The cyber attack This attack highlights a larger problem with proprietory software and hardware sold by companies such as Microsoft. Ritchie Tongo / EPA
The cyber attack This attack highlights a larger problem with proprietory software and hardware sold by companies such as Microsoft. Ritchie Tongo / EPA
The cyber attack This attack highlights a larger problem with proprietory software and hardware sold by companies such as Microsoft. Ritchie Tongo / EPA
The cyber attack This attack highlights a larger problem with proprietory software and hardware sold by companies such as Microsoft. Ritchie Tongo / EPA

One way to secure tech infrastructure


  • English
  • Arabic

By now, most of the world is aware of the ransomware attack that spread like wildfire through global computer systems. Using an exploit stolen from the National Security Agency in the United States, hackers took advantage of a known flaw in several Microsoft operating systems to take control of computers and encrypt data until victims paid a ransom in bitcoin. The hack was only stopped after a malware researcher found a kill switch, but analysts believe that more systems could be attacked in the coming days.

This attack highlights a larger problem with proprietory software and hardware sold by companies such as Microsoft. Customers pay for extra features and even enhanced “virus protection” software. As such, security, in some types of computing, is a commodity. With regards to the recent ransomware attack, the NSA alerted Microsoft to the vulnerabilities in their operating platforms. Microsoft responded with a special security patch for older operating systems such as Windows XP.

Only after the attack began, did Microsoft begin aggressively pushing the security patch and targeting Windows XP users. Not all technology companies operate according to Microsoft’s business model. Google and Apple, for example, have built security-minded infrastructure and offer programs such as Google Docs for free. As such, Apple’s mobile operating system, iOS, and Google’s Chrome operating system have both been designed with virus protection in mind. Security updates are pushed out to users as soon as a new virus is discovered. More importantly, these updates are hard to avoid as anyone with an iPhone can attest. On Google’s operating platform, updates quietly happen in the background without the need for users to check to see if their system is up-to-date.

That is one lesson of this global computer attack. Our computer infrastructure is shockingly vulnerable to both criminal and extremist attack. In the interest of defence, security updates should happen on a regular basis and can’t be subject to monetisation. Technology companies can still expand profits with the creation of new features and operating systems but the security of our individual devices is arguably in the public interest.

We can’t stop malware and viruses but we can defend ourselves by demanding that technology companies don’t leave our devices vulnerable to known flaws and exploits.

NYBL PROFILE

Company name: Nybl 

Date started: November 2018

Founder: Noor Alnahhas, Michael LeTan, Hafsa Yazdni, Sufyaan Abdul Haseeb, Waleed Rifaat, Mohammed Shono

Based: Dubai, UAE

Sector: Software Technology / Artificial Intelligence

Initial investment: $500,000

Funding round: Series B (raising $5m)

Partners/Incubators: Dubai Future Accelerators Cohort 4, Dubai Future Accelerators Cohort 6, AI Venture Labs Cohort 1, Microsoft Scale-up 

Pros%20and%20cons%20of%20BNPL
%3Cp%3E%3Cstrong%3EPros%3C%2Fstrong%3E%0D%3C%2Fp%3E%0A%3Cul%3E%0A%3Cli%3EEasy%20to%20use%20and%20require%20less%20rigorous%20credit%20checks%20than%20traditional%20credit%20options%0D%3C%2Fli%3E%0A%3Cli%3EOffers%20the%20ability%20to%20spread%20the%20cost%20of%20purchases%20over%20time%2C%20often%20interest-free%0D%3C%2Fli%3E%0A%3Cli%3EConvenient%20and%20can%20be%20integrated%20directly%20into%20the%20checkout%20process%2C%20useful%20for%20online%20shopping%0D%3C%2Fli%3E%0A%3Cli%3EHelps%20facilitate%20cash%20flow%20planning%20when%20used%20wisely%0D%3C%2Fli%3E%0A%3C%2Ful%3E%0A%3Cp%3E%3Cstrong%3ECons%3C%2Fstrong%3E%3C%2Fp%3E%0A%3Cul%3E%0A%3Cli%3EThe%20ease%20of%20making%20purchases%20can%20lead%20to%20overspending%20and%20accumulation%20of%20debt%0D%3C%2Fli%3E%0A%3Cli%3EMissing%20payments%20can%20result%20in%20hefty%20fees%20and%2C%20in%20some%20cases%2C%20high%20interest%20rates%20after%20an%20initial%20interest-free%20period%0D%3C%2Fli%3E%0A%3Cli%3EFailure%20to%20make%20payments%20can%20impact%20credit%20score%20negatively%0D%3C%2Fli%3E%0A%3Cli%3ERefunds%20can%20be%20complicated%20and%20delayed%0D%3C%2Fli%3E%0A%3C%2Ful%3E%0A%3Cp%3E%3Cem%3ECourtesy%3A%20Carol%20Glynn%3C%2Fem%3E%3C%2Fp%3E%0A