5 Ways GDPR will impact your business

GDPR (General Data Protection Regulation) is coming into effect on 25th May 2018. With it come a number of important changes for all types of businesses.
GDPR is complicated, but it is crucial that businesses in the EU comply with the regulation. Despite the fact that the UK is leaving the EU, GDPR will still affect us as it comes into force before 2019.
GDPR will impact your business in a number of ways. In an effort to make GDPR easier to understand, we at entrustIT have picked out the five most important ways GDPR will impact your business.

1. Larger fines for non-compliance

GDPR replaces the Data Protection Act 1998 in the UK, and with that replacement comes far heavier fines for non-compliance. The fine structure is split into two tiers, Tier 1 and Tier 2.
Under GDPR structure, should your business suffer a data breach, it must be reported to the UK’s Information Commissioner’s Office within 72 hours (more details on what will be required is in our forthcoming whitepaper). Failure to notify the ICO results in fines being imposed.
Depending on the severity of the breach, and how important the data that has been put at risk is, your fine will fit into one of the two tiers.
Tier 2 is the lower of the two, but still commands a fine up to an eye watering €10m (£8.6m), or 2% of the previous year’s global turnover, whichever is greater.
Tier 1, which is reserved for the most damaging breaches, carries a fine of up to €20m (£17.25m), or 4% of global annual turnover, whichever is greater.

2. Changes to ‘consent’

One important change that GDPR brings is the requirement for consent when handling personal data.
In the past, companies could handle personal data as long as the user in question didn’t ‘opt-out’. The process for opting out was often not immediately obvious or complex and resulted in personal data being processed without the end user necessarily realising.
This has been completely changed in GDPR. Now, in order for a company to process personal data for an end user, they are required to have specific consent for that type of use from that user. Not only that, but they must keep records of when that consent was given, and these records should be available to give to the authorities when required.
Furthermore, the end user has the right to withdraw consent at any time. As a business, you will be unable to lawfully process personal data until you receive their consent. Any business found to be improperly processing personal data will be fined at the highest level of the two tier system and will also experience significant reputation damage .

3. Changes to breach notifications

We touched on this in point 1. In order to provide a data protection standard across the European Union, GDPR includes a single breach notification requirement. Currently, all EU member states have their own data protection laws. Some are strong, but some are very weak. Organisations in member states that have weaker data protection may not have had to notify any authority of a data breach. GDPR seeks to bring all member states in line with each other regarding breach notifications.
A personal data breach is defined as the breach of security, resulting in the destruction, loss, alteration, unauthorised disclosure of or access to personal data.
In the event of a personal data breach, the relevant supervisory authority must be notified within 72 hours of discovery of the breach. Each member state has their own authority. In the UK, it is the Information Commissioner’s Office (ICO).
You must be able to provide the ICO with details on the nature of the breach, the approximate number of people affected and the contact information of the organisation. You must also be able outline measures you will take to reduce further risk to those affected.
Failure to do so can result in a Tier 2 fine.

4. Data Protection Officers (DPOs)

Under GDPR the following businesses must appoint a Data Protection Officer (DPO):
• Public Authorities
• Organisations whose core activities consist of processing operations which by virtue of their nature, scope or purposes require regular and systemic monitoring of data subjects on a large scale
• Organisations whose core activities consist of processing sensitive personal data on a large scale
These DPOs must have “expert knowledge” of data protection law and must report directly to the highest management level – they also cannot be told what to do regarding their tasks and cannot be dismissed or penalised for performing their tasks – a big responsibility indeed!
The DPO will advise its employer on compliance with GDPR and continuously monitor whether the company is complying correctly. The DPO will also act as the main contact with the regulatory authority in event of a data breach.

