Internet Privacy and Security: A Shared Responsibility
Internet Privacy and Security: A Shared Responsibility
Recent events have focused an intense spotlight on online privacy and security. With
Cyber Security Awareness Month coming to close, I thought I’d explore why it’s
critical we not let this moment pass and just lapse into our normal complacency about
these issues once the media thunderstorm passes.
Now more than ever, as our digital footprints grow exponentially, we need to take
personal action to preserve our online freedoms. Why? The Internet benefits and
belongs to all of us — thus it is our joint responsibility to protect it.
The benefits of the Web have, of course, come at some cost, one of which is a loss of
privacy. We are also more vulnerable to data breaches and identity fraud. But there
are many things we can do to minimize the risks of both.
The threat from hackers and cybercriminals has expanded in relation to our
dependence on the Internet. As our reliance grows, opportunities for them to prey on
us increase. Online data breaches are not new. They have been around since the
creation of the first networks, but there is a risk that they could reach epidemic
proportions — cyber fraud is currently the fastest growing category of crime in the
U.S. — and eventually erode our freedom to use the Internet as we desire.
As with past epidemics what is required is a combination of collective and individual
action. It is not that much different from how we have managed medical plagues in
the past. When enough people stayed indoors, washed their hands or received
vaccinations, certain diseases were wiped from the planet. It took some time to
convince people to change their ways, but eventually as a society we worked together
to inoculate ourselves from many epidemics.
Taking it back to the Web, we should think of our digital identities as susceptible to
digital epidemics. Fifteen years ago, led by company IT teams, we started inoculating
desktop computers with anti-virus software. Now the battle has shifted to the cloud,
and we have to start walling off our digital communications, much of which are now
mobile. The more people that inoculate themselves from malware, spear phishing
attacks or hacker intrusions, the safer we all are.
Think about it, once you establish barriers to unwanted intrusions you wall off the
digital ailments that can spread so easily. Your online communications will be one
less component in a botnet assault. Your email account or Facebook profile can’t be
hacked to send a spear phishing request to a friend, colleague or business partner that
could lead to a larger data breach.
Although I view the act of taking personal responsibility for online privacy and
security as the single most important ingredient in stemming the tide of cybercrime,
there is also a role for government and law enforcement. We’re in the midst of an
interesting time as there aren’t comprehensive and functional data collection laws in
the U.S. and only some countries have variations of privacy acts, laws, and initiatives.
In the past 50 years, there have been several Supreme Court decisions to guarantee
our privacy rights — rights implied but not explicitly guaranteed in our Constitution.
But much of the ongoing furor today is in response to certain agencies not abiding by
such principles.
The ongoing NSA debate, tech giants advocating for transparency, medical identity
theft, and even Google’s Street View wire-tapping snafu, however complicated they
may be, illustrate one thing — online privacy and security are finally making
headlines. So let’s leverage the conversation for constructive benefit.
The great struggles — racial equality, gender equality, equal opportunity, and today,
universal health care, marriage equality and immigration reform — have all involved
crucial dialogue between our government and its citizens. And ultimately a legislative
agenda emerges to move society forward.
Of equal or even greater importance is whether or not we, the people, take action. We
as individuals need to demonstrate that privacy and security in the digital realm is a
top priority — that we are willing to take collective responsibility to protect ourselves
from growing threats to our online privacy and freedom.
A Pew Research Institute study from this summer revealed that 86 percent of
Americans have taken action to maintain anonymity online — deleting cookies,
encrypting email and/or protecting their IP address. Another telling metric from that
report states that 50 percent of Internet users say they are worried about the
information available about them online, up from 33 percent in 2009.
Additionally, an AnchorFree study from June 2013 that polled 1,200 U.S. and U.K.
college students revealed similar sentiments with 82 percent responding that they
were concerned about keeping their data private. Those are important developments
indicative of a changing tide in attitudes toward online privacy.
