Blockchain the Pros and Cons

In an era where cyberattacks can paralyze entire networks, the need for effective, reliable IT security has become paramount.

 

Some think they have found the silver bullet in the war against hackers.

The Blockchain Revolution  

When Bitcoin creator Satoshi Nakamoto, whose true identity is still unknown, revealed his revolutionary currency idea in a 2008 white paper, he also introduced the beginnings of a unique peer-to-peer authentication system that today we call Blockchain.

 

The brilliantly innovative blockchain system at its core was an open ledger that records transactions between two parties in a permanent way without needing third-party authentication.

Based on decentralization,  blockchain data (block) can’t be changed without changing the other associated, yet distributed blocks.

 

For years, blockchain and Bitcoin remained one and the same.  About five years ago, innovators in the industry began to realize that blockchain could be used for more than just securing cryptocurrency by just altering the system.

Indeed blockchain has proved extremely durable, standing up to some of the fiercest cyberattacks for almost a decade.

The industry leader, Gartner, has also cited  blockchain as a technology companies should consider adopting in order to maintain a competitive edge.[i]

The Downside

While the advantages of blockchain are clear, the system still has its drawbacks.

One risk of working on a blockchain based system is the danger of irreversibility.  Because the protocols are so resistant to change, users could become permanently locked out in the event that private keys are forgotten or otherwise lost.

The system also has issues with storage.  Each block can contain no more than 1 Mb of data.   The system in its current form isn’t particularly fast, with the capacity to handle only seven transactions per second.   This will may make the system incompatible for enterprises that need to sort through large quantities of data with speed.

Initial costs to integrate Blockchain into an existing business, especially ones that include supply chain systems, may be preventatively too high for many companies.

It’s important to realize that blockchain is not impervious to attack.   To date, there have been several instances of specialized attacks that have succeeded in overcoming Blockchain.

And having your Blockchain hacked comes with an additional risk.  Because such as system makes all pieces of data fundamentally integrated, if attackers manage to pull off a hack, it could spell the loss of a company’s entire database.

In conclusion, companies need to assess the risks and benefits of going blockchain, and determine if the system is best for their business model.    Adaptability, cost, and overall increases in security will be important factors in determining if Blockchain is a proper fit for your enterprise.

 

[i] https://techcrunch.com/2018/07/22/the-quantum-meltdown-of-encryption/

 

Visibility: Accurately, discover sensitive data; detect and address broken business process, or insider threats including sensitive data breach attempts.

Protection: Automate data protection, breach prevention and incident response both on and off the network; for example, find and quarantine sensitive data within files exposed on user workstations, FileShares and cloud storage.

Notification: Alert and educate users on violations to raise awareness and educate the end user about cybersecurity and corporate policies.

Education: Start target cyber-security training; e.g., identify end-users violating policies and train them.

  • Employees and organizations have knowledge and control of the information leaving the organization, where it is being sent, and where it is being preserved.
  • Ability to allow user classification to give them influence in how the data they produce is controlled, which increases protection and end-user adoption.
  • Control your data across your entire domain in one Central Management Dashboard with Universal policies.
  • Many levels of control together with the ability to warn end-users of possible non-compliant – risky activities, protecting from malicious insiders and human error.
  • Full data discovery collection detects sensitive data anywhere it is stored, and provides strong classification, watermarking, and other controls.
  • Delivers full technical controls on who can copy what data, to what devices, what can be printed, and/or watermarked.
  • Integrate with GRC workflows.
  • Reduce the risk of fines and non-compliance.
  • Protect intellectual property and corporate assets.
  • Ensure compliance within industry, regulatory, and corporate policy.
  • Ability to enforce boundaries and control what types of sensitive information can flow where.
  • Control data flow to third parties and between business units.