Why Are You Getting This?


You signed up to receive the Tips, initiated contact to stay in touch with Rebecca and/or Privacy & Security Brainiacs (PSB) or consented to receive the Tips. Please read our Privacy Notice & Communication Info at the bottom of this message for more information. You may unsubscribe from there as well. 

It's March Security and Privacy Madness!

For those of you who may not be basketball fans, the month of March in the US is known as “March Madness.” It is the time from mid-March through to the beginning of April when the National Collegiate Athletic Association (NCAA) men's and women's college basketball tournaments are held, and their great excitement for fans, and a lot of betting, parties, and related products being sold. March is also when most schools have spring break, which also brings a lot of madness with trips and special events. Let’s not forget St. Patrick’s Day and all the often wild, along with the reverent, celebrations, too. And many more festivals and special events as spring starts blooming in the Northern Hemisphere.  Of course there are crooks who see this madness and take advantage of all the merriment, travel and celebrations, where people often have their security and privacy guards down as they enjoy the wide range of “madness.”


This month we bring you a wide variety of tips for keeping sane during these periods and places of madness. We are replacing the monthly awareness activities suggestions with Privacy & Security News You May Have Missed, with what our team found to be somewhat unusual types of news items. We are also changing up the Questions and Tips section. Do you like what we’re doing with these changes?


Do you have stories, examples, or concerns about the topics covered in this issue that you would like us to provide feedback on? Send them over! We may discuss them in an upcoming Tips.


We hope you are finding all this information valuable. Let us know! We always welcome your feedback and questions.  


Thank you for reading!

Rebecca


We would love to hear from you!

(CC) Creative Commons Photo by Polina Kovaleva

March Tips of the Month


  • News You May Have Missed
  • Privacy & Security Questions and Tips 
  • Data Security & Privacy Beacons*
  • Where to Find the Privacy Professor

News You May Have Missed

© Carrier Pigeon-Amber Alexander

We’re sharing interesting security and privacy news that demonstrate that these types of risks exist basically anywhere in the world, and that everyone needs awareness. Here is a baker’s dozen of the many such articles our Privacy & Security Brainiacs team found interesting, in no particular order. Read next month for even more. Do you have interesting, unusual, bizarre or odd stories involving security and privacy? Let us know!


1.   A pigeon held for eight months on suspicion of spying for China has been released after Indian authorities determined it was no avian agent of espionage. A similar incident in 2015 sparked amusement in India and Pakistan, and in 2020, police briefly held a Pakistani fisherman’s pigeon after it flew over the countries’ heavily militarized border. This harkens memories of World War I when pigeons were used in reconnaissance operations to carry messages to Allied forces, and also had cameras strapped to them.

2.   The teenage hacker who leaked clips of the new Grand Theft Auto VI (GTA VI) has been sentenced to a hospital stay of indefinite length. Arion Kurtaj, an 18-year-old from Oxford in England, could remain in a secure hospital for life unless doctors determine he is no longer a danger to the public.

3.   Apple phone hackers target intoxicated people who aren’t paying attention to their phones.

4.   Kenyan digital rights campaigners warn a phone tracking program the government said it was implementing to trace counterfeit devices and curb fraud could lead to increased state surveillance and invasion of privacy. 

5.   Your fingerprints can be recreated from the sounds made when you swipe on a touchscreen. Chinese and US researchers reveal how a new side channel can reproduce fingerprints to enable attacks.

6.   Canada-based University of Waterloo is removing M&M-branded smart vending machines from campus after outraged students discovered the machines were covertly collecting facial-recognition data without their consent. The scandal started when a student using the alias SquidKid47 posted an image on Reddit showing a campus vending machine error message, "Invenda.Vending.FacialRecognitionApp.exe," displayed after the machine failed to launch a facial recognition application that nobody expected to be part of the process of using a vending machine.

7.   Ring will no longer publish public  police requests for footage from its cameras without a warrant. However, when law enforcement now requests footage from cameras, Ring indicates it will provide footage without a warrant in "emergency" situations, but that the associated users of the cameras will not be notified or asked for consent.  

8.   This was a report about a law bill introduced in the US congress. Some privacy impacts involve the included surveillance items, which are fairly consistent, and increasing in many areas, for past bills, and bills submitted since. A few excerpts: “More than $400m (million) in funding for additional border surveillance and data-gathering tools…$170m for additional autonomous surveillance towers and $204m for “expenses related to the analysis of DNA samples,” which includes those collected from migrants detained by border patrol.”

