand the environment, you have no idea of the context surrounding the written words. This results in misunderstandings, miscommunications, and assumptions, which influences a specific view of others.<br><br></p><p>So it is clear that technology – through social media – has changed the very essence of the world we live in and human relationships. But where will it progress to in the future?</p><p>Some technology commentators have said that by 2030, 40% of the world’s jobs won’t exist and will be replaced by jobs that have not even been thought of. One of the jobs that will be in highest demand over the next two years will be app builders, a job that didn’t exist five years ago.</p><p>Robots also threaten to replace humans in jobs that require rule-based labour. This is how Japanese car manufacturers like Toyota first revolutionized automobile production in the 1980s.</p><p><a href="https://www.theguardian.com/technology/2017/apr/04/innovation-in-ai-could-see-governments-introduce-human-quotas-study-says">A report</a>&nbsp;on theguardian.com points out that innovation in artificial intelligence and robotics could force governments to legislate for quotas of human workers, upend traditional working practices and pose novel dilemmas for insuring driverless cars, according to a report by the International Bar Association.</p><p>The competitive advantage of poorer, emerging economies – based on cheaper workforces – will soon be eroded as robot production lines and intelligent computer systems undercut the cost of human endeavor, the study suggests.</p><p>While a German car worker costs more than €40 (£34) an hour, robot costs between only €5 and €8 per hour. A production robot is thus cheaper than a worker in China. Nor does a robot become ill, have children or go on strike and is not entitled to annual leave.</p><p>Perhaps the advantage we can take out of this is that humans are still needed to establish the rules based programs that run technology. Robotics is the future, but it is a future that still needs humans to program them.</p><p>So you need to ask yourself:&nbsp;*How will technology affect your business?&nbsp;*</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 13 Apr 2017 15:57:44 +0000</pubDate></item></channel></rss>