There has been a lot of talk from the pundits to the hunted (remember Edward Snowden?) about how there really is no longer any privacy on the Internet. However, as much as there is some truth in every lie, this particular thought isn’t entirely true. Perhaps a better way to explain it is: there is no privacy when you are using free applications on the Internet. When it comes to social media, iPhone apps, and a host of other free tools, we relinquish our privacy ever so willingly. With the Internet becoming ubiquitous, we are increasingly looking for services online and typically when we go searching for a specific need, we find that “there’s an app for that.” Services that otherwise would cost us dearly are being offered for far less money, or even for free, thanks to the Internet. Just think of how cable TV, mobile phone, landline phone and fax, ISP, and even satellite radio companies had so little real competition before Internet arrived. But now, the internet serves so much of what we need for less.
If the Service is Free – YOU are the Product
Unfortunately, today data breach has become a fairly common threat. Over the last couple of years, we have seen digital theft, breach of trust, and so on reshaping our notions related to Internet-based services. Over the last year, it seems that every couple of weeks we could find talk about information being leaked, or falling into the wrong hands due to some hack or breach. We need a reminder that nothing comes for free. Absolutely nothing.
What exactly is the price we’re paying whenever we use free services? We become the products. Whenever we opt for free services, we agree to disclose our personal information, and companies are using that information to sell something of value to others. So even when you’re not a direct source of income, you’re definitely helping them earn their dollars.
Does Privacy Exist?
When it comes to enterprise cloud, and even personal cloud, you can have a reasonable expectation to privacy. So if you’re asking if privacy exists, I’d say it does, with the caveat that you have to be assertive in demanding it, and take some precautionary steps to maintain your security on the cloud.
Generally, when you use paid solutions for storage, file sharing, project management, collaboration and more, you can and should have a right to privacy of use, content, and data. Before you choose a cloud service, it’s really important to clearly understand what exactly you’re signing up for. Most of us flinch from reading those utterly long and boring pages of terms and conditions put forth by service providers, but those documents actually answer most of our security-related questions.
If you invest in the right cloud products, then you can maintain a level of privacy online. However, I believe there’s no such thing as “too much security” when it comes to using Internet-based services. Even if you’re using the most secure cloud services and maintaining healthy password habits, I recommend using a third layer of protection in the form of third-party encryption software and tools such as Boxcryptor, Viivo, Cryptsync, etc. They provide a great means to adding this extra level of protection.
The true takeaway is: Remember the difference between buying a product, and being the product. When it’s the second one, chances are that you’re taking a gamble with your security. Ultimately, you have two options – free service, or secure service. The choice is yours to make.
This post was brought to you by IBM for Midsize Business and opinions are my own. To read more on this topic, visit IBM’s Midsize Insider. Dedicated to providing businesses with expertise, solutions and tools that are specific to small and midsized companies, the Midsize Business program provides businesses with the materials and knowledge they need to become engines of a smarter planet.
Image: Creative Commons