9.   An interesting phishing message claiming to be from Elon Musk promised a chance to win a trip to Mars.  

10. Drones flew over Todd Maxon’s 5-acre Michigan property multiple times in “an effort by the local Long Lake Township to surveil the Maxon land over a zoning dispute involving his hobby of fixing up old vehicles…But the township did so without getting a warrant first – and Maxon and his legal team say that infringed his constitutional right against unreasonable searches.”

11. A customer alerted a worker at a Los Angeles 711 about a skimmer installed at the checkout.

12. Privacy Beats Ransomware as Top Insurance Concern. Despite ransomware losses remaining high, privacy violations have quickly risen to second in a list of expected cyber insurance claims costs. 

13. CNN is “facing a massive CIPA class action for violating CIPA Section 638.51 by allegedly installing “trackers” on its website.” The lawsuit is Lesh v. Cable News Network, Inc. This is not the first case like this for trackers; such cases are quickly proliferating. However, most of those have been for violations of VPPA. This demonstrates what could be an emerging trend for using CIPA in such tracking cases.

 

Have you run across any odd or bizarre security and/or privacy news? Please let us know! We may include it in an upcoming issue.


Privacy & Security Questions and Tips

Rebecca answers hot-topic questions from Tips readers

March 2024

We continue to receive a wide variety of questions about security and privacy. We also are still receiving many questions about HIPAA and personal health data. Thank you for sending them in! We’re going to try something new starting with this issue. We’re providing a deeper dive in what we are calling our Question of the Month. Then for the other questions, we are providing higher level answers, for which we will be going into deeper dives with details in separate blog posts, YouTube videos, and our online training and awareness courses. We’re doing this to cut down a little bit on the length, while also still providing value to everyone whose questions we’re answering. Do you like this different format for this section? Are the answers interesting and/or useful to you? Please let us know! Keep your questions coming!

CC BY 4.0 Deed | Attribution 4.0 International by LittleRoamingChief

Question of the Month:



Q: What are some basic steps that every organization should take to strengthen security and privacy that individuals can also use in their personal lives as well?



A: Here are some basic steps that every organization, throughout all industries and worldwide locations, from one-person businesses to those with over a million employees and workers, should take to strengthen security and privacy. Individuals can also use these actions in their personal lives as well. These should be considered the minimum core security practices for anyone.


1. Use strong passwords, and different passwords for different purposes. 

Using passwords is the most basic of cybersecurity practices. And the one that the majority of folks throughout the world are horrible at doing well. Researcher Sam Boyd reported at the end of 2023 from his analysis of 18.4 million passwords, 9 million of which were from the general public, the following most-used passwords in each of the associated countries:

The following were the most used passwords throughout the world, for organizations and individuals combined:

1. 123456; 2. password; 3. 123456789; 4. 12345; 5. 12345678; 6. qwerty; 7. 1234567; 8. 111111; 9. 1234567890; 10. 123123


Other studies show repeated numbers (e.g., 9999999), letters (e.g., bbbbbbbbb), and words (e.g., FirstnameLastname) are also commonly used worldwide. Do you use such passwords? Well, if so, stop doing that! You’re making yourself a sitting digital duck for a cybercrook hunting an easy victim.


Despite decades of proclamations to the effect that, “Passwords must be replaced with a better authentication method,” passwords are going to continue to be used for the foreseeable future, for a wide range of reasons that I could fill a book explaining.


To have strong passwords that actually will keep people out of proprietary, sensitive, confidential and personal data, at a minimum do the following:

a.    Create passwords that contain as many characters as possible.

b.    Make them complex; using upper- and lower-case alpha characters, numerals, and special characters.

c.     Do not use anything that can be found in any type of dictionary.

d.    Make them hard to guess; don’t use the names of sports teams, celebrities, math equations, games, or anything else publicly available, such as in lists online…including lists of the world’s most common, worst passwords.

e.    Use different passwords for different types of purposes. For example, you should not use the same password you use on TikTok, Facebook, Spotify, or similar types of social media sites as you use on your employer’s network, which should also be different from your password used for your banking, and different from the password to your patient data portal, and so on.

f.     Do not use biometrics as a password substitute, as the sole authenticator, at this point in technology development. AI has exposed a large portion of biometric authentication to being susceptible to successful impersonation using AI tools, including for voice, face, fingerprint, iris, and other biometric identifiers. Which takes us to the next basic cybersecurity practice.


