Get Rid of 'Em!
     


We all have a bad habit or two we'd like to kick. Some are worse or more pressing than others to address. At the risk of piling on, I challenge you to think through the risky data security and privacy behaviors you may need to quit, as well. 

Fall is a great time to clear closets of old computers and piles of papers, both of which often contain heaps of personal data. The older they are, the more likely they are to house unencrypted or even blatantly obvious personal information. It's also as fine a time as any to freshen up your passwords by changing them to something extra strong... or to opt-in for a few extra layers of security, such as two-factor authentication. 

Another good reason to tidy up your cyber safe lifestyle is that October is International Cybersecurity Awareness Month! Please participate by sharing this Tips message with friends, family, colleagues... anyone you think could benefit from the content. 

Read on to learn more about the risks to your data security and privacy... and to see if there are a few bad habits you can tackle yet this year. 

  
DSPBData Security & Privacy Beacons
People and places making a difference**

Have you seen an organization or individual taking actions to improve privacy? Send me a note to nominate a privacy beacon of your own!

Dr. Katina Michael has dedicated the past 20 years of her career to raising awareness of uberveillance and the risks associated with it. Uberveillance, a term coined by Dr. Michael's husband, Dr. MG Michael, and one she helped popularize, describes the intensive surveillance processes developed in the 21st century that open us all up to the inevitability of massive privacy intrusions. In a recent guest appearance on Data Security & Privacy with The Privacy Professor, Dr. Michael helped our listeners understand the various risks associated with COVID-19 contact tracing apps, one of many newly distributed surveillance technologies sure to amp up our everyday exposure to privacy risks. 

The U.S. Postal Service's Informed Delivery Notification enables residential consumers to digitally preview their letter-sized mail. It's a service I've used for several years, and I love it. Special kudos to the USPS for making it easy to alert the them when a letter you were expecting to receive didn't show up. You simply click a link in the email notification to let them know the mail did not arrive as anticipated, and they launch an immediate investigation. This happened to me only a few weeks ago, and the USPS found my credit card statement had been erroneously delivered to a neighbor. Thanks to their quick assistance, I was able to get the statement back within just a few days. 

The National Institute of Standards and Technology (NIST) makes this month's  Beacons list for including privacy capabilities within its latest release of SP 800-53 Rev 5. The publication is a catalog of security and privacy controls to consider building into information systems and organizations as appropriate for existing risks. I encourage everyone to check it out and to find methods to adhere to the guidelines in every way that's relevant to their organizations and/or projects. NIST has also prepared supplemental resources like the Security and Privacy Control Collaboration Index Template to make engaging with the content as helpful as possible. 

Although I don't have any personal experience with the solution yet, Ubiquiti UniFi impresses me with the spirit of their new tool, the Dream Machine. Essentially a high-powered wireless router, the Dream Machine also offers a few ancillary features, one of which is the Intrusion Prevention System. While reviewing the router, tech writer Dave Gershgorn says that feature came in extremely handy when the device alerted him to the potential of malware on his network-attached storage device. "... the process led me to learning of a massive security breach of a company whose device I naively trusted," Gershgorn writes. This an excellent example of the impact data security and privacy-minded devices can have on the awareness of everyday technology users. Have any of you used this? Let me know!

Earlham Savings Bank, a community financial institution that operates in my neck of the woods (Iowa), is providing a great reminder to its customers about password security. Each and every time an online banking user logs into her or his account, a pop up provides a helpful tip, such as "Use a different password for every website." These kind of simple-to-execute strategies are really easy to emulate, and more companies should be engaging in this type of affordable, yet effective, education for its constituents. 

**Privacy beacon shout-outs do not necessarily indicate an organization or person is addressing every privacy protection perfectly throughout their organization (no one is). It simply highlights a noteworthy example that is, in most cases, worth emulating.
Just when you think no one's watching...
    
  
Amazon for Residential: Thanks to Tips Reader Susie for pointing out the latest Alexa risk. Turns out Amazon has developed an Alexa device specifically for landlords that could allow property owners and managers to spy on tenants. As reported by Gizmodo, "...your landlord could connect their own account to your device, giving them control over the Drop In feature." Drop Ins allow Alexa users to connect to each others devices. They don't have to be a part of the same household or account. Once connected, users can hear (and sometimes even see) what's happening in the other user's home.

Rite-Aid Facial Recognition: Spies in the ceilings of the stores you visit? Yep, it's happening. Artificial intelligence-powered facial recognition is combining with surveillance cameras to help retailers know more about the people shopping in (and stealing from) their locations. There are the standard worries about privacy invasion, incorrect assumptions and algorithms with built-in, undetected biases that generate incorrect results. And then there's the fact some of the technology used in these systems have ties China, which has earned a reputation for deploying technology to the U.S. in the hopes of procuring troves of data on Americans. The growing IIoT (Industrial Internet of Things) trend is worrisome to say the least. 

