Why are you getting this? Please read our Privacy Notice & Communication Info at the bottom of this message.
|
|
|
August is as Hot as Your Private Data
It's getting toasty out there! Hopefully, you have plans for enjoying the heat while also giving yourself a reprieve in the AC or in the water every now and then.
Thank you for the response to last month's Tips message. We like to try new things, and we love to get feedback. Based on your input, we're going to continue our "more-news-fewer-links" approach while also including several tips-oriented answers to "burning" reader questions. (Keep those hot questions coming in, by the way.)
We'll also continue our wacky 'holiday' features, as many of you shared that the concept helps improve data security and privacy awareness... a passion of mine and my team's.
Enjoy your summer. Stay safe and cool!
Rebecca
|
|
August Tips of the Month
- International Update Your Bio Day
- Privacy & Security Questions & Tips
- Hawaiian Statehood & Hawaiian Shirt Days
- Data Security & Privacy Beacons
- A Slew of Culinary Days in August
- Where to Find The Privacy Professor
|
|
International Update Your Bio Day
August 10
|
|
From the 2002 Album, “Loose Screw,” by The Pretenders
|
|
This month, we are focusing on misinformation. August 10 is International Update Your Bio Day. What's the connection? Well...you know where you can find a whole heap of misinformation? In the social media profiles of catphishing cybercrooks.
Sometimes these scammers use completely bogus bios. More often than not, however, they take someone else’s bio and use it as their own to advance their catphishing endeavors.
When you update your bio, remove everything that doesn't need to be there, like your birthday. Or for fun, add some information to throw off scammers. You could list your birth year as 1905, for example. (On Facebook, Rebecca lists her residence as Elephant Island, Antarctica.)
Last month, we included a song related to one of our wacky holidays. It's a good way to make new information stick. This month's holiday-related song is "Lie to Me" by The Pretenders. Think of the lyrics as telling catphishers that they are not believed; that you are too smart to fall for those long-winded lies.
How to Incorporate Music into Training Activities
Using songs for training sessions and awareness activities helps employees, friends and family spot key indicators of online misinformation and lies. Organize a short, fun meeting during which you play the above song. Talk through the lyrics and how they relate to the misinformation trend. Then, loop the song softly in the background as participants share catphishing stories, either from their own or others' experiences.
You can also create a short video using the same methodology. (Just be sure to cite the source appropriately.)
Rebecca has used similar types of activities for data security and privacy training. It's a great way to engage people and to get them thinking critically, often for days, weeks or months after your event, about the topic(s). And then again every time they hear the song!
|
|
Privacy & Security Questons & Tips
Rebecca answers hot-topic questions from Tips readers
|
|
Q: My kids encouraged me to get a Koretrak-brand smart watch. It connects to my phone via Bluetooth, monitors my heart rate and sleep and plugs into a USB to charge. How can I secure it?
A: Let's start with the device provider. Any time you're curious about how a device is using your data (a starting point for securing it), check out the provider's privacy policy. Koretrak's privacy policy includes several red flags:
- There is no date for the last update to the policy. Every privacy policy should have this information so users know it's up-to-date and reflects current practices. Strike one.
- Although they name a few personal information types they collect, they do not include a list. Strike two.
- Koretrak shares personal data with an unknown number of unnamed third parties and they take no responsibility for how third-parties use that data. In fact, the policy, even states “...we recommend that you read their privacy policies so you can understand the manner in which your personal information will be handled by these providers.” Strike three.
- The policy indicates Koretrak will only send customers email marketing with permission, and that customers may opt-out by contacting the company at https://support.korehealth.com.” Sounds good except for one thing. When we followed that link on July 22, it led to an error message each of the 5 times we tried it (see screenshot below)! This is the same link Koretrak references for customer questions about security and privacy. So, basically there is no way to opt-out of unwanted marketing, nor to ask questions about security and privacy). What's more, in researching the page source, you can see the company updated this page on July 2, 2021. Why wouldn't the error have been fixed at that time? Strike four.
|
|
These factors alone amount to enough reason not to do business with Koretrak. But, we have a few other factors that further eliminate them from consideration:
- The three sentences of security information provided do not include enough detail.
- The company indicates it will provide personal information to other entities for any reason.
- This is troubling... they "reserve the right to modify this privacy policy at any time, so please review it frequently. Changes and clarifications will take effect immediately upon their posting on the website.”
Keep in mind, all internet of things (IoT) devices, including smart watches, digital assistants, smart cars and security systems, rely on personal data. It's the "knowing you" aspect of their function that attracts people to the devices. Therefore, it's critical you understand how that data is being gathered, analyzed and shared, not to mention secured.
Here are some quick tips for securing smart watches in general:
- Regularly check posted privacy notices/policies for the items listed above.
