Can low-tech IT solutions be secure?

Thinking creatively, a South African IT company decided to use a low technology solution to complete a data transfer when their ISP network could not handle the job.  Typically, quick out-of-the-box IT solutions are rarely secure.  Smart technologists are good at finding solutions to meet their objectives, but when time is short, security tends to be ignored.  Does the combination of frustrated people, short timelines and the need to transfer a lot of data equate to insecurity?  Not always.  Pigeon Data Carrier.jpg

Being different sometimes has its security advantages.  In this case data was transferred in a manner which was unpredictable to intercept, highly reliable, impossible to sniff, faster than the traditional available wired network, and maintained high security for integrity and confidentiality.

Yes, they used a carrier pigeon.

The best news story of the day.

Published on Categories Archive
Matthew Rosenquist

About Matthew Rosenquist

Matthew Rosenquist is a Cybersecurity Strategist for Intel Corp and benefits from 20+ years in the field of security. He specializes in strategy, measuring value, and developing cost effective capabilities and organizations which deliver optimal levels of security. Matthew helped with the formation of the Intel Security Group, an industry leading organization bringing together security across hardware, firmware, software and services. An outspoken advocate of cybersecurity, he strives to advance the industry and his guidance can be heard at conferences, and found in whitepapers, articles, and blogs.