2. Enable multifactor authentication, or MFA, to prove you are who you say you are online. 

MFA has been proven to be extremely effective in protecting against automated cyberattacks because it takes more than just one authenticator (typically a password) to authenticate to get access to data and systems. MFA isn’t yet used everywhere, but is increasing in use and has long been used for banking, healthcare, corporate portals, online stores, and other favorite hacker targets. Activate and use MFA everywhere possible. If it is not offered, then request it from the associated site or application. 


So, continuing from item 1, if you do want to use a biometric authenticator, use it in addition to another authenticator. Using two or more authenticators is generally referenced as multi-factor (aka multi-step or two-step) authentication. MFA uses a combination of two or more of:

  • Something you know, such as a password, PIN number, etc.
  • Something you have, such as an authentication app on your phone, a physical device such as a key fob or digital code card, etc.
  • Something you are, such as your fingerprint, face, voice, etc. 


3. Enable every computing product for automated updates. 

Software is nearly everywhere. Make sure you set them up for automatic updates when you install new software. If you’ve not yet set up software for updates, go back and do it now. Also, set up every type of computing product (laptop, desktop, tablet, smartphone, etc.) to receive automatic updates. The most compromised, hacked computing products are those that have not been updated with the latest security and privacy patches. Automated software and firmware updates not only install new capabilities, they also fix security and privacy holes that have been discovered.


You need to do this for all computing products. Automatic updates are not only needed just in your more commonly considered computers, but also in “smart” internet of things (IoT) products, all of which connect to the internet and other types of networks, makes all IoT products (fitness trackers, digital assistants, security systems, smart appliances, etc.) attack targets.


4. Practice ongoing app security management.

Without looking at your phone, answer this question: How many apps do you have? Write it down.


Now, look at your phone. How many apps do you actually have? I’ve asked this question of my clients, readers, listeners and those who attend the events where I’m speaking many times throughout the past 20 years. With rare exception, everyone has more apps than they thought they did. Why? Two primary reasons:


1) Most people will download an app if they are somewhat interested, and when most of those are not something they actually end up using, they leave them on their phone; and

2) Often apps are automatically loaded to your phone from websites you visit, especially those the you got to from clicking a link in a social media site, email, text or a popup window. So, most people aren’t even aware they were loaded in the first place.


Many of those apps are malicious by design, and those successfully hooking you into downloading them didn’t really expect you to use the app. Other apps do provide some entertainment or useful utility, that you may realize isn’t something you’ll use once you’ve downloaded them. However, they are still running even when you don’t use them. Additionally, most people are thoughtlessly agreeing to let all the apps they download to take all their digital contact lists, their GPS/location, access to control and use their camera and microphone, content of their messages, activity logs, to post to sites on behalf of the app user, and often even to give them access to their passwords, as part of the terms of use required to be followed when the app is loaded. If you have this habit if simply agreeing to terms without reading them, you are literally allowing all those who provided those apps to do anything they want on your behalf if they have that intent.

  • Immediately disable apps you have never used, and haven’t used in the past month or so.
  • Then uninstall those apps.
  • Next, delete all associated software and files, which most apps will leave behind to be able to hook the device user back into their digital ecosystems.
  • Repeat the above periodically. Remember, you may have had apps installed without realizing it.


Keep an eye out for indicators you have malicious and/or spying apps on your phone, such as getting unsolicited calls or texts about things that may creepily be related to something you’ve looked at online, or from a location where you’ve physically been. Also look for your camera, video or audio recorder lights turning on randomly; it may be an app activating them and sending the recordings elsewhere.


5. Learn to recognize and report social engineering, like phishing, attacks. 

Social engineering tactics, such as manipulating people and tricking them into doing actions to benefit the manipulator in some way (e.g., through phishing messages), have been around since the beginning of civilization. Old face-to-face methods still work, and more and more digital methods are emerging daily as new tech and new activities emerge. Social engineers are always looking for new email, texting, social media, phone, and other new technology ways to convince you they have a legitimate need for you to click a link or provide some sensitive information in some other way. Their strategies are always changing.