But everyone needs to do even more. A recent Verizon study of global law
enforcement data found that data breaches have more than doubled since 2009. Cyber
fraud perpetrated against individuals is growing at 15 to20 percent a year, according
to the FTC. The only way to build a culture defensible against data breaches, hacks,
and identity theft is to contain them within the realm of minor inconvenience and not
allow them to be contributors to a mass assault. The more we do to inoculate
ourselves against the digital flu, the less likely there will be digital pandemic.
It is no longer enough to install anti-virus software on your PC and dump your
cookies once a month. I urge everyone, first and foremost, to actively participate in
the debate about privacy and security. Equally important is for everyone to adjust their
online habits to help prevent privacy risks and security breaches. Choosing more
careful passwords, limiting where, when and with whom you share sensitive data, and
using a VPN to encrypt your data every time you go online are simple steps everyone
can take.
It is your responsibility to protect the Internet community for tomorrow’s users just as
much as it is mine.
David Gorodyansky is co-founder of AnchorFree.
2
DATA PRIVACY DAY 2020
SEPTEMBER 30, 2021
•
BETH STEWART
Led by the National Cyber Security Alliance (NCSA), Data Privacy Day began in the
United States and Canada in January 2008 as an extension of Data Protection Day in
Europe. Observed annually on January 28, Data Protection Day commemorates the
January 28, 1981 signing of Convention 108, the first legally binding international treaty
dealing with privacy and data protection.
As a returning Data Privacy Day Champion Organization, Pivotal IT is part of the
growing global effort among nonprofits, academic institutions, corporations,
government entities, municipalities and individuals to raise awareness at home,
at work and school and in their communities. Through collaboration and unified,
consistent messaging about privacy and protecting personal information, all Data
Privacy Day Champions are working toward the common goal of improving
individual and business consciousness toward respecting privacy, safeguarding
data and enabling trust.
A majority of Americans report being concerned about the way their data is being
used by companies (79 percent) or the government (64 percent).
Fully 79 percent of Americans say they are not too confident or not at all
confident that companies will admit mistakes and take responsibility if they
misuse or compromise personal information, and 69 percent report having this
same lack of confidence that firms will use their personal information in ways
they will be comfortable with.
Sales delays due to data privacy concerns are widespread and significant in
length. 65 percent of organizations reported that they have delays in their sales
cycle, and among all respondents, the average sales delay was 7.8 weeks.
The sales delays varied by country and industry. The longest delays by country
occurred in Latin America and Mexico, and by industry in the government and
healthcare sectors. Notably, the average sales delay was highly correlated with
the privacy maturity level of the organization.
Sales delays also varied significantly by the organizational model adopted for the
privacy resources. A hybrid model, which has a mix of centralized and
decentralized privacy resources, had shorter delays (4.6 weeks), compared to
models with fully centralized (9.8 weeks) or decentralized resources (7.1 weeks).
The level of privacy maturity also correlated with the likelihood and costs of data
breaches. 74 percent of privacy-immature companies experienced a cyber loss
of over $500,000 in the last year, compared to only 39 percent of privacy-mature
companies.
3
NATIONAL CYBERSECURITY
AWARENESS MONTH 2018
JANUARY 25, 2019
•
BETH STEWART
Identify Your Businesses’ “Crown Jewels” These are the assets and systems
that are critical to your business. Visit https://staysafeonline.org/cybersecure-
business/identify/ to learn how to identify your mission critical information
Protect Your Businesses’ Assets Put appropriate policies and systems in place
to keep your digital assets secure. For example, an Acceptable Use Policy that
addresses personal devices and internet use.
Visit https://staysafeonline.org/cybersecure-business/protect/ To learn more
about building cyber defenses around your businesses’ critical assets and
systems
Have a Plan for Responding Planning for a response is critical to reduce risks to
your business, customers, employees and reputation.
Visit https://staysafeonline.org/cybersecure-business/respond/ to learn more
about responding to responding to security incidents and maintaining business in
the short term.
Recover Normal Operations Move from the immediate aftermath of a cyber
incident to full restoration of normal systems and operations.
