Big tech’s betting on the metaverse: it’d be better off doubling down on email security

Geoff Bibby, CMO, Zix Corporation, looks at the big tech’s obsession with the metaverse and why organizations should be focussing more on doubling down on security, particularly in the email space.
Geoff Bibby, CMO, Zix Corporation, looks at the big tech’s obsession with the metaverse and why organizations should be focussing more on doubling down on security, particularly in the email space.

Big tech’s latest obsession is the metaverse. Once a niche concept originating in science fiction, it’s gained a lot of mainstream attention lately. Most notably, Mark Zuckerberg recently told The Verge that Facebook is set to become a metaverse company, although the term was also bandied about in a recent Microsoft earnings call. If devotees are to be believed, the metaverse will change the way we do, well, everything. Skeptics, on the other hand, think it’s more likely to be just another tech bust, along the lines of Google Glass.

While the reality is likely somewhere in between, there can be no doubt that big tech could accomplish a lot more in the here and now by doubling down on security, particularly in the email space.

The metawhatnow?

Before digging into why focusing on security is so important, it’s worth explaining what exactly this metaverse that everyone’s suddenly so hyped up about is. First imagined by Neal Stephenson in his 1992 science-fiction novel Snow Crash, it’s best to think of the metaverse as a kind of next-level internet laid over the physical world. Connecting the two are technologies such as virtual reality (VR) and augmented reality (AR).

Of course, for the evangelists, the metaverse would be a great deal more sophisticated than the AR and VR experiences most of us are familiar with today. People connected to the metaverse would be able to interact with things that other people in the real world can’t.

Space in the enterprize

If the metaverse is to thrive anywhere, it’ll be in the enterprise space. In particular, engineers and designers are more likely to put up with weird-looking accessories if they genuinely help them collaborate on schematics and mockups in ways they weren’t able to previously. The ultra-geeks working in research labs might be early adopters too.

There’s form for this in both the early iterations of office computing and the internet, which proved their immediate usefulness in the organizations before making their way into the consumer space. And even if the metaverse doesn’t become all-encompassing, that doesn’t mean pursuing it won’t be useful. After all, organizations found uses for Google Glass long after it stopped being available to the public.

More pressing needs

As fun as imagining a metaverse future is, big tech needs to come to terms with the fact that it has more pressing needs right now. In particular, security remains a major issue. In 2020, each UK business experienced an average of 686 961 attempts (successful or not) to breach their systems. There were also 1 120 breaches and cyber attacks that were reported on in mainstream media, which accounted for 20,120,074,547 leaked records. Additionally, there was one ransomware victim every 10 seconds and US$17700 was lost every minute due to a phishing attack.

Phishing is now only getting more sophisticated too. Office 365 customers, for example, are being affected by a kind of phishing referred to as Living off the Land (LoTL) phishing, which occurs when cybercriminals abuse otherwise legitimate services and URLs to mask the true nature of their message. Some cybercriminals even leverage reCAPTCHA technology to further obfuscate the content on the eventual landing page.

Many of these attacks target weaknesses in big tech systems. For instance, 71% of Microsoft Office 365 deployments in medium to large companies suffered, on average, seven legitimate account takeovers at a time when remote workforces were more dependent than ever on the suite of apps to get their jobs done.

Earlier this month, meanwhile, T-Mobile was subject to a massive data breach, which affected more than 54-million people. The breach includes names, driver’s license numbers, Social Security numbers and device identification (IMEI and IMSI) numbers for subscribers, former customers and prospective customers who may have been interested in T-Mobile service at one point.

Such incidents don’t just cost companies credibility; they also cost money. By some estimates, global cybercrime costs US$1trn, or 1% of the world’s GDP in 2020. It’s not like organizations don’t know where to start either. The vast majority of cyberattacks start with email.        

READ MORE:
Time to spend

As such, it’s clear that making inboxes more secure would probably do a lot more to make the world a better place than the metaverse is. While high-concept visions of the future might be seductive and make for great headlines,we need more practical efforts at the moment.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Cheltenham MSP is first official local cyber advisor

Neil Smith Managing Director of ReformIT • 23rd April 2024

ReformIT, a Managed IT Service and Security provider (MSP) based in the UK’s cyber-capital, Cheltenham, has become the first MSP in the local area to be accredited as both a Cyber Advisor and a Cyber Essentials Certification Body. The Cyber Advisor scheme was launched by the Government’s official National Cyber Security Centre (NCSC) and the...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

What is a User Journey

Erin Lanahan • 19th April 2024

User journey mapping is the compass guiding businesses to customer-centric success. By meticulously tracing the steps users take when interacting with products or services, businesses gain profound insights into user needs and behaviors. Understanding users’ emotions and preferences at each touchpoint enables the creation of tailored experiences that resonate deeply. Through strategic segmentation, persona-driven design,...

From Shadow IT to Shadow AI

Mark Molyneux • 16th April 2024

Mark Molyneux, EMEA CTO from Cohesity, explains the challenges this development brings with it and why, despite all the enthusiasm, companies should not repeat old mistakes from the early cloud era.

Fixing the Public Sector IT Debacle

Mark Grindey • 11th April 2024

Public sector IT services are no longer fit for purpose. Constant security breaches. Unacceptable downtime. Endemic over-spending. Delays in vital service innovation that would reduce costs and improve citizen experience.

Best of tech to meet at VivaTech in May

Viva Technology • 10th April 2024

A veritable crossroads for business and innovation, VivaTech once again promises to show why it has become an unmissable stop on the international business calendar. With its expanding global reach and emphasis on crucial themes like AI, sustainable tech, and mobility, VivaTech stands as the premier destination for decoding emerging trends and assessing their economic...