|
|
Can you solve this riddle?
A man turned off the light and went to bed. Because of this, several people died. Why?
To get the answer, read on through this month's data security and privacy tips below. (I promise it's easy to find.) In the meantime, enjoy the sizable clue I've included in the images, which come from my family's recent trip to Lake Superior, one of the Great Lakes of the U.S.
IN THIS ISSUE
|
|
|
Whitefish Point Lighthouse and the Great Lakes Shipwreck Museum. Visitors engage with a huge amount of information about the 1975 wreck of the Edmund Fitzgerald (the one the 1976 hit song is about). |
|
Are You Being Wire Tapped?
|
|
Malware turns Google Home, Amazon Alexa into undercover spies
|
|
|
Lighthouse in Marquette, MI, in Lake Superior's Marquette Bay
|
Voice-activated devices like Google Home and Amazon Alexa are recording everyone in their vicinity and sending those digital voice recordings to the cloud. The resulting data is then used in any number of undisclosed ways.
Of the device owners who are aware of this, some may rationalize the recordings with thoughts like, "I'm just one of millions. No one really cares what I, or anyone else who's speaking with me, have to say."
For starters, that's not even remotely true. You may be one of millions, but your data helps build a profile of you... and of people like you. These profiles are used by marketers, insurers, law enforcement and plenty of others to make assumptions and predictions about our behaviors, as well as things that can trigger those behaviors.
Don't think anyone wants to spy on you? Consider these examples from writer Graham Cluley:
...it's conceivable that a jealous partner might implant malware on your Amazon Echo to keep tabs on you after you have kicked them out of your life. It would also perhaps to be wise to consider that there is also a risk if you purchase a second-hand Amazon Echo.
A WORD OF CAUTION:
While malware like this is only a possibility and no real-life incidents of targeted wire-tapping via Google Home or Amazon Alexa have yet occurred, it doesn't take long for theory to become reality. Truth be told, if the good guys are thinking about it, the bad guys probably thought about it six years ago.
|
|
Wireless Crime on the Rise
|
|
Remote connections make stealing even easier
You've likely heard of card skimmers. The devices come in all kinds of shapes and sizes and are built to mimic the look and feel of ATM, checkout and gas pump card swipers. Crooks attach the malicious skimmers to a legitimate device, leave it on long enough to gather lots of valuable data from debit and credit cards, and then come back to retrieve it.
But that's the old-school way of skimming.
Now, fraudsters don't even have to return to the scene. With the help of burner phones and text messaging, skimming artists can now text the stolen data right to themselves. (Thanks to Scott Schober for this pointer!)
Skimming is a huge problem for credit card companies and the banks and credit unions that issue these cards. That's why they have implemented chip-based credit cards, which heavily encrypt the personal and account data typically held on the plastic card.
But, until the day these cards (and the retailers accepting them) become ubiquitous, the vulnerable mag stripe is still on almost every chip-based card in circulation in the U.S. Skimmers love this, and they are getting better at exploiting them... now without even having to be physically present!
A WORD OF WARNING:
Avoid using debit cards, especially, at gas station pay-at-the-pumps. (
Credit card companies offer greater fraud protections than their debit counterparts.)
Many of these gas terminals are still mag-stripe based, so you have to swipe your card, leaving your data vulnerable to skimming. Fraudsters know this and are targeting gas stations heavily as a result.
|
|
|
One of several lighthouses in Munising, MI |
|
The Next Google Glass
|
|
Snapchat gives smart glasses a whirl... and there goes your privacy!
Called Spectacles, the new camera-enabled smart glasses are capable of recording you anywhere and everywhere you are, which is not totally unlike Snapchat itself. (I have plenty of parent friends who have been "caught" in the background of their children's social posts doing or saying things they'd rather not have exposed to a community of adolescents.)
Unlike Google Glass, which raised all kinds of privacy concerns themselves, Spectacles are pretty accessible. Whereas Google Glass was only available to certain consumers, Spectacles are easily purchased on Amazon. And at less than $130, they are essentially affordable.
The privacy implications are obvious, but consider some of the lesser-discussed aspects of wearable recording devices (as pointed out by IdentityGuard):
- Unintentional recording of a credit or debit card number could lead to identity theft.
- Snapchat data shows where videos / images were captured, which could help stalkers pinpoint the real-time location of their victims.
- Voice and face recordings could be used to spoof biometric authentication solutions.
- Worries about what you look like in a swimsuit could follow you even while underwater, thanks to waterproof Spectacles!
A WORD OF WARNING:
Don't be afraid to ask a Spectacles wearer to remove the devices in your home, at work or in other non-public places. If you are a user, make sure you are aware not only of what you may be unintentionally recording, but how Snapchat may be recording your recordings. (And with whom they are sharing them!)
|
|
Health Care Spotlight
|
|
Should Doctors, Nurses Be Punished for Falling Victim to Hackers?
|
|
|
One of the lighthouses on Grand Island, in Lake Superior.
|
A journalist recently posed the above question to me, and I struggled with it a bit. Here is how I answered her. I'd love to hear from the employers who read this message to see how you handle such circumstances.
Hacking and IT incidents are now the leading cause of compromised medical records, and one of the main points of entry these bad actors have is the email system.
When unaware doctors, nurses and other health care workers click on nasty links, open infected attachments or hover over malicious icons, their practices and all of the patients they serve can be exposed to cybercriminals.
But should the employees who fall for these phishing attempts be held personally responsible? Should they lose their jobs?
