 |
|
Giving our Grads the Best Chance at Success
It's that time of year again. Wide-eyed graduates the world over are preparing to embark on the next phase of adulthood. Will they do so with a clean slate? Or will the data trail they've left, most since early childhood, challenge their dreams?
Read on to learn how you can give the young people in your life the best chance at a strong future - one in which technology helps, not hurts - their chances of success.
... and I hope you enjoy the photos, each captured at my son's recent graduation.
IN THIS ISSUE
|
|
Data breaches and compromises open the doors to your personal data.
The digital black market, a.k.a. the dark web, is home to every conceivable type of stolen personal data - from social security numbers to the name of childhood pets.
Curious if your data is out there for the bidding?
NOTE: I could not quickly find a privacy notice posted on the site of the above tool, so keep that in mind if you want to use it.
We don't go a day without hearing about a data breach or information security compromise (and there are hundreds of others we don't hear about). The chances of your information NOT being for sale on the dark web are small. Knowing about it, though, is a huge first step in preventing fallout.
That's because there are things you can do to protect yourself should you find your information for sale on the digital black market. These include changing your passwords, being alert to calls, emails and texts that seem out of place and contacting the credit reporting agencies to let them know your personal profile has been compromised.
|
|
Fake Emails that Look Totally Real
|
|
Anyone in a hurry could fall for this one...
... but look closely. Even this well-designed phishing attempt, delivered to its target via mobile email, contains red flags. Look closely, can you see them?
Did you find them? (Maybe you found others... if so, let me know!) Here are the ones I caught:
|
|
Security Threats from Your Used Car
|
|
If you can connect to your car via smartphone, so can they.
Consumer Reports recently wrote a heads-up article for all used car buyers. It warned us the former owner may still have remote access to the vehicle we just purchased. To illustrate their point, they shared a story:
"[The used car seller]... later noticed that his old car remained listed... on the smartphone app he used to control it. If he wanted, he could still remotely unlock the doors, find the car's exact location, and control the heat and air conditioning. He figured his access eventually would be cut off, but years passed and nothing happened."
Buyer... and seller... beware
New buyers may also be able to access an old owner's information, such as home address (logged into the GPS), garage door openers (still programmed for the old home) and phone contacts (logged in the hands-free driving feature).
Importantly, the same can be true for homes. If you have purchased a home with connected security features, like steaming video of front-door visitors or remote unlocking, be sure to reset them. If you're not sure how, contact me and I'd be happy to research it alongside you.
|
|
Could You Lose Your New Home to Hackers?
|
|
In North Carolina, Jon and Dorothy Little were about to sign on the dotted line for their $200,000 home when they learned of a problem. Their lawyer's office had been hacked. And in the process, their payment had been stolen, right out from under the couple, the lawyer, the realtor and the bank.
Even though the FBI was able to freeze most of the stolen money before it moved overseas, policies and procedures at the couple's credit union prevented them from getting their money back immediately. So... no money, no deal. And the sellers of the home moved on to the next homebuyer.
The lesson?
Don't be afraid to ask questions of the businesses you engage for large transactions. Ask them if they perform even basic tasks to protect you. In this case, a simple phone call from the realtor to the law firm may have prevented the entire disaster.
|
|
Another Public Employee Under Fire for Personal Email Use
|
|
It's déjà vu all over again.
Well, it's happened again.
This time, it was a utilities board chairwoman using her email for non-work reasons. Not nearly as racy, but just as foolish, the emails revealed she had improperly mixed her state job with a personal law practice.
The lesson?
Understand that every single email you write is logged, tracked and the contents likely accessed. Be mindful of the use and the contents of every email, text, chat, etc. you send over the company or organization network! Even "personal" emails are tracked by Google, Hotmail, AOL, whatever... perhaps even your internet service provider (ISP).
- Never send or receive sensitive personal email from a business email system, even if you are planning to leave your employer.
- Personal and explicit messages sent through business computers and systems could very well become widely known to the public in a very damaging and humiliating way. There are many e-discovery and open records laws that provide access to business email systems.
- You can ruin your business, and possibly personal life, if you send non-business information using the business email system. You could also ruin the lives of those with whom you are exchanging emails.
|
|
The Future of Surveillance is Scary
|
|
... and in many ways, the future is already here.
What follows is a quick round up of the ways people, agencies and businesses can trick you into giving away your most private and personal information:
Following you in a crowd:
Computers and other technology, such as artificial intelligence, machine learning and facial / biometric recognition are getting very good at spotting people in a crowd and following their movements. Check out this video, shared by Joe Shook, to learn how they are doing it.
Slowly removing choice:
When Twitter rolled out its new privacy policy, it removed the "Do Not Track" option. This feature once allowed users to opt out of being tracked by advertisers.
|
|
Privacy Professor On The Road & In the News
|
|
One of my favorite things to do is visit with leaders in different industries - health care and managed systems providers to insurance and energy (and beyond!). Below are a few of the events I have scheduled for the upcoming season.
In the news...
Information Security Buzz
Credit Union Times
Healthcare Info Security
IT GRC Forum
The morning TV broadcast regularly covers privacy and security tips with their guest, the Privacy Professor! Each is a brief 10-15 minutes and covers topics ranging from insider theft to connected vehicles. Check out
this online library to watch recent episodes.
|
|
Best of wishes to each of you celebrating the successful graduation of the students in your life. I know from personal experience how fulfilling it can be to watch your loved ones do well and head out into the world.
Thank you to all of you for engaging with me in this effort to make sure it's a secure world in which they move about and reach for the stars. Privacy and data security is so important, especially for those just starting out.
Keep talking loudly and often about how much you care... those in influential positions are bound to hear!
Have a fabulous June,
Rebecca
Rebecca Herold
The Privacy Professor
|
|
|
|
|
|
 |
|