Visit https://staysafeonline.org/cybersecure-business/recover/ to learn more
about the immediate aftermath of a cyber incident and how to build your
cybersecurity posture to help prevent future incidents.
Your employees are the first and last line of defense in keeping your organization
safe and critical information protected. Be sure to educate ALL staff about their
vital role in the security of your business and the value of protecting consumer,
employee and other critical information
•
BETH STEWART
• Assume your information was compromised and that you will be affected
• Change the log in information and passwords of any accounts connected to or
that could be affected by the breach. If the username/password has been used
on other sites, change those also. For details and information about creating
stronger passwords check out our blog post about the recent changes to the
NIST Password Guidelines.
• Obtain a copy of your credit report from all three reporting agencies (Equifax,
Experian and TransUnion) to check for unusual activity, especially over the past
four months. You are entitled to free copies of your reports once every 12
months via the annualcreditreport.com site. CreditCards.com provides a
great interactive credit report sample with a walkthrough of the most common
elements that appear in each of the three credit bureau reports, as well as a link
to a free annual credit report from TransUnion.
• Check and monitor credit card accounts, bank accounts, as well as hotel and
airline loyalty accounts for suspicious activity and fraudulent charges.
• Place a free fraud alert on your credit file with one of the three reporting
agencies. This is a renewable, 90 day alert requires lenders to verify your
identity before issuing credit and notifies you when anyone opens a new account
in your name. Only one of the three bureaus needs to be notified for a fraud
alert (whichever bureau you contact is required to notify the other two.) Victims
of identity theft can request an Extended Fraud Alert, which lasts 7 years.
• Consider freezing your credit. Placing a freeze on your credit file prevents
anyone (including you) from applying for credit until the freeze is unlocked by
you. A freeze also prevents anyone from viewing or making changes to your
credit report. You must contact Equifax, TransUnion and Experian individually
to place a freeze and set up your personal identification number (PIN), which
allows you to temporarily lift, replace or remove the freeze. In South Carolina
there are no fees to place or remove a freeze. For North Carolina residents, the
fees can vary depending on the credit bureau, consumer age and if the protected
customer has been a victim of ID theft.
• File your taxes early! Having monitoring or a credit freeze in place does not
prevent tax related identity theft, which is already on the IRS’ Dirty Dozen List.
Unfortunately, the protections the IRS currently has in place (filing an identity-
theft affidavit or obtaining a filing PIN) are only available for victims of tax-
related identity theft. Having your Social Security Number exposed in a data
breach is not enough.
• Monitor your tax record. The IRS offers online access to tax records so
taxpayers can view the details of their tax accounts. If someone files a return in
your name you will be able to take action quickly.
• Watch out for phishing, phone and other scams that claim to be connected to
the breach or updates from Equifax. Equifax will be sending paper mail to those
impacted by the breach - they will not contact you directly by phone or e-mail.
• If you discover you have been a victim of identity theft, you should file a report
online with Federal Trade Commission or contact them by phone at 877-438-
4338. The FTC advises victims to also alert local law enforcement with the
following items: Copy of your FTC identity theft report, Proof of address such as
a utility bill, Government-issued ID with a photo and any other proof such as a bill
or IRS notice.
5
SPARTAN HIGH CYBER VIKINGS
JANUARY 25, 2019
•
BETH STEWART
6
HOW TO CREATE AN
ACCEPTABLE USE POLICY
FEBRUARY 7, 2019
•
BETH STEWART
7
7
7
LOCAL CALL SPAM? HERE'S HOW
TO BLOCK ROBOCALLS ON
LANDLINE AND MOBILE
MARCH 29, 2019
•
BETH STEWART
8
THE IMPORTANCE OF AN
ACCEPTABLE USE POLICY
APRIL 9, 2019
•
BETH STEWART
9
CYBER SAFE SHOPPING
JANUARY 25, 2019
•
BETH STEWART
•
BETH STEWART
Under the account tab you will find general settings including auto video playback
and the option to request a copy of your Twitter archive.