Stay updated through taking security and privacy training, and reading alerts, such as what you find in my business’s monthly Privacy Professor Tips messages (sign up for updates of them here). 


Keep in mind that artificial intelligence (AI) tools are becoming ubiquitous. If you get any type of request for your money, sensitive data, or for you to urgently perform any other actions, stop before you act. Call the purported requestor to see if it was really them who asked you for the information and/or action. This includes for calls that seem very convincingly to be from family and friends sounding frantic and claiming that they have been kidnapped, are being held in jail, have been in a car accident, or some other disaster has occurred. AI tools can sound and look very convincing.


6. Physical security

Often when increasing digital vigilance for security and privacy risks, physical risks get put on the back shelf. Physical security protection is one of the most important and too often overlooked type of cybersecurity protections. Many folks confuse physical safety protections as with being physical security since security and safety are often used interchangeably. However, the specific physical security actions are directly and necessarily responsible for supporting and accomplishing cybersecurity, no matter how counterintuitive it may sound.


You must still physically secure information, and protect your privacy, and the privacy of your family, friends and others. This includes keeping information in all forms from being seen and heard. Lack of physical security practices have resulted in hundreds of millions of cyber breaches, allowing unauthorized access to data that would not have been possible if the physical security practices had been in place. Computing devices, associated components (hard drives, USB drives, monitors, speakers, etc.) and hard copy items often contain a lot of confidential and sensitive information, such as personal data and intellectual property. These devices and hard copy items often contain a lot of personal information. Not only can this data be accessible and used for fraud, to gain access into networks, and other malicious types of activities, you could be violating any one or more of a large and growing number of personal data protection laws and regulations.


A few key actions to take include:

  • Use privacy screens on your phones, tablets, laptops, and monitors to keep others from seeing what you have on your screens. In hundreds of flights and in thousands of work meetings I’ve been able to see way too much information on the screens of others…including on flights where elected officials were working on their computers, with top secret information in large font/size on their screens for everyone passing by to see and possibly record with the click of a photo!
  • Configure screensavers to kick in after a reasonable idle period. The more people you have in your vicinity, the shorter the period should be.
  • Remove personal information and other confidential information, in any form, from the tops of your desks and other accessible locations whenever any type of work area, in any location, is unattended and unlocked.
  • Don't leave your computer unlocked and walk away. I see people doing this with their laptops, tablets and phones all the time while traveling, in restaurants, at conferences and other events, etc.
  • Don’t discuss or show confidential, sensitive or personal information in public. Many people provide personal data, often of others, in elevators, lobbies, restaurants, bars, and other public places. I’ve traveled with a notebook over the past 25 years and have documented and filled many of them with such situations, such as when the bank account numbers, passwords, social security number, birthdate, address, and other even personal information of an ex-girlfriend of a man speaking very loudly on his phone in an airport boarding gate area.
  • Lock computing devices, storage devices, confidential papers, and other business artifacts, within in-room hotel safes or take with you when leaving hotel rooms, remote meeting rooms, and other areas where unauthorized access and/or use could occur.
  • Always be aware of surveillance cameras in the vicinity, which can also record and hear what you are doing and saying.


My team has provided free lists of the types of products and services that you can use to protect your privacy and secure your information. We’ve received a lot of great feedback on them and have been told they are not only helpful, but entertaining. For example, see our “Privacy and Security Gifts” list.


7. Securely Dispose of Hardware, Software, Storage Devices and Print Info.

Don’t forget about security and privacy when you no longer will use a computing or digital storage device, or are getting rid of hard copy documents, or cleaning out offices or homes when moving. These devices and hard copy items often contain a lot of personal information. Not only can this data be accessible and used for fraud, to gain access into networks, and other malicious types of activities, you could be violating any one or more of a large and growing number of personal data protection laws and regulations. Here’s a case in point: On February 14, 2024, California Attorney General Rob Bonta today announced a $5 million settlement against Quest Diagnostics, Inc., that in large part was for recklessly and in an unsecure manner disposing of protected health information (PHI), as defined by the Health Insurance Portability and Accountability Act (HIPAA) within the Security Rule which explicitly requires physical security to support the digital security of PHI. Any size and type of organization is subject to such legal fines under a wide range of legal requirements, as well being subject to civil suits. I’ve served as an Expert Witness in eight cases so far involving testimony about the cybersecurity practices that were, and were not, used. Such legal actions being brought more often as breaches and privacy violations continue to increase.


