The latest Investing Matters Podcast episode featuring Jeremy Skillington, CEO of Poolbeg Pharma has just been released. Listen here.
London South East prides itself on its community spirit, and in order to keep the chat section problem free, we ask all members to follow these simple rules. In these rules, we refer to ourselves as "we", "us", "our". The user of the website is referred to as "you" and "your".
By posting on our share chat boards you are agreeing to the following:
The IP address of all posts is recorded to aid in enforcing these conditions. As a user you agree to any information you have entered being stored in a database. You agree that we have the right to remove, edit, move or close any topic or board at any time should we see fit. You agree that we have the right to remove any post without notice. You agree that we have the right to suspend your account without notice.
Please note some users may not behave properly and may post content that is misleading, untrue or offensive.
It is not possible for us to fully monitor all content all of the time but where we have actually received notice of any content that is potentially misleading, untrue, offensive, unlawful, infringes third party rights or is potentially in breach of these terms and conditions, then we will review such content, decide whether to remove it from this website and act accordingly.
Premium Members are members that have a premium subscription with London South East. You can subscribe here.
London South East does not endorse such members, and posts should not be construed as advice and represent the opinions of the authors, not those of London South East Ltd, or its affiliates.
Talking data fraud. We now have the ex ceo of talk talk who had a massive data breach a few years ago on her watch running the track and trace setup. Obviously didn't affect Dido s job prospects. Having said that it's still a f.. K up
As long as a company is using robust connectivity security as mentioned earlier, then the only really weak link is the same wherever the location is, the individual. In my experience once a year I had to read a computing security document outlining my responsibilities, I then had to make a declaration that I understood it and would comply with it. Any company will make sure this type of process is in place and look to enforce it. A manager would have to sign off that they have inspected the intended work location and are happy that all is correct. Many home workers will only be involved in internal process having little contact with sensitive information that could bu used in a fraudulent way by persons able to eavesdrop. There will always be the odd situation where something goes wrong that could cause a data breach. I would be more concerned by a database hack than something that might be seen on a screen in the kitchen.
Just remember this working from home is nothing new, just more people now doing it, the security protocols have been around for many years.
Am just making the point that if Data fraud was a huge problem for the authorities before the Covid work from home changes, then it can only be more so with less security.
Everyone is talking about the cost savings of 'home working' over the expence of office space.
But perhaps in a few months we may see news items detailing a rise in this type of crime...
M
M
GDPR in simple terms tells you that data must be secure. It doesn't tell you how to do it. The processes for that are the responsibility of the data controller/user . If you get it wrong a massive fine ,slap on the wrist and dependant how bad a potential effect on the share price.
You can take the Horse to water, but you can’t make it drink.
Ok NDN, thanks for replying.
But, you must be a very nieve person or/and very trusting....
Lets leave it there eh....
M
Think you are missing the point. It matters not where you are located, you would have a responsibility to ensure that to the best of your ability any information you have access to remains confidential at all times. You should not disclose any information to anybody unless it directly affects there ability to perform there job or task. Home workers would be advised not to place screens, printers, or documents in locations that could make them insecure by sight, ie no screen should face a window. Most home workers are probably advised to connect to there router via an Ethernet cable rather than WiFi and may well be provided with mains adaptors to do this if they are not located near there router. That way no one could capture un incepted data.
Would it be any different if you gave your credit card info over the phone to purchase something and the operative noted down your details for there own gain. Would not matter where they were located they would do it if inclined. In fact frauds would be less likely from home workers than office based ones, it would be easer to identify them.
NDN,
In other words, very little security compared to a call centre environment. Anyone in that call centre/office is an employee that has a certain security clearance. I don't think the field operative would have the ability to pass you through security to access your private data anyway.
It is entirely down to the 'home worker'.
I, for one, won't be calling my Bank/Utility provider/ Credit Card provider unless i have no option.
If i'm thinking this way, you can bet the 'bad guy's' are well ahead of me...
M
I would think it would be down to the employe to ensure that any confidential information that may be on the screen is not viewed by a non authorised person. Same could apply in an office, you may work in a function that others do not have access to, if another staff member came to your desk that did not have that access, then you would have to ensure that the information was hidden from them whilst at your desk. Same for a field operative ensuring that a customer cannot see confidential information whilst working in there premises . Shut The Lid.
To answer my second question myself....
Once your personal information is up on screen on the kitchen laptop there is absolutely no security whatsoever.
Your data is up for anyone who walks in
So we have moved from a secure environment, in an office/call centre, where all the people are vetted.
To the kitchen laptop.......
Where is the Data protection Act? Do we still have one?
M
Fleccy. At the time all laptop MAC addresses were used as part of the login to the VPN as only registered addresses were given access. This may well have changed over the last 4-5 years. One of my rolls was to change out the laptops as they were upgraded for our job function one of the biggest issues on changing them out was the new MAC not being on the database and having to get it added over the phone. And people with sticky fingers playing with things before the change out was done !!!
Saito.....thank's for that reply
But what about security of who see's what on the screen?
