DIGITAL MEDIA GHOST
  • Publication
  • #GhostsWriteIt Spotlight
    • Writer Spotlight Submission
  • Services
    • Digital Strategy
      • Content Marketing
      • Law Firm Marketing
      • Social Media Management
    • Ghostwriting
    • Public Relations
      • Social Sabotage & Online Privacy
        • Social Media Policy Template
  • About
  • Publication
  • #GhostsWriteIt Spotlight
    • Writer Spotlight Submission
  • Services
    • Digital Strategy
      • Content Marketing
      • Law Firm Marketing
      • Social Media Management
    • Ghostwriting
    • Public Relations
      • Social Sabotage & Online Privacy
        • Social Media Policy Template
  • About
Search

‘CSI: Cyber’ Reminds Us Why Privacy and Security Matter

3/9/2015

 
by Kim Niemi 

I don’t have kids, and most of my friends’ children were born before Wi-Fi-enabled nanny-cams were a thing, but my sister is about to have my first nephew, which is how I first heard about nanny-cam hacking. What’s the line from that movie? “If you build it, they will hack it?” Sounds about right.

​I was talking shower gifts with my mom and she relayed that my sister has zero interest in baby monitor systems that include video. When I asked why, my mother explained, “Because people can hack into them and talk to your baby.”


Ah, technology.

Of course, any electronic device can be hacked. But I’d never have thought of that. Which is why it was even more bizarre that not a day later “CSI: Cyber” premiered with an episode focused around a case involving babies kidnapped for the black market. And what did the evil brains behind the kidnappings use to find babies? You guessed it – Wi-Fi-enabled nanny-cams.

Privacy is no small topic in our tech-obsessed culture. Most Americans are at least somewhat privacy-conscious to begin with – and CSI’s latest franchise is likely to be a weekly reminder of why that’s smart – but nanny-cam hacking incidents are just one example of the various ways we have our guards down.

And we really can’t afford to be so careless.

Because technology is advancing (faster than privacy laws can catch up). And with the Internet of Things upon us, we need to know how we’re going to keep everyone safe from new devices and the vulnerabilities they bring.

Brands need to take action

A recent FTC report urges companies to follow a set of best practices as they develop new technologies that will become part of the IoT network, and that’s a start.

In the FTC’s press release in January, FTC Chairwoman Edith Ramirez was quoted as saying, “The only way for the Internet of Things to reach its full potential for innovation is with the trust of American consumers.” And that is absolutely correct.

But so far Americans, though they often state their privacy concerns, don’t seem to be worried. Or maybe it’s just that they’re not worried enough.

 “We take your privacy seriously,” we read in many a loyalty program or credit card application. Sounds wonderful, but it usually prefaces a lengthy statement that requires a law degree to understand. How many people actually take the time to read through that information? Not the majority.

Conversely, we download an app and are told that the app needs permission to all but burp our child (to continue the baby theme) in order for us to use it, and we click away barely noticing what we’re saying “OK” to.

It’s hard to know where to stand. There are the blind clickers who have faith in everyone, and don’t worry about what they might be signing off on, more concerned that they get to use whatever app is all the rage. And there are those who steadfastly refuse to participate, with a just-this-side of conspiracy theorist paranoia.

The middle ground should be a place where we can choose what we feel okay with (maybe you DON’T need to access my camera, App-of-the-day, and you could still work), and know that we can trust those choices because the companies we’re putting our faith in have our backs for real – instead of finding out after months of using their credit card that their customer database has been hacked and our information is now at risk.

Consumers must accept responsibility too

Of course, that means that when things happen, we respond with consequences to teach the companies that fail us a lesson – something that doesn’t always happen now.

While it was nice to see a bit of outrage about Facebook’s Messenger app, what most people didn’t realize was that they’d already given over exactly the same amount of control over their data and device to Facebook itself, and to any other app they were already using.

Who knows why Messenger became the goat for privacy concerns at that moment, but it was a sign that people were at least paying attention, and standing their ground. I have friends who still haven’t downloaded the app. Unfortunately, all those closed barn doors do nothing to contain the horses already running freely. 

In the case of the nude photos leak of August 2014, it’s still not clear that iCloud was the problem. Even if it was, speaking to Forbes, Chris Boyd, Malware Intelligence Analyst at Malwarebytes pointed out,

“‘This is an intriguing twist on the usual personal data breach story,’ he explained. ‘Whereas typically value is created by packaging up vast numbers of unknown people’s information, in this case the individual responsible has allegedly targeted a small set of extremely valuable targets.’”

In other words, the odds seem pretty slim that anyone is going after the rest of us, and our family vacation photos and voluminous selfies. Even so, there were plenty in the wake of Celebgate who wanted to remove their information from iCloud. For the rest, using two-step authentication was recommended by Apple. But how many are using it?

After Home Depot’s data breach, business continued as usual, with affected customers enjoying free credit monitoring service as a consolation prize for stolen email addresses and credit card information. The clear message here? Police your own data. But let us know if that monitoring service alerts you to anything suspicious.

It really does come down to that, and it seems not many of us recognize the reality: the technology, the companies, the devices that we put our trust in are not responsible for us. We have to be the ones who make use of the tools available to us, coupled with common sense about what to share and not share, and how to keep technology from being used against us.

As for my sister, I’m buying her a nice diaper bag.

What’s your line in the sand with personal security? Do you use Messenger? iCloud? I’d love to know why you do – or don’t. 



IMAGE CREDIT: YURI SAMOILOV

Comments are closed.
    Picture
    Become a Ghostwriter!
    Picture
    Contribute to DMG
    Picture
    BECOME A GUEST CONTRIBUTOR
    Picture
    PROMOTE YOUR BUSINESS BY GUEST POSTING
    Picture
    ARE YOU A GHOSTWRITER? WE WANT TO KNOW!
    Picture
    DO YOU HAVE A GHOSTWRITING BUSINESS?

    RSS Feed

    Categories

    All
    Agency Spotlight
    Business
    Digital Marketing
    Ghost In A Flash
    Ghostwriting
    Media Relations
    Privacy Concerns
    Social Sabotage
    Technology
    Writer Spotlight
    Writing

    Advertising Disclaimer

    Archives

    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014
    March 2014
    February 2014
    January 2014
    December 2013
    November 2013
    October 2013
    September 2013
    August 2013
    July 2013
    May 2013
    December 2012
    November 2012
    October 2012
    September 2012
    August 2012
    July 2012
    June 2012

Find your domain and create your site at Weebly.com!
Digital Media Strategy
Content Marketing
Law Firm Marketing
Search Engine Optimization
Social Media Marketing
eBooks
Writing
Becoming a Ghostwriter
Blogging
Content Marketing
Ghostwriting Services
Guest Post Guidelines
Media Relations
Online Crisis Management
Personal Brand
Public Relations
Reputation Management
About
Our Team
Our Results
Testimonials
Contact Us
Locations:
New Orleans, LA
Nashville, TN

DMG University
Privacy Policy | Terms & Conditions | Cookie Policy
Digital Media Ghost  @2020
  • Publication
  • #GhostsWriteIt Spotlight
    • Writer Spotlight Submission
  • Services
    • Digital Strategy
      • Content Marketing
      • Law Firm Marketing
      • Social Media Management
    • Ghostwriting
    • Public Relations
      • Social Sabotage & Online Privacy
        • Social Media Policy Template
  • About