Data Privacy & Security Service Digital Digest Summer 2017

Data Privacy & Security Service

Issue 9

IoT (Continued)

What should we watch out for?

Will the Internet of Things ever be safe?

There is a sweeping number of devices that now have access to the Internet and the number is infinitely growing. It is with this functionality that we need to consider the question: are we in fact keeping up with the times? As in any business or institution that runs on a large network, Chief Information Officers in school districts have the responsibility to enforce state policy when it comes to the protection of student data and privacy. The tech industry is moving fast- er and more efficiently than ever before. Devices such as laptops, which are not new to schools, have quickly moved from word processing machines that could store and retrieve data, to network-connected devices with webcams and microphones. As we pause to think about privacy with IoT, we must ask ourselves, “what is connected, and how much data does the device collect?” We already know that devices can automatically send data to apps where companies can analyze user data. Two recent examples show devices you may not have considered to be risky, but may make you reconsider as they have been transferring data without your knowledge:

Are you safe? “It’s no longer a question of ‘if’ cyber criminals will target you—it’s a matter of ‘when’.” As more and more devices are connected to the Internet via the IoT, cybersecurity experts are be- coming increasingly concerned about the potential “weaponization of IoT” with only 30% believing their organizations are fully prepared for the risks associated with the IoT. Security measures are se- verely lacking on most IoT connected devices. What can you do to attempt to safeguard your- self?:  Create a network fortress by using two-step authentication (also known as 2Fa) and com- plex passwords that change often  Protect access to your home Wi-Fi by making sure it is secured  Accept updates on devices as these usually combat viruses  Keep up with the latest cyber threats  Review user agreements

For the complete article, click here .

 Vizio has just settled a lawsuit involving its

collection of viewing data which included broadcast television, advertisements and IP addresses. The TV maker added Automated Content Recognition software to some of their smart TVs which was unknown to the consumer. Other examples with smart TVs collecting data, include Samsung’s “always on” feature to its listening microphone. Voice command has almost become a norm; how many people are paying attention to the option to disable?  Since awareness has risen, more companies are asking for your permission to access data; however, devices are being exposed that did not request their customers’ permission

daily. Take a look at Bose headphones , for example. The Bose Connect app has been collecting listener information and selling it to third parties. This privacy concern becomes even more prevalent as devices that never had Internet connection, now do. Who is assessing these risks? Manufacturers want their devices to connect to the internet. So do we as consumers. Our purchasing behavior has supported this in recent studies. What users may not be thinking about is how many of these machines have Automated Content Recogni-

tion software designed specifically to track user behavior? This data is typically used for targeting an audience for ad- vertisements. But, what else can the data tell someone if they are fishing around? Privacy controls and network surveillance is key in moni- toring vulnerable access points, but as previously men- tioned, innovation is happening quickly and devices that are used for one thing often have multiple uses. iPhones are also cameras. Tablets have built in email apps. The TV on the wall in the classroom may have a built in webcam. Educators may not be aware of these functions or ever have a reason to use them, but they are there.

2

Made with FlippingBook flipbook maker