5. Privacy by Design

GDPR introduces ‘privacy by design’ as a legal requirement. This means that for the designing of all new systems, data privacy measures must be built in from the start, rather than added in at a later date.
Therefore, organisations are required to hold and process only the data they absolutely need, as well as limited access of personal data to those members of the organisation that explicitly need it.
This means that in the development of any new product or service, your organisation must make data protection an integral part of the design of that product/service. The legislation itself is not clear what exact measures you are expected to take, but it is clear that data protection will have to be a focus for all organisations under GDPR.

Did you find this blog post helpful? If so, please like and share it with your friends and colleagues. Look out for the next article in our series on GDPR entitled “5 steps to get GDPR ready” coming soon.

www.entrustit.co.uk | Download our GDPR whitepaper here


As you’ll likely have noted from recent media coverage, on Friday 12th May a new type of ransomware (named variously WannaCrypt/WannaCry/WCry) began appearing on computers running Microsoft Windows worldwide – within a matter of hours this infection spread to tens of thousands of devices across nearly 100 countries, causing significant issues for the affected organisations (including the NHS in the UK).

Whilst Friday’s outbreak was subsequently halted through the actions of security professionals, new variants have already begun to appear which cannot be controlled in the same way and that extend the risk of damage to organisational data.

What Is The Risk?

Ransomware is not new – this malicious software (malware) is designed to strongly encrypt your most important files (by targeting particular file types), at high speed, rendering them inaccessible to you. Once the files have been encrypted the application will move on to making demands for an untraceable payment using Bitcoin (an online currency) in return for the promise of a decryptor for your own data.

In this instance the ransomware has been combined with a technique (details) which allows infections to travel from one machine to another – this means that the malware spreads quickly between connected machines, such as on a company network. It is this combination which has made the outbreak so widespread and the impact so visible.

A number of defences are available – Microsoft began protecting against this combination of vulnerabilities using a security patch which became freely available in March 2017 (details). This family of patches provides cover for all currently supported versions of Windows (Windows Vista/Server 2008 or newer), but Microsoft have taken the uncharacteristic step of also providing patches for Windows XP/Server 2003 as a service to their customers.

Further information on the outbreak, as well as suggestions from the UK National Security Cyber Centre are available here:-
Latest Statement
Briefing – Protecting Your Organisation From Ransomware

What can you do?

There are 3 courses of action that we strongly recommend – both within an organisation, and for home/consumer users
1) Ensure that Windows Update has installed all recommended patches, or download and install the specific patch which suits your Windows version which closes the vulnerability that the current outbreak takes advantage of (details here, see below)
2) Ensure that your desktop/server antivirus product is up to date, and run a scan
3) Ensure that you have a backup for your data which is not accessible/vulnerable to ransomware, or if you don’t have a backup take steps to make one as soon as possible
4) Remain diligent when opening emails (and particularly attachments) from correspondents that you don’t recognise (fake or ‘phishing’ emails are a regular source of malware, part of a chain of events that can lead to ransomware arriving on your machine)

How can we help?

If you are a customer using our hosted services, please be assured that we are already defending against these vulnerabilities (just as you’d expect).

If you’re a customer who entrusts us with support for your servers and/or workstations, we will in touch with you to discuss your situation as a matter of priority throughout Monday. For many, the necessary steps will already have been taken.

If you are a PAYG customer and/or a customer with machines which you’re managing yourselves, we’d like to provide the following list of links which may be useful to you in finding the correct security patch against the vulnerability being used by the current WannaCrypt outbreak:-

Vulnerability Operating System Download Link
Windows 10 http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4012606

Windows 10 x64 http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4012606

Windows 8.x http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4012216

Windows 8.x x64 http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4012216

Windows 7 http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4012215

Windows 7 x64 http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4012212

Windows Vista http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4012598

Windows Vista x64 http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4012598

Windows XP http://download.windowsupdate.com/d/csa/csa/secu/2017/02/windowsxp-kb4012598-x86-custom-enu_eceb7d5023bbb23c0dc633e46b9c2f14fa6ee9dd.exe

