Do You Know Where Your Data Is?
With an ever-increasing number of devices, gadgets, sensors and scanners gathering our personal data, it's difficult to know where it all goes. Yet, to meaningfully increase cybersecurity and privacy effectiveness, each of us, from members of the general public to leaders of all types of organizations, needs to remove our digital blinders.
While we may never have a full understanding of where all of our information is stored, there are things we can do to minimize its collection... or at least be aware of who has it.
Read on to learn more about the people, places and things siphoning our data and what you can do to limit that access.
|
|
Data Security & Privacy Beacons
|
People and places making a difference**
Have you seen an organization or individual taking actions to improve privacy? Send me a note to nominate a privacy beacon of your own!
LinkedIn has made changes to its Groups settings. The enhancement allows administrators of groups to select either Listed or Unlisted. If they choose Unlisted, the group cannot be found in search and will not be visible on members' profiles. This allows LinkedIn members to participate in groups they may not want others to know they are in (a good privacy move). Of course, it's
important for users to remember, however, that posts to unlisted groups are as vulnerable as anything else on the Internet. Fellow Unlisted group members can screenshot and share content; LinkedIn could experience a breach; any number of slip ups or break-ins could expose your posts to the world.
The Denver Elections Division
really impressed me earlier this month when I reached out to ask a few questions about the security of their systems. Not only did they respond quickly, they did so thoroughly. And, I really like the online resource they created, "Ballot Life Cycle." It shows, through an simple-to-navigate interactive page, what happens at every stage of an election ballot's life -- from the certification of candidates to a risk-limiting audit and authentication of voting results. It's both refreshing and encouraging to see such care given to transparency and communication from a U.S. state election division.
USPS has begun to offer its customers an "Informed Delivery Daily Digest." The free service sends users grey-scale images of the letter-sized mail pieces that will be delivered to their mailboxes. It also shows packages expected to arrive that day. Are there privacy risks? Yes, if you share your email notification with others. And, the first Daily Digest email I received via email was not encrypted. I've experienced problems with mail being taken or delivered to other houses. So, it's good to be able to compare what I receive to what I am expecting. It's worth noting that not all mail is included in the service; things like coupon flyers, magazines and catalogs are not scanned by USPS. I need to check into this a little more, but so far I like it, particularly because I can see payments and bills coming in.
The FTC
has banned a company from selling stalkerware, software that monitors consumer mobile devices. MobileSpy, PhoneSheriff and TeenShield allow people to monitor others' smartphone activity without their knowledge. This is
the first time the FTC has brought a case against developers of stalkerware apps... hopefully it's far from the last!
**P
rivacy beacon shout-outs do not necessarily indicate an organization or person is addressing every privacy protection perfectly throughout their organization (no one is). It simply highlights a noteworthy example that is, in most cases, worth emulating.
|
|
Stalker Finds Data Through Reflection in Eyes
|
|
A warning about posting photos online
If you're posting photos online, you'll want to take heed. With continuous enhancements to smartphone cameras, snapping and sharing high-resolution photos is easy to do.
The problem?
The photos are of such amazing quality that even the finest details can be captured.
Take the recent incident with a Japanese popstar whose photo led to her attack by a crazed fan.
Newsweek
reported the story.
When arrested, the stalker explained how he zoomed in on the photo, which revealed a reflection of a bus stop in the singer's pupils. Using Google Street View, he was able to identify where she lived and assault her in her home.
The danger in this situation was a lot more than meets the eye - it was in the eye.
How to protect yourself
It's not just pop stars who can be targeted by digital stalkers. Everyone should take precautions, such as reducing the quality of images or disabling photo geotagging on your phone.
- Go to Settings and tap Privacy
- Select Location Services and tap Camera
- Select Never
- Open your camera app
- Click the Setting button
- Find GPS Tag and turn it to Off
|
|
|
A fake thank-you email sends up red flags.
The click bait subject line, "Thank you for your order," is nearly impossible to resist.
You think, "Did I place an order I forgot about? It's been known to happen!"
At first glance, an email like the one below seems legitimate. But, savvy scam spotters will quickly recognized what it is -- yet another phishing attempt.
Can you spot the red flags?
APPLE PHISHING EMAIL RED FLAGS:
- While the name in the From field is "Apple Store," the domain name is clearly a mismatch <info@patsbarandgrill.com>.
- Hovering over the hyperlink in the email reveals a completely unrelated site.
If you receive an email from Apple that looks suspicious,
read these
tips from the company before clicking any links. Their tips
apply to fake messages appearing to be from other companies, as well.
|
|
A roundup of risks from common apps and devices
A New Internet Explorer Bug Can Take Over Your Entire PC, So Stop Using It
: One click and your entire system can be compromised. Hackers can delete, change or add accounts at will. If you're still using it, it's time for a change; the IE browser has known security problems, and has for years. I use Firefox, Chrome and occasionally TOR on my Windows 10 desktop and laptop.
Apple iOS 13 Is Full of Bugs, Reports Warn
: Did you recently install the Apple iOS 13 software? After numerous reported problems, including a "significant security flaw," warnings were issued for millions of users. Apple has released an update (13.1.3), which I would encourage you to install on your phone.
Kids Amino App Ask Girl, 10, For Topless Photo to Verify Age
: Kids' dress-up anime game displayed a disturbing message, one that said it was from an "employee of Amino," threatening to ban young girl from the site if nude picture wasn't sent. I encourage everyone to know and regularly check the apps their children have on their phones. Immediately remove those that present privacy and safety risks.
Samsung: Anyone's thumbprint can unlock Galaxy S10 phone: A software flaw...that SHOULD have been found by thorough testing prior to release to the public... was discovered in the new phone. It allows any user with a thumb to access the phone's data. This is a particularly significant risk because the technology provides users with a false sense of security. When people feel protected, they tend to exercise riskier behavior. Remember, devices and apps you use are only as secure as the engineers, software developers and testers made them. Sometimes they don't test much!
|
|
|
Cops Request Access to Smart Doorbells
|
How will law enforcement ensure data security and privacy?
| | | |