M
"That in my case was, a laptop that was identified by its MAC address"
NDNIC my understanding is that the MAC address is simply a layer 2 hardware address and is only relevant for equipment on the same LAN/VLAN/Network. Once the network hits a level 3 router the MAC address is no longer relevant. Usually remote working is done through software associated with RSA Securid token fobs and installed software on the laptop/PC. Other remote access software solutions exist, like cisco anyconnect, but I don't believe they use Mac addresses as part of the authentication, as MAC addresses can be spoofed anyway.
"Its not a certainty for any service provider to make easy money, but those who can market and prove themselves as successful providers of working from home services stand to take market share from those who are unable to deliver."
Companies have had staff working from home for years, it's just that Covid has accelerated the trend. Companies can operate call centres using staff at home, with secure VPN, data encryption and VOIP. My Son works as an I.T. developer/Programmer and has been working from home without Furlough throughout the pandemic. My Daughter in Law shares the same internet connection as my Son and works in a call centre customer service role and their data is kept secure and separate over different VPN connections.
Millie,When working from home on your personal broadband you use software to make a VPN..a virtual private network which effectively is a secure "tunnel" through he broadband network.
Milli. Most will, like I did when working for BT, use a VPN, virtual private network, to establish the link. That in my case was, a laptop that was identified by its MAC address that is unique, my ID and password, that changed every 28 days and a unique number generated by a token, much like some banks do if you have a home card reader. After that access to systems was incepted and used ID and other passwords. So it is fairly secure from your average hacker. There are simpler ways but most would at least use a VPN link as the very least.
I think it is correct to state that the initial impact of working from home is either neutral or costly for service providers.
Where they stand to make money is if they can take advantage of the long term effects.
It is likely that home workers will start to see value in not just speed but stability of connection, if you are a company that can market yourself towards this then you may take market share from those where people get dropped every 30 minutes.
Also in terms of businesses they are going to be looking for effective and secure connections to their internal networks. Sure they will have some already but probably not designed to be scaled up to the the current levels.
Its not a certainty for any service provider to make easy money, but those who can market and prove themselves as successful providers of working from home services stand to take market share from those who are unable to deliver.
Just a question that someone may know the answer to.
If someone works in an office, presumably on a secure network, when they work from home using their home broadband connection, is the security of the data they see compromised.
One, from a connection prespective; wifi to a laptop in the kitchen
Two, once you have been taken through security questions, who else may be looking at your private information on the screen in the kitchen
How does the Data Protection Act fit into this scenario?
Millie
I’ll look into that, thank you.
If you have mains run out to the office, you can use powerline adaptors that run via the mains.
https://www.currys.co.uk/gbuk/computing-accessories/networking/powerline/tp-link-tl-pa4010-powerline-adapter-kit-av600-twin-pack-10143560-pdt.html
Alternatively a Wifi extender is another option.
https://top5-wifiboosters.com/uk/best-wifi-extenders?
Lost soul / fleccy. I’m not tech savvy! The office is halfway down the garden, about 25 metres from the router in the house.
"Beza isnt it easier to get a premade cat5/6 cable and plug it into a switch for multiple connections at a cHeaper price"
Use a WiFi extender, unless the garden is as big as country park.
Beza isnt it easier to get a premade cat5/6 cable and plug it into a switch for multiple connections at a cHeaper price
When we had the last crash around 2008-20010 BT thought they would need to cut staff due to an expected decline in BB and business connections. That is not what happened, people saw there internet connection as a necessity for day to day life, business saw it in a good time to upgrade there networks, the mobile operators started to ramp up there new fibre connections for rolling out 4g. BT ended up taking on more staff.
Similar is happening now, business now realise that they do not need as many offices as they did, staff can work from home most of the time. As a result they are starting to have additional BB connections into homes where that is practical ( is there enough copper at the location to supply) they may well shut some locations but, will need to upgrade their networks to handle the extra capacity coming in from outside. So as in the last crash BT have a very good chance of coming out the other side better than they entered it.
"I dunno. I was thinking sudden increased Use actually costs BT as they suddenly need to increase back bone capacity etc."
Nothing to do with the pension, but increasing backbone capacity isn't as difficult as it was in previous network hierarchies. Backbone capacity in the DWDM world, is as simple as adding extra wavelengths of light. Currently a Fibre pair is capable carrying around 8 Tbps with around 80 100Gbps channels, some of the newer DWDM equipment has up to 18Tbps, from what I've read. DWDM terminal Equipment is now relatively cheap and easily upgradeable, so no problems increasing capacity. The Cloud router/switches are FAF, which is my acronym for Fast As F*** and also scalable, i believe. I don't think terrestrial backbone capacity will be an issue, but international capacity might. Many of the FAANG companies are now investing heavily in subsea capacity, probably to deal with the possible bottleneck issues.
Whether increased subsea capacity is required will depend on the effectiveness of the Distributed Cloud Architectures, being developed to deal with increased bandwidth demand. A lot of things are up in the air at the moment, but I see the telecom companies being big winners in the medium/long term.