Windows XP x64 http://download.windowsupdate.com/d/csa/csa/secu/2017/02/windowsserver2003-kb4012598-x64-custom-enu_f24d8723f246145524b9030e4752c96430981211.exe

Windows Server 2012 R2 http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4012216

Windows Server 2012 http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4012217

Windows Server 2008 R2 http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4012215

Windows Server 2008 http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4012598

Windows Server 2008 x64 http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4012598

Windows Server 2003 http://download.windowsupdate.com/c/csa/csa/secu/2017/02/windowsserver2003-kb4012598-x86-custom-enu_f617caf6e7ee6f43abe4b386cb1d26b3318693cf.exe

Windows Server 2003 x64 http://download.windowsupdate.com/d/csa/csa/secu/2017/02/windowsserver2003-kb4012598-x64-custom-enu_f24d8723f246145524b9030e4752c96430981211.exe

If you need assistance with any steps recommended above to defend against with this outbreak please get in touch:-
• Email: support@entrustit.co.uk
• Phone: 0330 002 0046

entrustIT complete acquisition of Tiva IT Solutions

We are pleased to announce that on March 31st 2017, entrustIT completed the majority acquisition of Tiva IT Solutions Ltd, based in Farnham, Surrey.

Tiva are an IT Support business with a strong regional focus and have been trading for 10 years. They focus on contract IT Support to businesses within a 25 mile radius of their base, but with some national presence. Tiva’s ‘proactive’ approach to on-premise IT support has proved particularly popular with local businesses and the company has seen strong growth in the last few years.

“We are really pleased to have Tiva on board” comments Jeff Dodd, Managing Director of entrustIT, “They have a really strong local brand and they will be a great addition to the entrust family.”

Post–acquisition, Tiva will continue providing first class customer service as  normal. and will work with our sister company, entrust Creative Technology to build an even stronger regional focus, including cloud products from the entrustIT range.

If Trump has his way, we’ll all lose some freedom

This article is from Issue 28 of Modern Law Magazine, to read the full issue click here or visit modernlawmagazine.com

If you’ve read the news at all recently, it is likely you will have heard about President Trump’s executive orders because in his first week and a half he has signed thirteen. In the hubbub surrounding order number thirteen, the ‘Muslim ban’, another order has slipped past the scrutiny of the mainstream press – and it is an order that could rob EU citizens of their online privacy.

The focus is on Section 14 of the ‘Enhancing Public Safety in the Interior of the United States’ order, which states: “Agencies shall, to the extent consistent with applicable law, ensure that their privacy policies exclude persons who are not United States citizens or lawful permanent residents from the protections of the Privacy Act regarding personally identifiable information.”

The EU-US “privacy shield” provides EU citizens with the promise that their data, should it ever be processed in the U.S, is protected with ‘essentially equivalent’ privacy protection once it gets there. The deal is only six months old but with one stroke of his pen, Trump may have wiped it out.

The European Commission has already responded to the order, stating that the privacy shield “does not rely on the protections under the U.S. Privacy Act” but also that they will “continue to monitor” the situation. Given that Mr. Trump has previously voiced opposition to cyber privacy – most notably when he called on his supporters to boycott Apple after their much publicised case with the FBI – all of us should be concerned that our freedoms could be eroded under the Trump administration.

U.S. based companies dominate our working lives. Microsoft’s Office 365 is expected to surpass 100 million users worldwide in 2017 and Apple’s iCloud has over 782 million users. If President Trump encourages U.S. tech companies to share customer data with law enforcement, the privacy of EU citizens is in real jeopardy.

It’s time to act. Technology, particularly cloud technology, is not going away and it is impractical to suggest we revert to storing data in ring binders and filing cabinets. It is practical, however, to suggest we store our files & data in the UK or EU countries. EU privacy law is far stronger than its U.S. counterpart and will afford the citizen far more protection. Invest some time in studying your technology partners, do they store data overseas? Is your data subject to EU data protection laws?

Are you a legal firm relying on Office 365 email to handle your sensitive communications…?

