Opinion: Time for Google to bring us a trustworthy cloud

Powered by SC Magazine
 

Why is Google so bad at information security?

For the sake of a trustworthy cloud, it’s time for Google to get its information security act together.

Like most IT journalists I tend to pay a lot of attention to what happens at the ad-search giant. It's a consequence of its weight in the market and history of influencing society and business, often for the better.

And, of course, because Google has created so many cool gadgets with which to amuse us.

So it has been with dismay bordering on incredulity that I have often been gobsmacked by its ambivalence to information security and trust.

Hardly a week has gone by recently when Google hasn't made the headlines - not for a flashy new technology, its social good deeds or insatiable appetite for acquisition but because it has screwed the pooch on some security issue or other.

These are uber-smart people, these Googlers. I have seen them trounce a room of hundreds of very smart people -- including a few game show winners and pub-trivia regulars -- in IQ tests and I suspect there are enough geniuses at the company's Sydney headquarters to form their own chapter of Mensa.

So why does Google do such a poor job of keeping people's information secure?

It's true that Google has bought some great hosted security services and over the New Year added email domain keys for Apps but that can't right the crooked tilt of the organisation's halo.

A saying I heard as a kid was: "Fool me once, shame on you; fool me twice, shame on me"; what do I say to being repeatedly fooled?

Whether it's malware it allowed to sneak on the Android Market, losing 150,000 Gmail subscribers' email accounts and data, losing calendar data, relying on antiquated disaster recovery methods, hitting the top malware charts, or infractions incurred on its behalf, Google's security stance is not consistent with its dominance.

Frankly, it's just slack and no longer acceptable.

And it's a big worry for anyone who considers the cloud a viable option for their organisation or personal data or that of their customers. Because, as a market leader, Google's approach to security, trust and compliance is the standard that other providers feel they must meet, and little more. And, right now, that standard should give you pause for thought before moving into the cloud.

The penny dropped for me that Google wasn't serious about security when Germany's data protection commissioner outed it for snarfing packets from open wi-fi networks as its Street View cars rolled down our boulevards, streets and lanes.

I love Street View, the ability to see where you're going before you get there is a great comfort especially when you're in a strange part of town or an entirely new city. And because there are legitimate concerns over the use of images, Google came around to the view that people had a right not to be included in Street View after many expressed their outrage.

But it was the collective shoulder-shrug, dissembling over, at first, whether Google had grabbed people's free-to-air packets, whether it had the right to, blaming the victims (it's not our fault your wi-fi network was open, you should be more careful), what it did with the information and why, in the first place, it had collected them at all that set off warning bells.

Security. Governance. Reliability. Risk. Compliance. Trust. Privacy.

It seems an uncomfortable, even boring, fit to Google's lightspeed engineers intent on changing the world a line of code at a time. And in some ways maintaining our privacy, at least, is a difficult proposition for a company that revolves around selling us ads and making money off our activities.

And although Google properly commissioned a report into its Street View debacle, it would have been happy to see the matter go away by deleting the information before fuller inquiries could be conducted.

My worries were heightened at the time when I put questions to Google's head of engineering in Australia, Alan Noble (remember, Google Maps originated here). Noble knew, or ought to have known, who the wi-fi culprit coder was but no sanction would be taken, he said.

Although Google eventually came around to the point of view that capturing people's private information and storing it without their permission or knowledge was unacceptable and possibly illegal, I feel that in its DNA there's a cognitive dissonance and a sense, still, that it did nothing wrong despite its public statements.

There was another technology company that dominated IT that once had a similar attitude.

More than 10 years ago, after the first surge of modern, internet-enabled malware hammered the credibility and stock price of software behemoth and Google-of-its-day, Microsoft's Bill Gates in one of his last major acts as chief executive officer initiated the Trustworthy Computing scheme.

Gates was talking not just about patching technologies after the fact but a fundamental and radical change to sew security into the fabric of software written at the desktop and applications maker and extending that appreciation to the wider industry.

At the time, open source and free software made much of the "many-eyes" approach to security; that is, with lots of people viewing code, it will be inherently more secure than a proprietary system or "security through obscurity". This is the approach Google, at its core an organisation that believes in free-software principles, chose for its Android Market smartphone app store.

While information security at Microsoft is still a day-by-day proposition, it has made big advances in software architecture to protect users' data and the weave of society as we become more connected with every device we slip into our pockets, slide on to our desktops or nurse in our possessions.

And Microsoft has spearheaded cross-vendor industry consortiums to further that dialog; a step Google was reluctant to make.

It's time for Google to wake from its slumber, to amp up the volume on information security and make the net safer for us all.

I call on Google to update Microsoft's vision with its own initiative, let's call it "Trustworthy Cloud".

This isn't an engineering task - a task Google with its likely genius-level median IQ is more than up to - as much as it is one of recrafting the culture of the organisation to put security first in everything it does.

Google needs to understand that information security must be built in at the outset of every project and is integral to its long-term success, that of their customers and partners and our path to the cloud.

Copyright © iTnews.com.au . All rights reserved.


Opinion: Time for Google to bring us a trustworthy cloud
Google's Street View was a high-profile case of the giant's lax information security but there are other examples.
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Google's Street View was a high-profile case of the giant's lax information security but there are other examples.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Do you direct debit customers? Read this
Oct 10, 2014
Authorities have been targeting direct debit practices with iiNet and Dodo receiving formal ...
Optus expands 4G coverage
Oct 10, 2014
If you rely on an Optus phone for work you might be interested to know that there are now 200 ...
Microsoft Office is now free for some charities
Oct 10, 2014
Microsoft has announced that eligible Australian non-profit organisations and charities can now ...
Vodafone lights up 4G in Adelaide
Oct 9, 2014
Live and work in Adelaide? Vodafone has switched on its 4G network in the city and suburbs.
Next year tradies will be able to take payments using ingogo
Oct 3, 2014
Ingogo is going to provide a card payment service for Xero users.
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 337

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 140

Vote