Maintaining a Legacy of Trust in a Digital-first Media Industry - Part 2
Seemingly overnight, media companies have access to huge amounts of data on their customers – including personal details, location, payment information, viewing habits, and preferences.
Recent high-profile data breaches and misuses of personal data mean consumers are more concerned about how their data is stored and used, and the fact that it may be shared with unknown third parties or used without their consent.
Research recently undertaken by Atos into how UK consumers perceive cybersecurity found that, for example, nine out of ten respondents said their bank details are most valuable to them. One in four instead pointed to their location data – both pieces of information likely to be held for a paid online video service.
But somewhat surprisingly, not even half thought that media and telecoms companies should adopt data encryption and only a third would like to see strong identity and access management practices. This raises questions about the general public’s awareness about the importance of cybersecurity in the media.
On the other hand, if a breach does take place, then 82% believe broadcasters should use their communication expertise to rapidly inform their customers about the situation as well as the action they should take.
It will be important for media companies to take these views into account, both in designing their security measures and when responding to a breach, if they’re to maintain user trust, goodwill and loyalty.
On the front-line of information warfare
Security also has important implications for media companies as they tackle the issue of fake news. Large broadcasters and their supply-chains are high profile targets for hackers and often find themselves on the front line of information warfare.
Mainstream AI technologies will equip the hacker with more tools in the future and broaden the risk vector for media organisations, from the theft of personal details and intellectual property to the substitution of falsified content.
This could manifest, for example, in the substitution and distribution of false news content from a trusted brand following a hack. This might result in significant damage to the brand integrity and credibility of the news source in question.
With the advent of the digital media landscape, this threat of “deep fakes” – or false videos that seem real – has become a reality to be reckoned with.
Maintaining a legacy of trust
The media industry has long operated on the principle of trust: everything from a journalist checking the credibility of their source to printing accuracy.
Trust is an asset that needs to be protected and, as we have seen, recent issues around fake news on social media have led to widespread calls for reform. Social networks are fighting to avoid falls in the credibility – and so usage – of their platforms, while government bodies and others seek to reduce data misuse and fake news.
In this rarefied atmosphere, media companies must invest in security measures to maintain trust with audiences and, in the case of news organisations, take steps within their workflows to make certain that information is coming from a trusted source.
This will often involve forming a better understanding of normal behaviour patterns within an organisation to then pinpoint anomalies and outliers. It also means working with experts to understand the risk posture of the organisation, before improving cyber resilience and defense.
Using advanced tools like intelligence-lead data analytics can deliver greater speed and agility in cybersecurity, all while reducing human intervention and drive speed and agility.
Technology has changed the media landscape at speed, and it’s presenting media outlets with new opportunities, with new security challenges.
It’s only by implementing strong measures that the media can defend against attacks, protect user privacy, eliminate fake news – and maintain the vital trust of their audiences.
For further information on digital transformation in the media, please visit the Atos Digital Vision for Cyber Security paper.
Go back to Part 1 of this blog.