Shapeshifting IoT Products: This trend, in which software updates completely transform a product's functionality, was recently explored by Rob Walker in an article on Medium. Using Amazon's Ring doorbell as the go-to example, he explained: "... there's something startling about an object as banal as a doorbell transforming itself without the user having any particular say in the matter." He points to several concerns with Ring, including security flaws, accusations of surveillance and what he calls a "too-cozy" relationship with law enforcement. Indeed, it's very important for consumers to stay on top of news about software updates and feature upgrades on the smart devices they've added to their personal space. 

Smarter Coffee Maker: A security researcher hacked an IoT coffee maker, ironically called the Smarter Coffee Maker, to demonstrate how easily smart home devices can be taken over by malicious actors. After reverse-engineering the smart coffee maker, he was able to remotely turn on the burner, dispense water, spin the bean grinder and display a ransom message, all while forcing the device to beep repeatedly. Even more concerning, the research demonstrated that this smart IoT device can be misused for nefarious purposes such as network breaches, data leaks, ransomware attacks and distributed denial of service (DDoS) attacks. What's really interesting to me about this particular company is that they appear to have known about the security vulnerabilities because they fixed them before releasing additional products, the iKettle version 3 and the Coffee Maker version 2. Yet, it didn't publicly warn customers not to use the old devices. And, according to data from the WiGLE network mapping engine, plenty of the older units are still in use today. 

electionElection Considerations for Security-Minded Voters
Voting smartly and securely in the age of misinformation
    
  
We can't go five minutes without hearing about the upcoming U.S. presidential election. With just over a month until the big day, news, social chatter, rumor and conjecture are flying at a fever pitch. 

To help separate the signal from the noise, we've rounded up a few resources to help you be as informed as possible -- and for those in the U.S., to inspire confidence in the security and soundness of your vote on Nov. 3. 

Voting by Mail Security: Busting Myths and Explaining FactsAmber McReynolds, one of the country's leading experts on election administration, policy and security, discusses the fact-based risks of voting by mail along with the benefits, security and myths.

How to Vote by Mail in Every State - A helpful guide from the Wall Street Journal on taking part in the election without having to visit a polling location. 

How to Track Your Ballot After You've Mailed It In - LifeHacker details methods for monitoring the delivery of mail-in voting ballots. 

DOJ Says Russian Went Beyond Election Disinformation - As enumerated in this InfoRisk Today article, ongoing and organized disinformation campaigns are still circulating. Be aware of them and always double check what you see, read or hear. Look for corroboration and avoid sharing something with your friends and colleagues unless you have verified its accuracy. 

COMING SOON: Keep an eye on our Voice America radio show channel. Guests Jennifer Kavanagh and Quentin Hodgson will join us October 3 at 10am CDT. The show will be available for listening on-demand immediately after the initial airing. In the meantime, check out several of the reports and resources Jennifer and Quentin have created, including:

termFacebook Set to Update Terms of Service
Social giant wrangles for greater control over disinformation       
  

On October 1, 2020, Facebook will update section 3.2 of its Terms of Service. They've published a preview if you're anxious to get a sneak peek.

The changes are centered around what Facebook users can do and share on the social network. They appear to expand Facebook's ability to remove content if it feels the company could face legal ramifications because of it. 

The preview contains the following language: "We also can remove or restrict access to your content, services or information if we determine that doing so is reasonably necessary to avoid or mitigate adverse legal or regulatory impacts to Facebook." 

It'll be interesting to see if Facebook describes the removable content in more detail when the terms of service take effect later this week.

With it being an election year, Facebook appears to be making an attempt to be extra cautious about the potential spreading of disinformation on its platform. To be sure, some will label such action as censorship. Others will believe Facebook's intentions are good. 

In other news, it's been reported that Facebook will pay certain users to quit its apps temporarily. Specifically, the social giant is said to be offering certain types of accounts and activities payment not to use their apps prior to the election. The program is apparently part of a research study looking at the effect of social media on democracy

Organizations can learn from the security mistakes of others

I was asked by Digital Privacy News to provide takeaways from the recent Department of Veteran's Affairs data breach, which exposed the personal data of 46,000 U.S. military veterans... and boy are there plenty! Here are just a few you may consider reviewing within your own organization. 

Firewalls are not enough: There are a multitude of endpoints into today's organizations, from personal mobile devices to third-party APIs. Each can serve as an open door for access to a network, its associated systems, applications and data repositories. Organizations must implement a good mix of strong access controls of all types: technical, human and physical. 

Social engineering works: Cyber actors know it is often easier to trick humans via wetware techniques than to crack an organization's infosec. Comprehensive and frequent training for employees on the newest tricks and traps deployed by these criminals is essential. When is a good time to do something to raise awareness? October, International Cybersecurity Awareness Month!

Investigations can be lengthy: Breached organizations are often criticized for taking too long to report data breaches. However, it's important to consider that digging into what happened is vital to the protection of those whose data was exposed. Organizations must be able to accurately describe the details of the breach to those impacted, especially the specific types of personal data that was exposed. 

Beyond the very real harms that occur as results of breaches, the silver lining to each is that breaches opens minds to the realities of security vulnerabilities. These unfortunate incidents are known to have lit a fire or two under leadership to invest the time, resources and funds to mitigate future threats. 
fishFRESH PHISH: Texts Promise a Package On the Way
Smishing attempts take advantage of pandemic-era behaviors

Over the last three months, I've received six separate text messages like the one on the left, each claiming a pending parcel of mine had been found. The texts promise instructions for claiming the package... if I just click the suspicious link in the text. 