President Trump has already shown how tough he is prepared to be when cracking down on security and has hinted he has little regard for cyber privacy. It is the responsibility of those who are privy to sensitive information to ensure it is protected. Are you doing all you can to protect your client data?

Grab a tin foil hat, your TV is watching you.

The opinions expressed in this article reflect those of the author, Tom Dodd, and not entrustIT

In the past, if you claimed that the Government was listening into your conversations through your TV, you might be placed in a straitjacket and carted off to the nearest mental health facility. Unfortunately, thanks to a huge data release by WikiLeaks this week, your claims would be entirely justified.

As a consumer, you may have heard of the “internet of things”. Perhaps you scoffed at the thought that your fridge needs an internet connection. The principle is that the internet of things allows us the ability to control aspects of our appliances from our smartphones. Modern appliances are becoming internet enabled and we are each being pushed to embrace a ‘smart home’, whereby our computers, televisions, lights, heating and even door locks can be controlled via apps on our smartphones. The theory sounds great, but the reality may be far darker.

WikiLeaks creates more headaches for the Government

On 7th March, WikiLeaks issued a press release codenamed “Vault 7”. In it are details of the CIA’s cyber-weapons programme, called ‘zero day’. These include malware, viruses and Trojans. The several hundred million lines of code included in zero day give the possessor the entire hacking capacity of the CIA. The leak even reveals a tool to listen in on conversations using smartphone or smart TV microphones. What’s more, the CIA (and GCHQ) appear to have been extremely irresponsible with the handling of these tools.

After the Edward Snowden leaks, the Obama administration promised that security vulnerabilities discovered by intelligence services would be released to the US based tech manufacturers on an ongoing basis. The Vault 7 leak shows that the CIA has instead been hoarding discovered vulnerabilities – presumably since they wanted them to remain open. The trouble is, if US intelligence agencies are aware of these flaws, is it not reasonable to assume that other agencies are too? Or that they will be in the future?

By discovering these flaws (in popular operating systems such as Windows, iOS, MacOS and Android) and opting not to inform the developers, they remain open to exploitation – including by those who seek to do harm. Specific CIA malware revealed in the leak is even able to penetrate both iPhone and Android software running presidential Twitter accounts. Given President Trump’s love affair with Twitter, and that one tweet from his account has the power to send stock prices plummeting, or worse still, potentially start a war, how valuable is that malware to a dangerous hacker?

Edward Snowden has had his say on the leaks

A difficult balancing act

Balancing public safety with public freedom is a difficult process. You may feel entirely relaxed about the intelligence agencies’ ability to hack into your TV if it means that you don’t become a victim of terrorism. However, in an effort to protect the public from violent terrorism, the CIA has left the public open to cyber terrorism. Some would argue that cyber weapons have the potential to deal more damage than conventional weapons. Once malicious code is out there, it is relatively easy to copy and extremely difficult to control. The very fact that this latest leak has been released indicates that the CIA and NSA cannot keep control of their sensitive data.

To be concerned about dangerous hacking tools falling into the wrong hands, or the possibility that you could be spied on in your own home is no longer a paranoid delusion. The threat is very real. The agencies that exist to protect us have left us vulnerable as a result of their recklessness.

The Bottom Line

Vault 7 is a goldmine of information – and it is damning for the agencies involved. Not only have intelligence agencies been working hard to discover vulnerabilities to spy on citizens, they have kept them to themselves – leaving them open to be exploited by hackers and terrorists. Whilst it is entirely justified to monitor terrorists, who determines who is a terrorist? How broad is that definition? We must be careful that we do not let intelligence agencies abuse the threat of terror to justify robbing us of our freedom.

In the short term, we can expect to see major tech companies patching the vulnerabilities exposed in Vault 7. Yet, we now have an idea of the lengths major intelligence agencies will go to in order to harvest information. More vulnerabilities will be found, and likely hoarded, until they are again exposed. The public should not sit by and accept that this a reality of modern life. These agencies must be held accountable for their failings.