In the security and privacy tab, the first section you will see is login verification.
This is Twitter’s two factor authentication (2FA) which requires a mobile phone
number connected to your account for SMS text verification.
Due to increasing security concerns over the security of SMS based account
verification, the newest draft of the Digital Authentication Guidelines released by
the NIST, recommends moving away from SMS based messages as a form of
authentication. If you are interested in using Twitter’s log in verification, our
partners at SOPHOS have a fantastic walk through for setting up Twitter’s 2FA.
Privacy settings are found just below the security section.
Here you can alter settings for photo tagging, control who receives your posts
and opt out of adding a location to your Tweets (which is enabled by default.) To
opt out of targeted advertising and for the most privacy, be sure leave “Tailor
Twitter based on my recent website visits” and “Tailor ads based on information
shared by ad partners” unchecked.
The apps section will show you the applications that currently have access to
your Twitter account.
Be certain to revoke access to any unrecognized apps and those you no longer
use.
At the bottom of the navigation menu you will find a section called “Your Twitter
Data”.
As we covered earlier in this series, this section shows your login history, helping
you to identify unauthorized use of your account.
GOOGLE
In an attempt to make it easier to protect and secure your information, the
internet giant provides step by step Security and Privacy Checkups and other
services in the Google Dashboard.
From any Google service, click your profile picture and select My Account to
access your dashboard.
There is a large “I Agree” button at the bottom of the page, but we recommend
selecting more options and learning about the features and how they can affect
your account before enabling the service.
The Google Safety Center (formerly Google Good to Know) is another service
you can access for information about your security and privacy settings, app
management and free resources for parents and educators to help children stay
safe online.
We hope you’ve enjoyed this short blog series on Social Media Security.
Contact Pivotal IT at (864) 327-4075 to learn more about our robust security
solutions. From hardware and software to security training workshops for your
organization, we are here to help you reach your security goals.
•
BETH STEWART
IF IT'S FREE - YOU ARE THE PRODUCT
In this Pivotal IT blog series we will be guiding you through securing some of the
most popular media sites.
THE RELEASE OF UNENCRYPTED USERNAMES AND
PASSWORDS FROM THE 2012 LINKEDIN HACK SERVES AS A
POWERFUL REMINDER TO REVIEW YOUR PROFILE SECURITY
SETTINGS AND WHY IT IS SO IMPORTANT TO USE A UNIQUE
PASSWORD FOR EACH ACCOUNT.
LINKEDIN
From the drop down menu, select privacy and settings.
Under the account basics tab you will find the date your current password was
created and the ability to change and update your password.
The account basics tab also provides details on your active sessions, listing all
the places you are signed into LinkedIn. This information can help you identify
unauthorized use of your account. You can sign out of sessions individually or all
at once and should do so anytime you reset your password.
Under the privacy tab, you will find selections for data sharing with third parties,
advertising preferences and two factor authentication.
To opt out of sharing basic profile and contact information with third party
applications and “trusted third party platforms” select no for both choices under
sharing data with third parties. To enable two-step verification, you will need to
provide a phone number. Turning this feature on will sign you out of all active
LinkedIn sessions.
FACEBOOK
Facebook’s Privacy Check-up is a fast, easy way to check your basic security,
but we’re going to drill down into what data is being collected and made
accessible to third party apps and advertisers through and connected services.
After selecting “See More Settings” you will find editable categories on the right.
The App settings page will show you what apps are currently connected and
logged in with your Facebook account. It’s important to note that turning if you
turn off the platform completely, you will no longer be able to use applications or
websites connected to your Facebook account.
Selecting each app attached to your account will provide the details of the
service and what information it collects. You can remove any item not labeled as
“required” by the app by clicking the checkmark to deselect it.
Verify each app connected to your account by clicking on the application name.
For the privacy conscious, a review of “Apps Others Use” section is a
recommended. Here we can see the information anyone with the ability to view
your profile (not just friends) can "take" with them to the apps, games and
websites they view.