Take the following actions before giving away, selling, repurposing, or throwing away computing devices and associated components and storage devices:

a.    Decide if you need or want to keep any data on the device. Back it up to a secure (e.g. encrypted) storage device that you have complete control over. I like USB drives that I can then keep local (in my home office), offline (not attached to the internet), and can secure (lock in a safe). If you choose to save to a cloud service, use a service that at a minimum strongly encrypts your data, cannot decrypt your data, and uses MFA.

b.    Completely remove all data and apps from computing devices, including phones, when you will no longer use them. Doing a reboot, or restoring to factory defaults alone will not remove everything. Remove the SIM cards, and/or whatever other storage component is used.

c.     If you are not sure if all the data and software has been removed, and you are disposing of the device, it’s okay to smash it to pieces to the point where the data cannot be accessed even if reconstruction is attempted. However, you still need to make sure you are safe when doing so (wear work gloves and goggles, etc.), and dispose of any type of electronics using a service where the associated chemicals will not poison the ground or water in landfills.


For even more guidance and tips about these seven actions and many more topics, here are some more of our resources: Visit our webpage; check out our blog; subscribe to our YouTube channel; follow us on LinkedIn.


Quick Hits:


Q: I’m seeing more warnings about hacking attacks on the critical infrastructure. They never indicate what components are in the “critical infrastructure”! What are the threats, and how can vulnerabilities be eliminated?


A: The US government defines the “critical infrastructure” as including the following 16 sectors, “whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.”

1.   Chemical

2.   Commercial Facilities

3.   Communications

4.   Critical Manufacturing

5.   Dams

6.   Defense Industrial Base

7.   Emergency Services

8.   Energy

9.   Financial Services

10. Food and Agriculture

11. Government Facilities

12. Healthcare and Public Health

13. Information Technology

14. Nuclear Reactors, Materials and Waste

15. Transportation

16. Water and Wastewater

 

Hacking and other cybersecurity threats to the U.S. critical infrastructure encompass a wide spectrum, including, but not limited to, ransomware attacks, nation-state espionage, supply chain vulnerabilities, sophisticated malware, advanced persistent threats (APTs), artificial intelligence (AI)-driven attacks, distributed denial-of-service (DDoS) attacks, insider (those who work within or otherwise support in some way the sectors) threats, phishing schemes, exploitation of vulnerabilities in industrial control systems and other types of systems, and more that target these 16 sectors. These threats pose significant challenges to national security and economic stability.

 

The reality is that all vulnerabilities in any types of digital ecosystems cannot be entirely eliminated, and more vulnerabilities are created daily as others are eliminated. That is one of the significant challenges of security and privacy professionals; mitigating as many vulnerabilities as possible while supporting the availability of responsible services in not only those 16 sectors, but also all other sectors. Robust and comprehensive physical, technical, operational and administrative defense mechanisms and proactive mitigation strategies are absolutely necessary to eliminate as many of the vulnerabilities as possible and mitigate the associated risks to an acceptably low level. How this is accomplished depends upon each digital ecosystem within each organization in each sector. For example, in the Communications sector, for protecting satellite systems, see a recent article I wrote for IEEE, “A Cybersecurity Framework for Mitigating Risks to Satellite Systems.” 

Q: What is quishing?


A: If you’re familiar with QR codes, that “q” at the beginning of “quishing,” is a hint. Quishing is a type of phishing that hides harmful links in QR codes to steal personal information. The FTC recently released a consumer alert warning about quishing. You can read it here. Bottom line: Be very careful before scanning QR codes. Only do so when they are from sources that you know to be trustworthy, and that can be held accountable for any malicious actions that could result.



Q: I'd love to try Wyzr to make new friends! Is it safe?