The press release of Vault 7 can be found here. If you have an interest in cyber security – it is worth reading.

New entrust CT website launched!

old to new

The old… and the new

Your new home for IT Support and services in Hampshire, Dorset and the South of England.

entrustIT is pleased to announce the release of a completely revamped website for our sister company, entrust Creative Technology. The new website refreshes the dated design of the previous site and brings it a clean, modern feel.

entrust Creative Technology is an IT partner for SMEs in Hampshire, Dorset and the South, providing IT Support, IT Consultancy, Office 365 and Managed Wireless for companies across the South of England, particularly in main towns and cities such as Southampton, Bournemouth, Portsmouth and Winchester – to name a few.

“The new website is the culmination of months of work.” comments Tom Dodd, of the marketing team at entrustIT. “Initial feedback is positive. The aim of the website is to be as clear and concise as possible, and I think it achieves that.”

entrust Creative Technology (formally MLJ Creative Technology) was enquired by entrustIT in 2009 and has over 20 years of experience providing IT support and consulting to businesses in Hampshire and Dorset. Following on from success at the parent company, entrustIT, the team at entrust Creative Technology are looking to increase their presence in the local area. The new website is just one of the many ways in which the team is looking to achieve that goal.

entrust Creative Technology offer IT Support contracts, where a member of the team will fix IT issues whenever they arise – which is perfect for SMEs that can’t justify a full-time IT manager. The team also provides professional IT consultancy from technicians with decades of IT experience, as well as enterprise grade Wireless Networking solutions, which help you get the best possible speeds out of your internet line and Office 365 support and implementation, Microsoft’s own brand cloud solution for business. For the majority of every day IT issues, you’ll find a solution at entrust Creative Technology.

Visit www.entrustct.co.uk or call 0330 002 0045

Microsoft increase price of Surface tablets by 15%

Mountain View, CA, USA - Sept. 4, 2016: Microsoft Silicon Valley Center. Microsoft SVC is the software giant's presence in the Silicon Valley of California.

Following on from their raising of the price of cloud products on January 1st, Microsoft have announced that the price of their flagship Windows devices, the surface tablets, will also rise by up to 15.1%.

Microsoft cite the cause for this price increase as the falling value of the pound since the EU referendum. Since 23rd June, sterling has fallen by 16% against the dollar.

“In response to a recent review we are adjusting the British pound prices of some of our hardware and consumer software in order to align to market dynamics,” it said in a statement.

“These changes only affect products and services purchased by individuals, or organisations without volume licensing contracts.”

This means that the price of the 1TB Surface Book, the top of the range Surface model, has risen to an eye-watering £3,049.00, while the cheapest Surface Book is now £1,449.00.

Microsoft is not the first tech company to raise prices in the UK, with companies such as Apple, Dell and HP also raising prices since the EU referendum.

Microsoft Calls Time on Windows Vista

Close-up part of young man using his laptop while sitting at his working place

Microsoft has officially announced that it will end support for Windows Vista on April 11, 2017. This follows on from the end of support for the popular Windows XP in 2014. End of support means that from April 11, 2017, Microsoft will no longer release regular updates and security patches for Windows Vista.

What does this mean?

Without any security patches, Windows Vista will be vulnerable to cyber attack and it will therefore be unsafe to use after April 11, particularly if you use your PC for banking or internet shopping. If you own a PC running Windows Vista, now is a good time to think about updating it.

What options are there for me?

Windows 10 is Microsoft’s current Windows platform, and it is here to stay. In fact, Microsoft have a major update in the pipeline. This update will focus more emphasis on animations and visual effects, with the goal of creating a more aesthetically pleasing user experience. The new update, called Project Neon, is set to be debuted in May and released later this year.