No thank you!

Several Tips readers and Voice America show listeners have reached out to share similar experiences with phishing via text message, otherwise known as "smishing."

With all the online orders we're placing for home delivery these days, many people are more susceptible to falling for this type of scam. Sometimes they are easier to spot, but this particular text addressed me by name and sounded fairly legitimate. Of course, I'm always cautious about clicking any links. 

My advice: Never click any link until you have independently (and away from the suspicious communication) verified its legitimacy. If the text appears to be coming from a friend, give them a call. If it's coming from an organization, email them or dial up their customer service. Never reply to the text, as malicious actors are often waiting on the other end and are very good at claiming to be on your side. 

Another thing you can do to test a text is check the URL on a free URL safety site, such as Trend MicroAfter you type in the URL from the text message, they assign it a score of Safe, Dangerous, Suspicious or Untested. 


Please consider sharing this information with friends, family and co-workers. If you're responsible for information security, privacy or IT at your organization, or you lead the entire organization as CEO or president, forward this resource and tips to your employees and contractors -- especially those working remotely. Those employees are out of their element, which often makes them extra vulnerable to the crafts of smishing artists. 

WTFPPWhere to Find the Privacy Professor 
  
 


On the virtual stage and studio... 

HAVE YOU LISTENED YET? 

Do you have an information security, privacy or other IT expert or luminary you'd like to hear interviewed on the show? Or, a specific topic you'd like to learn more about? Please let me know!

I'd also love for your organization to be a sponsor! Shoot me an email and I'll send you more details.

All episodes are available for on-demand listening on the VoiceAmerica site, as well as iTunes, Mobile Play, Stitcher, TuneIn, CastBox, Player.fm, iHeart Radio and similar apps and sites. 

Some of the many topics we've addressed... 
  • student privacy
  • identity theft
  • medical cannabis patient privacy
  • children's online privacy and safety 
  • applications and systems security
  • cybercrime prosecutions and evidence
  • government surveillance
  • swatting 
  • GDPR
  • career advice for cybersecurity, privacy and IT professions
  • voting / elections security (a series)
Please check out some of my recorded episodes. You can view a complete listing of shows to date, grouped by topic. After you listen, let me know what you think! I truly do use what I hear from listeners.

SPONSORSHIP OPPORTUNITIES: Are you interested in being a sponsor or advertiser for my show? It's quickly growing with a large number of listeners worldwide. Please get in touch! There are many visual, audio and video possibilities.

We have current sponsorship openings. If your organization wants to sponsor one show each month, I will cover topics  related to your organization's business services and/or products.

Advertising Now Available!

Tips of the Month is now open to sponsors. If you're interested in reaching our readers (maybe you have an exciting new privacy product or service or an annual event just around the corner), the Tips email may be just the thing to help you communicate to more people! 

We have a variety of advertising packages to meet every budget. 


3 Ways to Show Some Love

The Privacy Professor Monthly Tips is a passion of mine and something I've offered readers all over the world for since 2007 (Time really flies!). If you love receiving your copy each month, consider taking a few moments to...

1) Tell a friend! The more readers who subscribe, the more awareness we cultivate.

2) Offer a free-will subscription! There are time and hard dollar costs to producing the Tips each month, and every little bit helps. 

3) Share the content. All of the info in this email is sharable (I'd just ask that you follow

 
 
My sons and me, Halloween 2007.
No doubt, Halloween will feel a little different this year. But, look at it this way... we'll finally have consensus on wearing masks! :) 

With special circumstances comes the need for extra precautions. There are some scary risks out there, and the bad guys are all too willing to leverage them for profit. As you find new ways to celebrate Halloween and many of the other holidays around the corner, remember to stay vigilant against data security and privacy threats.

Cheers to Halloween masks! 

Rebecca
Need Help?


share2Permission to Share

If you would like to share, please forward the Tips message in its entirety. You can share excerpts, as well, with the following attribution:

Source: Rebecca Herold. October 2020 Privacy Professor Tips. www.privacyprofessor.com.

NOTE: Permission for excerpts does not extend to images.

Privacy Notice & Communication Infoprivpolicy

You are receiving this Privacy Professor Tips message as a result of:

1) subscribing through PrivacyGuidance.com
2) making a request directly to Rebecca Herold; or 
3) connecting with Rebecca Herold on LinkedIn

When LinkedIn users initiate a connection with Rebecca Herold, she sends a direct message when accepting their invitation. That message states that in the spirit of networking and in support of the encouraged communications by LinkedIn, she will send those asking for LinkedIn connections her Tips message monthly. If they do not want to receive the Tips message, LinkedIn connections are invited to let Rebecca know by responding to that LinkedIn message or contacting her at [email protected]

If you wish to unsubscribe, just click the SafeUnsubscribe link below.
 
 
The Privacy Professor
Rebecca Herold & Associates, LLC
Mobile: 515.491.1564
View our profile on LinkedIn   Follow us on Twitter