The 6 biggest online threats Confidentiality You should be concerned

1:45 PM
The 6 biggest online threats Confidentiality You should be concerned -

For some consumers, the protection of personal information online remains a distant thought; just for politicians and from civil rights organizations. However, for a growing number of people, the issue has become an arduous battle between the powers that be and the control we have over our own information.

The following threats are not the only issues of concern in the area of ​​privacy. However, understanding the implications of some of these major issues can help to articulate the scope and depth of intrusion of privacy and data collection.

1. Cybercriminals remain the greatest threat because of questionable practices

Despite government surveillance activities, cyber crime remains the greatest threat to privacy in the digital age . The reason is simple: while the government and law enforcement to monitor your activities, cybercriminals attempt to do the same. anti-virus software Generally the vigilance of the user and constantly updated can help mitigate threats, but strong passwords and compartmentalized mail identities are also important measures

things to consider :.

  • according to a study by Javelin Strategy and Research, "There were 12.6 million victims of identity theft in 2012 in the United States"
  • quarterly Internet Threats Commtouch trend Report revealed that an average of 97 billion spam, phishing and malware laden e-mails were sent around the world every day in the first quarter of 2013 .
  • according to the State Report 2013 net Consumer Reports, a projection of 58.2 million American adults had at least. malware that affected the functionality or performance of their home PC last year

suggested the measures to be taken against this threat:

  • use long, complex, and various passwords.
  • Creating and using compartmentalized email addresses (separate accounts for variable data sensitivity levels) for extra protection.
  • Keep updated software and reliable anti-malware software.
  • caution against summary websites and messaging requirements or registration, reputable or not.
  • Be extremely careful about downloading software, even a trusted software may be bundled with malware with ease.

2. facial recognition software is building a database

Facebook and Google+ each offers picture sharing tools to their millions of users. However, integrated facial recognition technology that scans photos to suggest tags is currently collecting and building extensive profiles of users faces. Facebook maintains that the data is kept safe, but little is known of how the data is used after it is sold to other companies. Law enforcement is also known to query these providers for facial profile data on a regular basis

Things to consider :.

  • facial recognition software built in social networks is compiling a vast database for multiple purposes.
  • The sale of these data to others is unregulated and little is known about what happens once he has left the hands of social networks.
  • Photographs posted by others, some potentially embarrassing or worse, dependent, possession become the social network once they are downloaded.
  • current facial recognition programs provide no option to withdraw before the data are collected.
  • With the ubiquitous and involuntary facial marking the dangers of surveillance and stalking increased manifold

suggested the measures to be taken against this threat:

  • Be careful when publishing personal photographs online.
  • Read the privacy statement for the popular photo sharing websites to understand the limits of your data rights.
  • Request that your social networking friends are talking about you before posting personal photographs online.

3. GPS mobile functionality provides an easy tracking location

Whether we realize it or not, monitor our situation is not limited to Foursquare check-ins. Also on location services and metadata in social networks messages have transformed our cell phones into personal tracking devices. It is well known that the law enforcement agencies subpoena such information for criminal purposes, but the implications are also surprising. equipment belonging to employers can be tracked, providing new opportunities for monitoring

Things to consider :.

  • According to the ACLU, only 13 of the 250 law enforcement agencies in the country have never used cell phone location data.
  • multiple law enforcement agencies do not require a warrant to obtain location data.

suggested actions to be taken against this threat:

  • refuse requests from requests to use location services capabilities
  • Avoid posting updates to social networks from your mobile

4. the data in the cloud are not subject to the same protections as your hard drive

According to a Gartner study, 36% of the content of US consumers will be stored in the cloud in 2016. This massive migration to the cloud storage is troubling when you consider the potential security vulnerabilities. Cloud storage companies have been hacked several times, and while the data stored on these servers are often encrypted, functionality depends decryption steps that present exploitation possibilities. In addition, data is stored on remote servers where staff security and IT have a certain level of access to customer data. This dependence protections against other transit and vulnerability represent considerable obstacles to privacy

Things to consider :.

  • current encryption solutions to mitigate risks cloud storage compromise. convenience
  • Loading data to the cloud subjected to the application of the seizure law; . This seizure occurred repeatedly at high volumes

suggested the measures to be taken against this threat:

  • Beware what you store on the cloud. All downloaded data privacy is surrendered.
  • Encrypt your wireless Internet connection to prevent localized interception.
  • consider giving misleading files names to sensitive data, such as file name index is often unencrypted.

5. a way to legally mandated scan a large amount of navigation data is collected

Revelations about legislative and executive measures to increase surveillance of national and international networks mean your browsing history and search queries are likely to be watched right now. These legal terms are often approved (with little oversight) by the confidential judicial bodies with the express purpose of monitoring and mining Internet traffic. The US government holds only the declaration that they use the information to catch criminals, but no matter, it means that your information and your browsing activity is monitored, quite without your knowledge or there consent.

things to consider :.

  • PRISM program and monitoring MUSCLE data extract daily information from Google and Yahoo servers and store it in data warehouses
  • claims that "metadata" are being acquired obscure the fact that sufficient information is collected to build comprehensive profiles for individuals
  • confidential memos on monitoring activities continue to emerge.

suggested actions to be taken against this threat:

  • Contact your congressperson and explain your opinion on federal surveillance activities
  • supporting legislation limiting the scope of the monitoring programs ..

6. Cookie proliferation has reached worrying levels

Cookies, plain text files that monitor information on your computer and your browsing behavior, have exploded in number in recent years. These files follow what you might be interested in buying, sending this information without your knowledge to websites. There is the danger of cookies: the submission of potentially sensitive data to unknown entities without the express permission to do so. Despite legislative efforts to restrict the number of cookies used, adequate legal protections are not yet present to help prevent the threat. In addition, what provisions exist are easily circumvented by companies claiming their use of cookies is "essential". This increase in monitoring and lack of appropriate protection means a considerable amount of user side effort to achieve privacy

Things to consider :.

  • Cookie activity often occurs entirely without the knowledge and the fact in unprecedented volumes.
  • while some activities are innocent, including improving business results the invisible followed a threat when used by malicious websites or people.

suggested the measures to be taken against this threat:

  • Use cookie blocking and deletion of the browser functionality
  • Consider installing software that automates blocking and deletion. tracking cookies.
  • Explore browser extensions that identify the monitoring and cookies block of creation.

they are, intrusion of privacy or the federal government are present and prevalent in our digital world. The criminals, the law enforcement agencies, and advertisers have more tools at their disposal to monitor and document our activities and identities. the protective action is to support legislation restricting surveillance activities, using a VPN service for web surfing, safe browsing habits, and the installation and use of appropriate confidentiality measures on users' computers. The current extent of the privacy intrusion is disconcerting to most of us, but with some skills and a proactive mentality, privacy is a fighting chance. Take action and that we know that your privacy is a valid and necessary priority.

Previous
Next Post »
0 Komentar