Facebook recently introduced a way to show ads across the web, not just to its
own users. A new privacy setting was also released, giving users the ability to
limit how their Facebook activity shows up in ads outside the platform.
Opting out of Facebook tracking your behavior across websites and apps to
determine what ads you see is nothing new. But now you can also opt out of your
information and activity on Facebook providing information for the ads. Under
Apps in the right navigation menu you will find ad preferences.
The first section allows you to turn off interest based ads and also provides a link
to the Digital Advertising Alliance, where you can opt out of interest based
advertising for all participating companies across the web. The second section
provides control for information shared off the Facebook platform and the ad
preferences section contains the catalog of things you have expressed interest in
on Facebook, websites and other services connected to your account. Turning
off the platform completely means you cannot play games or use applications.
You can limit the information by de-selecting the information you do not want to
share.
Social media can have tremendous benefits but can also can have serious
security risks for organizations. Two of the greatest risks are malware and
disclosure of sensitive information. We hope this blog series will help you
mitigate the security risks and limit the amount sensitive information you disclose.
Be sure to check back soon, when we take a look at privacy and security for
Twitter and Google.
•
BETH STEWART
Obstruction: Making an interaction more difficult than it needs to be in order to
prevent an action.
Brignull’s “Price Comparison Prevention” - This Dark Pattern purposefully makes
comparing the prices of products and services difficult. Tactics include hiding
model numbers/product IDs and preventing important product information on the
website from being copied to stop users from pasting the information into a
search bar or different website.
Brignull’s “Roach Motel” - A situation that is easy to get into, but hard to get out
of. This usually occurs when a user is easily able to sign up for a service, but
closing an account is difficult (or in some cases impossible.) This Dark Pattern
typically requires a user to call to cancel the account, where they are further
pressured to maintain the account (if you’ve ever tried to cancel SIRIUS XM,
you’ve experienced this first hand.) Another example is The New York Times,
where in order to cancel an online subscription, users are required to call during
specified business hours.
Easy to get in, not so easy to get out
Intermediate Currency – Users are required to spend real money to purchase a
virtual currency to use a service or purchase goods. Most often seen as video
games and in-app purchases for mobile games, the aim is to disconnect users
from the real dollar value spent, which can result in users spending the virtual
currency differently than they would with real money.
Sneaking: An attempt to hide, delay or disguise information that is relevant to the
user, in order to make a user perform an action they may object to if they had
knowledge of it.
One example of sneaking comes from Salesforce.com, which requires the user
to consent to a privacy statement before they can unsubscribe from an email
newsletter. This privacy statement allows for Salesforce to sell the user’s
information to other countries.
A hefty price to unsubscribe
Brignull’s “Forced Continuity” – If you ever signed up for a free trial that requires
a credit card, forget the expiration date and been automatically charged and
signed up – you’ve experienced forced continuity. This Dark Pattern takes
advantage of users’ forgetting to check and keep up with expiration dates.
Brignull’s “Hidden Costs” – A late or obscured disclosure of certain costs. In this
Pattern, the advertised price is changed late in the transaction due to taxes, fees,
limited time conditions or outrageous shipping costs. An example of this can be
found on the website for the Boston Globe, where a site wide banner claims a
user can subscribe for 99 cents a week, but if you follow the process to
subscribe, it is revealed that the advertised pricing only lasts for four weeks.
Brignull’s “Sneak into Basket” – This Dark Pattern sneaks an additional item or
items to a user’s online shopping cart, often claiming to be a suggestion based
on other items purchased by the user. An example of this can be found when
purchasing a domain from godaddy.com. The selection page shows pricing for
one year of domain registration, but after selecting the domain and proceeding to
the shopping cart page, the price is inflated due to additional items that require
specifically opting out being snuck into the basket: 2 years of domain registration
instead of one year as showing on the selection page.
Automatically adding two years to the cart - pretty sneaky!