 

A: Wyzr Friends is a fairly new, free app created specifically to allow adults 40 and older to find friends online with shared interests. It is not a dating app. It just launched in October, 2023. It is now available worldwide. We watched an interview with the co-founders of the app and they indicate that they use identity verification of members as a safety precaution. This is good *IF* the way in which such identity verification is implemented does not put privacy at risk as a result, which many online identity verification methods do. Looking at their privacy policy we see some problems that we encourage you to ask them to fix before you sign up. These include:

  • They ask for your specific birthdate for the stated purpose of putting you into a group of others in the same “age range.” They do not need your specific birthdate to accomplish this. Instead of asking you for your specific birthdate they should just show you the age groups and ask you to indicate the one you are within. That should be a simple change for them to make. If you want to join anyway, give them a date that’s not your accurate birthdate, but is within what would be your associated age group range.
  • They also require you to provide your gender and an actual photo. The safety concerns with these questions go both ways. This may not be something that many folks want to provide for a wide range of reasons, including to be able to not be tracked down by stalkers and others with malicious intent. After all, it’s possible to make friends in an online community before knowing the gender and appearance of someone first.
  • There are identity verification methods available that do not require uploading a government ID! Never upload such IDs to any online sites, unless it is required by law, to a site that has strong security controls and privacy practices, that needs that information for legal purposes. Obtaining government and similar types of IDs should never be the way in which an online site verifies identities. Instead, identities can be verified via services that do these activities, without requiring sensitive documents to be uploaded. A core, basic privacy principle is minimizing personal data shared with others. If you don’t share your sensitive data with others, they will not need to secure it, and there will not be an opportunity for it to be breached and misused, in what we’ve seen to be harmful ways.


Ultimately, the concept of Wyzr Friends sounds great! However, they really need to get someone to help them to understand how privacy risks must be mitigated while also creating safety for their online communities. Ask them to do this, and then if they make improvements and stop asking for unnecessary personal data to be uploaded, that is when we’d recommend you giving it a try.

 


Q: My healthcare provider told me to text a lot of my health data to them in preparation for my upcoming surgery. I want to ask them the security and privacy protections they have in place for securing my data; texting seems very risky. What are the best practices that they should be using for securing text messaging containing health data, and to ensure they are complying with HIPAA?

 

A: It is great that you are asking your healthcare provider about their security for your data! I know from working with thousands of healthcare providers throughout the past 25 years that when they are getting questions from their patients about the security and privacy of protected health information (PHI), that raises their awareness of the importance of performing actions that they often view as slowing them down. It also demonstrates to them the importance of the work their security and privacy departments do, and why all those security and privacy policies, procedures, training, risk assessments, etc., are so important.

 

First, all healthcare providers and other types of covered entities (CEs) and their business associates (BAs; generally, those who support their business activities) must ensure that they are not exchanging cleartext (non-encrypted) text messages with patients, or sharing PHI between CEs and BAs using such non-secured communications. I’ve found many that are doing this as part of their daily work activities. This is a huge risk, and a non-compliance issue that would never pass a risk assessment performed by someone that understands digital security risks.

 

Second, do not use social media texting tools if you are asked to do so. Some healthcare providers are actually doing this. It doesn’t matter what Facebook, Twitter, Instagram, TikTok or any other social media site tells them or you, their texting tools are not secure and may very well not comply with all the necessary HIPAA requirements for such tools (meaning your provider would need to do additional actions to meet HIPAA compliance). Not only does using such tools put CEs and BAs at risk of PHI breaches and security incidents, this would likely result in many non-compliance findings if the regulatory agency (the Department of Health and Human Services (HHS) Office of Civil Rights (OCR)) did an audit, or a contracted entity with experience and understanding of digital security did a risk assessment.

 

Third, if a healthcare provider tells you that their tool uses AI to securely exchange texts, or to secure PHI, ask them how they have verified this. I’ve never found any evidence of an AI tool supporting such definitive claims. Perhaps someday there will be such a solution. But at this nascent time in the evolution of AI capabilities, it is not worth putting your PHI at risk by using an AI-powered texting tool. The provider should also think about the risks from what may be unfounded claims from the AI vendor and how it could put their other patients’ PHI at risk. Using texting tools that strongly encrypt transmissions is effective, and has been proven to provide the necessary security to protect your PHI, that is also required by HIPAA.

 

Fourth, to round out your questions of the provider, ask them if they have established a policy prohibiting employees of the CE, and their BAs, from sending texts using computing devices that do not have approved texting tools and associated security controls implemented.