If your PC is not currently running Windows 10, unfortunately you have missed the free update offer. However, depending on the hardware specification of your PC, it might be a better option to upgrade the machine entirely. Microsoft cite Windows 10’s minimum requirements as a 1GHz processor or faster, coupled with 2GB of RAM and 16GB of free hard disk space. Remember, these are minimum system requirements. If you would like a PC that runs fairly quickly, my recommendation would be that you at least double the minimum requirements. That means 2GHz processor or faster and 4GB of RAM or more.

How do I check my PC specification?

It’s actually really easy to do. On a Windows 7/Vista PC, click start > control panel > system and your specifications will be listed in the window. If you do own Windows 10 but feel your computer is a bit slow, the process is slightly different. Click Start > settings > system > about.

Your cyber security is so important

As was common around the Windows XP support deadline, some users do not feel the need to update or upgrade a PC that has served them faithfully for a number of years. Vista was a less popular operating system than XP and many of its users moved on to Windows 7 at its release. However, for those that are still running Windows Vista, it is crucial that they upgrade before April 11. A study by PwC in 2013 found that 63 percent of SMEs were attacked by an outsider in that year. Why make it easy for those outsiders to attack you?

Don’t leave yourself vulnerable – upgrade your Vista PC before April 11.

Reflecting on a good year

10 year anniversary - Building a successful businessAs we look back over the last 12 months, there is a lot for our company to be proud of

2016 was a year that started with much optimism. We were founded in 2006 so 2016 is our tenth year of trading. We survived the worst economic downturn since the Great Depression and have come out the other end thriving, nearly doubling our turnover in 2015 alone.

This year we exhibited at a number of business shows, including the British Legal Technology forum and Legalex. Reception at these shows has been positive, even if the cloud is still met with scepticism by lawyers.

We acquired two new members of staff. Tom and Paul are settling into our support team well and have already resolved more than 1000 support tickets between them. Our support team has also been bolstered by Mat, who finished his apprenticeship this year and is now a qualified support technician. The new office unit we acquired last year is already filling up and we expect to continue to grow in 2017.

After a new software release by Citrix in late 2015, we developed our 3D Design Desktop. Built for architects and designers, who have been a major part of our customer base for a number of years, 3D Design Desktop augments a hosted desktop with virtualised high-performance graphics cards, allowing 3D CAD rendering to be performed anywhere, at any time, on almost any device. This level of work freedom was simply not possible before and our customers have no shortage of positive comments about the product. 3D Design Desktop has also led us to finalist nominations in three business awards – one of which is hosted by the British Computer Society.

After the Brexit vote, much has been said about the future of the UK economy. Some positive, some not. Fortunately, we are well positioned to deal with fluctuations in the currency market and uncertainty in the economy. To echo the words of Sally Taylor MBE speaking at the Solent Business Awards “business is alive and well in the Solent region” – the area in which we are based. This is certainly our experience as we have travelled across the country this year for shows, expos, networking and awards – business is still thriving across the country. Whatever happens in the next few months and years, I am confident we will withstand anything that is thrown at us.

On the non-business front, our team claimed victory in two Go-Karting championships against other technology companies in the South, and a golf tournament against other businesses in our region. Our staff proudly display their trophies on their desks and these events have certainly improved team cohesion!

As we look back over this year, our 10th year, there is a lot for us to be proud of. A successful business is only as strong its people and our team has worked immensely hard this year, despite increasing workloads, to ensure that we continue to provide a secure, resilient and useful cloud service to our customers. As we continue into 2017 that optimism is still there, but the bar has been raised. An exciting year awaits.

Does technological progress really benefit us?

blue tone city scape and network connection concept


I recently spent some time in a Tesla Model X at the Goodwood Festival of Speed. The salesman on the stand at the show excitedly walked me through some of the technology on the vehicle and told me about the car’s ability to drive and park itself. I came away from that stand with newfound respect for Tesla cars – the technology on display really is a snapshot of the future of motoring. A car that is able to drive you down the motorway at 70mph in heavy traffic without any input from the driver is likely to dramatically cut the number of road deaths each year. After all, a study by Stanford University found that 90% of road traffic accidents are caused, at least in part, by human error. With Google, Uber and others working on driverless car technology, we can fairly safely assume that driverless cars will become the norm in a few years’ time.