Brignull’s “Bait and Switch” – This pattern makes it appear that a certain action
will cause a certain result, only to have it cause a different, likely undesired
result. One example of this is the “X” button of a pop up performing any action
other than closing a pop-up window. Another example found in the mobile game
“Two Dots”, where the buy more moves selection button is moved to position to
where the button to start a new game is normally positioned. This manipulation
of muscle memory increases the likely of being accidentally triggered by the user.
Interface Interference: Any manipulation of the user interface that favors specific
actions over others, confuses the user or limits the discovery of possibilities of an
important action.
Hidden Information – Options or actions relevant to the user that are not made
readily accessible. This Dark Pattern attempts to disguise relevant information as
irrelevant and can manifest as content or options hidden in fine print, a terms and
conditions statement or discolored text. An example of the latter is when the text
or link to unsubscribe from a newsletter or mailing list is colored the same as the
background in attempt to make it more difficult to see.
Preselection – Any situation where an option is selected by default before any
user interaction. For example, when Twitter recently updated their email
notifications, they automatically opted all users into receiving e-emails a for
several items, including “Top Tweets and Stories” activity.
Just what everyone needs...more email
Aesthetic Manipulation – Any design crafted to focus a user’s attention on one
thing in order to distract or convince a user. This Dark Pattern has four specific
subtypes:
Toying with Emotion – Use of color, language or style to persuade a user into an
action. Two examples of this can be found when trying to deactivate a Facebook
account.When starting the process, users are shown friends that “would miss
them” and tries to convince the user to stay by offering a counter argument to
whatever reason they selected for deactivating their account.
False Hierarchy – Giving one or more options to a visual or interactive interface
in order to convince a user to make a selection. For example, when trying to
unsubscribe from Yahoo’s newsletter, the design encourages users to click a
large, blue “no,cancel” button. In order to actually cancel the subscription, the
user must select one of the small, light gray text options under the large blue
button.
Brignull’s “Disguised Ad”– Ads disguised as interactive games, download buttons
or other prominent interaction or information a user is looking for.
Brignull’s “Trick Questions” – Use of confusing wording,double negatives or
leading language to manipulate user interactions. This Dark Pattern is commonly
seen when registering with a service, where check boxes are shown, but their
meaning is alternated, so the first choice means opt out and the second choice
means opt in.
Forced Action: Any situation in which users are required to perform a specific
action to access or continue to access functionality
An example of Forced Action is something most of us are familiar with - shutting
down a PC running the Windows 10 operating system. When there is a system
update available, the choices are “Update and Shut Down” and “Update and
Restart”, leaving no choice but to proceed with the update.
So much for options
The earlier example of sneaking illustrated on Salesforce.com is also part of this
Dark Pattern since the user must agree to allow the site to sell their information
to other countries in order to access functionality (in the case, unsubscribing).
Social Pyramid/Friend Spam – Commonly used in social media applications and
online games, this Dark Pattern incentivizes or requires users to recruit others in
order to use a service. The Farmville app provides a great example of both social
pyramid/friend spam and the final sub type Gamification, by pressuring users to
invite friends because certain goals and features within the game are useless or
inaccessible without online friends also playing.
Gamification – Certain aspects of a service can only be “earned” through
repeated use of aspects of the service. For example, the mobile game Candy
Crush Saga occasionally gives players levels that are impossible to complete in
order to urge them into purchasing extra lives or power ups. If the player does
not purchase anything from the game, it will slowly revert in difficulty in order to
keep users playing.
The Federal Trade Commission Act regulates the use of deceptive online
marketing, advertising and sales - but unfortunately has no legal authority to
regulate companies that use Dark Patterns to trick and deceive users. Although
there is no clear solution to the Dark Pattern issue, raising awareness is key and
the ability to spot Dark Patterns can go a long way in helping you avoid them
(and the companies that use them).
If you are interested in joining the fight against these deceptive design tricks, be
sure to visit the Dark Patterns website created by Harry Brignull - which he
founded to "shame and name" websites and companies that use Dark Patterns.