 

The best practice for CEs is to use a texting solution that was created specifically for healthcare., It should have been thoroughly tested by an objective third party to verify it meets all HIPAA requirements, and has no, or very minimal, risks. There are several available. Some are not specific to healthcare, but have all the capabilities necessary to meet HIPAA requirements. The provider should also have an established policy and supporting procedure for all employees to follow for texting. This should include listing the authorized texting tool that is allowed to be used, and to prohibit the use of other types of texting. They should also be providing training to all personnel, including BAs (either verifying such training takes place, or providing it to them), for how to securely use the texting tools, and how to respond to associated incidents and providing ongoing reminders to all their staff about secure texting use. And very importantly, they need to apply patches to the texting tool as soon as they become available. 

 

I have had a few surgeries over the years, and I provide these questions (and more) on a printout and give to them to share with their security and privacy departments, and also offer to send them the questions digitally. Not only is this taking actions for ensuring your own health, it also demonstrates to the provider that patients care about security and privacy.

 

By the way, in December, 2022, the FTC published the “Mobile Health App Interactive Tool. This provides many more capabilities and actions that will be helpful to app engineers and app users. Something that you may find of interest.

Photo by Maksim Chernyshev

Q: Why am I being told my emails must now comply with DMARC, DKIM and SPF?

 

A: Generally stated, these three types of standardized email technologies help prevent spoofing and phishing messages from getting into your inbox, while also minimizing the blocking of legitimate email messages. All three of these are used together for the best results.

  • SPF (Sender Policy Framework) indicates the domains and servers authorized to send email for your organization.
  • DKIM (Domain Keys Identified Mail) attaches a digital signature to all outgoing messages to verify to the receiving service that the email message did indeed come from your organization.
  • DMARC (Domain-based Message Authentication, Reporting and Conformance) indicates to the receiving email servers the actions to take with the outgoing messages from your organization’s email server that don’t pass their SPF or DKIM checks.  

 

 

Q: What do you think about the HasMySecretLeaked site?

 

A: It looks like it could be quite useful! We need to do more research, though, to identify any downsides. In the meantime, here is an article from the CSO news site that you may find helpful.

Data Security & Privacy Beacons*

People and Places Making a Difference

We get many suggestions for beacons from our readers and Rebecca’s podcast/radio show listeners; thank you! We include many of them when the suggestions are for businesses other than the suggester’s. Typically for those the suggester feels deserve recognition for noteworthy data security and privacy actions. However, we do not include businesses, organizations, or people trying to promote themselves to get free marketing, and we do not take payments to put organizations or people on this list. We try to contact as many as possible after publishing our Tips to let them know we put them on our beacons list, though. If you have someone or an organization to suggest, let us know! We may include them in an upcoming Tips issue.

 


*Privacy Beacons do not necessarily indicate that an organization or person is addressing every privacy protection perfectly. It simply highlights a noteworthy example of privacy-aware practices.

Check It Out!

Check It Out!


We have published the first three episodes of our new “2-Minute Warning” security and privacy videos.


PSB 2-Minute Warning Episode 1: HIPAA Penalties & a Penalty First


PSB 2-Minute Warning Episode 2: Protect Against Identity Theft with Security & Privacy Tools


PSB 2-Minute Warning Episode 3: Data Privacy Day...Week...Month!

 

What topics would you like to see us cover? Let us know!


Have questions about our education offerings? Contact us!

The Privacy Professor | Website

Privacy & Security Brainiacs| Website

Facebook  Twitter  Linkedin  

Permission to Share



If you would like to share, please forward the Tips message in its entirety. You can share excerpts as well, with the following attribution:


Source: Rebecca Herold. March 2024 Privacy Professor Tips

www.privacysecuritybrainiacs.com.


NOTE: Permission for excerpts does not extend to images.


Privacy Notice & Communication Information


You are receiving this Privacy Professor Tips message as a result of:

 

1) subscribing through PrivacyGuidance.com or PrivacySecurityBrainiacs.com or

2) making a request directly to Rebecca Herold or 

3) connecting with Rebecca Herold on LinkedIn


When LinkedIn users invite Rebecca Herold to connect with them, she sends a direct message when accepting their invitation. That message states that in the spirit of networking and in support of the communications that are encouraged by LinkedIn, she will send those asking her to link with them her monthly Tips messages. If they do not want to receive the Tips messages, the new LinkedIn connections are invited to let Rebecca know by responding to that LinkedIn message or contacting her at rebeccaherold@rebeccaherold.com

 

If you wish to unsubscribe, just click the SafeUnsubscribe link below.