However, not everyone is happy about this new driverless car technology. Those who rely on driving to make a living look set to see their job opportunities dry up in the future. Taxi and lorry drivers are particularly worried about the new developments. “What of the millions more whose livelihoods depend on the truckers coming up and down the country, stopping for food, drinks and sleep? “It’s going to be a huge problem,” says Andy Stern, the former president of the Service Employees International Union. There are around 3.5 million truckers in the United States alone – which means 3.5 million people are at risk of losing their jobs in the future and will almost certainly need to change their career entirely.

The motoring industry is not the only victim of technological progress.


Many of us use social applications such as Facebook, Twitter and WhatsApp to communicate. Every day, 30 billion messages are sent on WhatsApp alone. In response to pressure from consumers, WhatsApp added end-to-end encryption for messaging on their service, meaning that only the sender and the receiver of messages can know what they say. They cannot be intercepted by hackers. This is a major victory for privacy, but a catastrophic problem for law enforcement. Encrypted messages give criminals and terrorists a way to communicate and co-ordinate without any danger of being caught by law-enforcement. Whether encryption will result in more terror attacks and more crime remains to be seen, but it is a concern.

Mental Health

Furthermore, there are a number of studies which suggest that the rise of social media has also led to a rise in mental health problems, particularly among teenagers. Rates of depression and anxiety in teenagers have risen by 75% in the last 25 years. People who post to social media naturally cherry pick the best bits of their lives to show to the world. This gives people a warped perception of how beautiful a person is and how good their lives are. Airbrushed magazine covers and exciting Instagram profiles lead some people to feel they cannot compete and gives them a sense of worthlessness.

Mental health has become such a problem that the UK government pledged a record £11.7bn to mental health services in the NHS, but many feel that this is not even close to what is required to tackle the problem.

But is it all bad news?

Not at all. Going back to driverless cars, since 2012, the self-driving cars tested by Google, Delphi and Audi have logged more than a million miles on public roads, and have been involved in 11 accidents. That’s one accident every 91,000 miles – hardly a regular occurrence. As the technology improves, the number of accidents will be cut further. It is not unreasonable to expect that driverless cars will stop all accidents at some point. Given that nearly 1.3 million people die on the roads across the world annually, driverless technology is ultimately hugely beneficial.

The progression of cloud technology has allowed people to transfer information amongst each other securely and instantly. Scientists can collaborate on research in real-time, colleagues can communicate with each other across the world instantly and students can find out about that important subject for their essays without trundling through stacks of books.

Technological progress helps us to live longer, communicate better and provides us with more spare time to do the things we love, rather than tedious tasks.

The benefits of technology mean that there isn’t really a good reason to put the brakes on technological growth.

How can we make technology work for all of us?

Not all of us will benefit from technological advancement. Improvements to transportation in the 20th century killed off industrial jobs in the west, as globalisation led to cheaper, foreign industry out-competing the more expensive western industry products such as coal and steel. These communities still haven’t recovered as former miners and steel workers have been unable to find new work.

Technology works best when it augments the skills of a worker, not removes the need for one. Technology that empowers people to be more efficient benefits the workers, the employers and society. Focus on improving efficiency rather than removing labour means that wealth is spread out among society and not just concentrated at the top – removing the need for human workers depresses wages while those in power grow their wealth exponentially.

Cloud technology is a great example of this. With its focus on improving communication between workers, advancing information flows and providing the freedom to work anywhere – the cloud seeks to augment workers rather than replace them.

There is a certain inevitability that technological progress will replace workers in some sectors. For those unfortunate ones, it is important that investment in re-education occurs in order to return these workers to the labour market. That way we can avoid the depression of whole communities across the west and can make technological progress work for all of us.