TRUSTED

software.
hardware.
platforms.
services.
data.
devices.
inclusion.
AI.
innovation.
commerce.
privacy.
security.
Security is built on trust.

TRUSTED

software.
hardware.
platforms.
services.
data.
devices.
inclusion.
AI.
innovation.
commerce.
privacy.
security.
Security is built on trust.
Security icon

We need the ability to trust that the technologies and services we use are secure by design.  

Our digital ecosystem is under near constant threat from activities by malicious actors using techniques that are becoming increasingly more complex, sophisticated, and ubiquitous. Since the beginning of the pandemic, there has been a 300% increase in cybercrime, cyber scams have gone up 400%, mobile malware is on the rise, and there has been a significant hike in the frequency and size of ransomware attacks. For example, malware targeting mobile banking apps nearly doubled in 2021, as cyber criminals seek to take advantage of the rising popularity of mobile banking apps, underscoring the linkage between greater functionality and increasing security risks on smartphones.

Criminal gangs, hackers with a business plan, and even nation states are working around the clock and across the globe to find and exploit vulnerabilities in technologies and services in what are often believed to be secure systems. They are developing sophisticated new “social engineering” strategies to trick users into clicking on malevolent links, infected attachments, or downloading mobile malware directly onto devices. Even a small mistake can be leveraged to put your most personal information at risk, put proprietary business information in jeopardy, expose national security secrets, or even lock down a pipeline, school or hospital for ransom.  We have to find the right path forward to reduce this risk.  

As a start, one of the best defenses is increasing awareness and adoption of basic cyber hygiene best practices, because according to one study, social engineering or other human error account for almost 90% of successful attempts to exploit a system. Simple steps, like adopting strong passwords, using multifactor authentication, only downloading from official app stores, and avoiding clicking on untrusted links, are among the best ways to protect people from ever-evolving and increasingly problematic cyber threats.    

Yet as information technology becomes more pervasive, devices more prolific, and the information we carry with us more sensitive, the attack surface that hackers can attempt to exploit has increased substantially, creating new kinds of potential harm.  It means that as technology becomes increasingly central to our lives, making it secure and reliable from the start becomes ever more critical.   

Just like a home must be built upon a strong foundation or it will eventually crumble, our new digital home must also be built upon a strong foundation of security – with security built into its very foundation by design.  To elevate our cybersecurity posture, we need to elevate our focus on agile solutions across the ecosystem that embrace best practice standards, enable continuous innovation in cyber-defenses, advance globally recognized frameworks, and that are underpinned by smart government policies to keep personal and business data secure and our economy moving forward.

IDEAS

5 KEY STEPS: HOW TO STOP YOUR MOBILE ACTIVITY FROM BEING TRACKED

In recent months, Trusted Future has conducted extensive public opinion research which found consumers are very concerned about the ways their activity may be being tracked online. Consumers often want to know more about how their data is being tracked, and what they could do to control and prevent it. Trusted Future has put together the following explainer and set of consumer tips to help people take back control of their privacy – beginning with something called the device advertising identifier which is at the heart of mobile data tracking, and the multi-billion dollar data broker industry built around it to track, sell, and manipulate your data. How do advertisers and third parties track my mobile behavior? Device advertising identifiers enable third parties to persistently track you, enable data brokers to link and combine disparate sources of data about you to create detailed profiles, and have led to some egregious privacy violations. When combined with location data, device advertising ID data can reveal some of the most intimate details of a person’s life – tracking your activities across the web, across town, and throughout your day. How has user device tracking been used or misused? There are plenty of examples…

ISSUE BRIEF: Cyber Threats From Russia Highlight the Need for Trusted Cybersecurity Measures

At a time of increasing global tensions, our national security experts are warning that cybersecurity threats from authoritarian regimes are on the rise. We examine the heightened threat and highlight critical steps that businesses, tech users, and policymakers should take in this new environment.

POLLING MEMO: National Survey on Cybersecurity, Trust, and Tech Policy

Survey shows Americans trust U.S. companies - and device manufacturers in particular - most to close the technology trust gap and want government to support tech innovation and global competitiveness without additional mandates and regulation

ISSUE BRIEF: How the Bipartisan Innovation Bill Can Help Drive a More Trusted Future

Innovation is the key to economic growth, improved standards of living, opportunities for all Americans and even America’s strength on the world stage. At time when Washington is almost defined by hyper-partisanship, one of the few areas where there is real, meaningful bipartisan agreement is on the pending Bipartisan Innovation Act.

Our CISA Zero Trust Comment

We share the view that mobile devices “present unique opportunities and challenges in adopting comprehensive zero trust models” and applaud CISA’s efforts to advance ZT from a mobile device perspective – especially given the dynamically changing and critical mobile threat environment. As mobile devices become even more essential to the way the government works, the way federal workers do their jobs, and the way agencies deliver services, it’s become even more essential that leaders incorporate proven trustworthy principles in their enterprise mobility strategies,

Tech Leaders Must Raise Awareness And Build Trust To Close The Cybersecurity Gap

Anxiety is not translating into commensurate action to protect their personal data online. It is essential that those of us in technology leadership positions boost public awareness and help users adopt smart and simple steps they can take to regain control over their online security.

What We Learned at the Munich Security Conference and Since the Russian Invasion of Ukraine

A senior delegation from Trusted Future traveled to Germany for the Munich Security Conference. We hosted a dinner at the conference site on Friday, February 18th featuring high-level European and American security, intelligence, law enforcement, and telecommunications industry officials.

The U.S. Trust Landscape

Our survey research shows the various dimensions of today’s trust gap, explores the way it is impeding important digital progress, highlights the key factors which must be overcome, and explores the vast opportunities that can be achieved when we do. These survey results, when combined with other insights and research, highlight the need for pragmatic policy choices and provide a potential pathway for advancing trusted frameworks that can facilitate comprehensive action toward a more trusted digital future.

WHITE PAPER: ADVANCING A MORE TRUSTED DIGITAL FUTURE

We stand on the precipice of a new era of technological progress and innovation with the potential to enable us to do things never before possible, vastly improve the quality of life for billions around the globe, and help solve some of our world’s most intractable problems. But it is becoming increasingly clear that we risk missing or delaying these transformational opportunities if people lack the foundational trust in the technologies needed to deliver them.

Practice Good Cyber Hygiene

Practicing good basic cyber hygiene is one of the best, and easiest, ways people can protect themselves from cyber criminals and others that mean you harm. Experts estimate that over 80% of cyber incidents could have been stopped if the targets had adopted good cyber hygiene practices. Adoption of basic and widely recognized cyber hygiene best practices can be one of the first and most important defenses people can employ to better protect themselves from ever-evolving and increasing cyber threats.