31 October 2014

Identity Theft Expert

Robert Siciliano - IDTheftSecurity.com

522 | posts 1,329,360 | views 59 | comments

It's Data Privacy Day, and It's a Mess

28 January 2014  |  1373 views  |  1

Target continues to be tangled up in chains due to its December 2013 data breach that current estimates say affected 110 million customers.

 

Target is known as proficient and prolific in the use of mobile devices and other means for collecting consumer data. This proficiency has backfired, resulting in the retail giant struggling to regain consumer trust and brand name reputation, not to mention figuring out how this mess happened in the first place and how to prevent a repeat performance.

  • Was there a lapse in Target’s IT security?
  • Did “Big Data” go too far and get way too ahead of security?

And let’s not put all the focus on Target, either. What happened with Target is a sign of the times and perhaps a sign of things to come in this world of cyber transactions. The questions above should also be asked of Facebook, Google, Yahoo and others who waited until the fiasco involving Edward Snowden’s NSA scandal to better encrypt their user data.

Big Data is like a drug; so addictive you can’t get off it, and of course, a huge potential for danger. Companies like Facebook, Google and Twitter love to sell consumers’ data to advertisers—this is how these giants stay giants; otherwise, they’d shrink into nothing. And there’s no end in sight with Big Data. Big Data is on course to become the Big Bang Data—to forever expand consumers’ personal information into cyber space. 

But all of these entities—retailers, social media, the government—need to take responsibility for what they’re doing with our data.

Just when you thought that your privacy couldn’t be violated any more, Big Data has now spread its tentacles into the realm of selling lists of sexual assault victims, people with AIDS and HIV, and seniors with dementia to marketers. The World Privacy Forum, in the midst of researching how data brokers gather up and sell consumers’ private information, discovered these lists, and unfortunately, there are more disturbing list categories that were uncovered. Marketers are actually purchasing this kind of data to target shoppers from every which way.

When are lawmakers going to catch up to Big Data and grab it by the horns?

In the meantime, consumers need to take control of their information online; it just takes one hacker to wreak havoc. Here are 6 tips every consumer should take to stay protected online.

#1 Install/update your devices antivirus, antispyware, antiphishing and firewall.

#2 Update your devices operating system ensuring the critical security patches are current.

#3 Password protect your devices and use strong passwords with upper/lower case, numbers and characters. Never use the same password twice. 

#4 Protect your wireless communications from prying eyes with a virtual private network that encrypts your data. Hotspot Shield masks your IP address and prevents data leakage.

#5 Limit your exposure on social networks. Consider what you post and how it can be used against you by criminals, predators and your government.

#6 Before giving out your name, address, phone, email, or account numbers consider how it will be used and read the services terms of service and privacy policies.

 

TagsSecurity

Comments: (1)

Mike McCormack - PALMA ADVISORS LLC - Fort Lauderdale | 29 January, 2014, 16:37

Lost on all the pundits and wonks commenting on merchant data breaches is one of the main contributing exposures merchants have created: Using the public internet for both store communications and payment card tranbsaction processing, and lack of encryption of the messaging themsleves and asscoiated payment card account data elements.  Culpable in this process are the merchant banks who continue to encourage and promote use of the internet for card processing without providing suitable protective services as part of their core offerings. While this strategy of use of the internet has obvious cost and service advantages, it comes with alot of exposure.   An alternative would be for retailers to consider both encryption processes and/or implementation of private IP data networks for POS transaction processing.

 

Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Comment on this story (membership required)
Log in to receive notifications when someone posts a comment

Latest posts from Robert

Steps to Manage a secure online backup

29 October 2014  |  488 views  |  0  |  Recommends 0 TagsSecurity

5 ways Criminals hack your PC

25 October 2014  |  1146 views  |  0  |  Recommends 0 TagsSecurity

2 Ways to Prevent Military Identity Theft

24 October 2014  |  606 views  |  0  |  Recommends 0 TagsSecurity

3 Stupid Simple Tips to protect your Identity

22 October 2014  |  771 views  |  0  |  Recommends 0 TagsSecurity

6 Ways to prevent Social Engineering Attacks

14 October 2014  |  640 views  |  0  |  Recommends 0 TagsSecurity
name

Robert Siciliano

job title

Security Analyst

company name

IDTheftSecurity.com

member since

2010

location

Boston

Summary profile See full profile »
Security analyst, published author, television news correspondent. Deliver presentations througho...

Robert's expertise

Who is commenting on Robert's posts

Otmane EL RHAZI
Ketharaman Swaminathan
Boris Taratine
Michael Rosenstein
Fred Pyziak
Matt Scott
Paul Love
Mike McCormack