The answers are ultimately up to each practice. That said, every employer should have a written policy for how it will both educate and hold responsible employees for cyber security incidents. There are numerous ways to raise awareness among employees, including required training and fake phishing tests.
HHS Waives Sanctions and Penalties in Response to Hurricane Harvey
Did you know the U.S. Department of Health and Human Services (HHS) occasionally suspends the compliance burden for care givers during public health emergencies? It's rare, but it happens, and now is one of those times.
Yesterday, the HHS Secretary Tom Price instituted the temporary policy stating that Texas and Louisiana hospitals that do not comply with certain HIPAA provisions will not be punished.
Read more about HIPAA privacy and disclosures in emergency situations on the HHS site.
We are keeping the victims of Hurricane Harvey in our thoughts, and invite everyone, if they can, to offer any assistance possible.
|
|
Reader Question
|
|
'Help! I Photographed My Driver's License'
I want to ask you about the data security and privacy implications of something I did with my phone. I took a picture of my driver's license because my headshot was one of the best pictures I'd ever taken, and I wanted to save it.
I didn't send it to anyone. In fact, I started worrying about having it on my phone so I deleted it. The picture I took was of the entire license. Can anybody use that picture even though I haven't sent it anywhere?
To understand if you're safe, check on these items:
- Does your phone automatically upload a copy of your photos to a cloud service? If so, that photo may still live in the cloud, including in the cloud service's own backups and archives.
- Do you have any apps on your phone to which you've given permission to access your photos? Such apps may take copies of any photos you've taken and/or stored on your phone.
There are a couple of things you can do to lessen your vulnerability. First, log in to the cloud service and remove the photo if it's still there. Second, turn off auto-backup or auto-save features that send your images to the cloud without your approval.
The risk of apps making copies of your photos is typically low (depending on the apps you have), but one of which you should be aware. If you are concerned, contact the app developer directly to ask how you can remove your photos from their systems.
Here are some best practices going forward:
- Delete all apps you don't use.
- Don't download apps that require access to all your photos and other files.
- Don't automatically sync/upload your photos and other files to the cloud by default.
|
|
|
The Marquette Harbor Light in Lake Superior |
|
Did You Solve the Riddle?
|
|
The man is a lighthouse keeper.
The light he turned off was the lighthouse beacon. Doing so stopped a ship's captain from seeing the rocks, and he crashed his vessel, killing everyone on board.
Protecting against physical risks, such as keeping ships from hitting the hidden rocks in the waters where they sail, has been considered for centuries. The hidden digital dangers of collecting and sharing data, through online apps, social media and other sites, have only been considered for just a comparatively few decades.
Breaches and misuse of data can sink a person's livelihood, reputation and friendships just as quickly as a ship hitting jagged rocks in a dark, stormy night.
It's up to all types of organizations to protect the personal data they collect and to share and use it only as necessary. It's also up to every person to make sure those organizations who collect their data are doing their best to protect it, and avoid sinking their privacy.
|
|
Privacy Professor On The Road & In the News
|
|
One of my favorite things to do is visit with leaders in different industries - health care and managed systems providers to insurance and energy (and beyond!). Below are a few of the events I have scheduled for the upcoming season.
September 13, 2017:
Giving keynote address on preventing medical device nightmares in the Internet of Medical Things and facilitating a roundtable discussion at
SecureWorld
Detroit
October 11, 2017
: Providing private executive briefing on healthcare security and privacy in the Internet of Medical Things in northern Rhode Island.
Surprising News at Internet of Medical Things Conference
|
|
Big
Bay
Point
Lighthouse in Lake Superior
|
|
We had a large amount of positive feedback for the July 27
Internet of Medical Things Conference.
Aside from the interesting (and alarming) insights from our panelists, we also got some long-awaited news from Deven McGraw, Deputy Director of Health Information Privacy at the HHS Office for Civil Rights (OCR).
Asked when we could expect finalization of the (very old) 2011 accounting of disclosures notice of proposed rulemaking (NPRM),
McGraw said,
"We do not have plans to finalize that NPRM. However, it remains a requirement that we have to fulfill...we have to find some way of enabling individuals to receive accounting of disclosures [for when specific individuals get access to their patient data for treatment, payment and operations purposes] from an electronic health record as defined in HITECH... [The OCR is] going to need some additional public input on how we can implement this, given that what we had initially proposed was not feasible."
Privacy Professor In the news...
Healthcare Info Security
The morning TV broadcast regularly covers privacy and security tips with their guest, the Privacy Professor! Each is a brief 10-15 minutes and covers topics ranging from insider theft to connected vehicles. Check out
this online library to watch recent episodes.
Here is
my most recent visit to the studio in August, during which we talked about celebrity privacy, as well as the implication of using connected cameras everyday on our smartphones. I also shared tips on how to better monitor your credit cards in this breach-ridden society in which we live.
On my August 1 visit to the studio, I spoke about new risks with USB drives, along with privacy risks and what you can do about them for your personal assistants, such as Amazon Alexa and Google Home.
|
|
I hope you enjoyed the riddle (and the lighthouse photo clues, as well!). I've been a long-time fan of lighthouses, from as early as I can remember.
As my family and I were exploring these beautiful tributes to the history of maritime communities, I couldn't help but appreciate the symbolism. Privacy awareness, to me, is a lot like the beacons atop these structures. Without it, we simply can't see some of the dangers ahead.
Keep the awareness beacon shining bright. Consider sharing this tips message with friends, family and colleagues!
Here's to an excellent fall!
|
|
|
|
|
|
|
|