- Configure settings to share the least amount of data possible.
- Keep the device turned completely off when not in use.
- Keep smart watch software updated. A responsible and dependable smart watch provider will let you know how to do this.
- Use the anti-theft settings to keep others from accessing the data from your smart watch. This keeps crooks from pairing your watch with the associated vendor app that they may have downloaded to their own devices.
- Use multi-factor authentication (MFA). If your smart watch doesn’t offer this, don’t get the smart watch…it’s actually pretty dumb.
- Set an online search for the name of your smart watch combined with the following: “security” “privacy”. You will get a notification if those words are found online. Set other groups of keywords in a similar manner for other types of alerts.
- When you are through with it, delete all your data from the device, as well as from the device manufacturer's server. The vendor should give you information for how to do this on their site, either within their privacy and/or security policy/notice. (Koretrak did not have this information in their notice... strike five!).
Q: Is a time considered protected health information (PHI) under HIPAA, in the context of being within covered entities (CEs) and business associates (BAs)?
A: Generally, no. However, providers must consider the use of specific data types in the context within which they are used. There are some instances when time could be considered PHI under HIPAA. Two examples:
- When a date combined with time is associated with a type of healthcare activity, such as a unique type of surgery (e.g., separating conjoined twins)
- Time combined with a specific location (e.g., in an outpost in Antarctica where only one person may be located)
In unique conditions where the time, combined with other non-PHI pieces of information (unique surgery, location), could identify a specific patient, that time could become part of PHI within that particular context.
For CEs and BAs, this is becoming a critical question, specifically in situations where artificial intelligence is used. If a time is used with other non-PHI items to derive insights about an individual, that piece of information could be argued as PHI.
Q: What does the Kaseya security problem mean to me?
A: On Friday, July 2nd, Kaseya received reports from customers about unusual behavior occurring on endpoints managed by the Kaseya VSA remote monitoring on-premises product. Soon after, customer reports indicated that ransomware was being executed on endpoints. Kaseya estimates that 800 to 1,500 small to medium-sized companies may have been compromised through their managed service provider (MSP). Generally, this means businesses that use an MSP that also uses Kaseya may be targeted for a ransomware attack.
If your MSP has applied the patch Kaseya released on July 20, and you haven’t experienced any problems, you may be okay. Contact your MSP and ask them how the attack impacted them and what risk mitigation steps they've taken.
If you are tech-savvy and familiar with the Kaseya VSA, you can download Kaseya's Indicators of Compromise tool. There are two PowerShell scripts: one on a VSA server, and the other for endpoint scanning. Be sure to use the self-assessment scripts offline. They were updated on July 5 to also scan for data encryption and REvil's ransom note.
When Rebecca learned of the Kaseya breach, her first step was to contact the MSP that hosts our Privacy & Security Brainiacs SaaS services. Fortunately, they do not use Kaseya (They use other types of monitoring tools.).
Of course, this doesn't mean our MSP won't be targeted in different attacks. However, knowing they have many layers of defenses to block these attacks does provide some peace of mind. That along with having up-to-date multiple backups to use within recovery plans.
Q: I'm looking for best practices around customer identity verification. Any sources you could point me to would be most appreciated!
Q: My elderly father is sent disinformation every day. He is bombarded with conspiracy theories. The latest is that the COVID-19 vaccine injected tracking in his body, and his vital signs are being posted on the dark web and sold to crooks who will target him for physical crimes. The deluge of disinformation, conspiracy theories and outright lies is overwhelming. I cannot figure out how to educate him or dissuade him from believing this stuff. Do you have any suggestions?
A: We understand your concern and frustration. It is a huge problem that often also involves numerous scams and privacy breaches beyond the bad information.
Many folks in their 60s, 70s, 80s and beyond are extremely tech savvy. However, a large portion are not. A Princeton and New York University study found that people over 65 are more likely than other age groups to share false information, disinformation and conspiracy theories online.
Here are some resources that you may find helpful:
|
|
Hawaiian Statehood & Hawaiian Shirt Days
August 20
|
|
On August 21, 1959, President Dwight D. Eisenhower signed a proclamation making Hawaii the 50th US state. That day happened to be the third Friday in August, which is when Hawaiian Statehood Day (and naturally, Hawaiian Shirt Day, as well) is recognized annually.
Speaking of Hawaii, the state is addressing security and privacy in an impressive way, enacting and maintaining the following laws:
• Act 135, Notification of Security Breaches: Requires businesses and government agencies that keep confidential personal information about consumers to notify those consumers if that information has been compromised by an unauthorized disclosure
• Act 136, Destruction of Personal Information: Requires businesses and government agencies to take reasonable measures to protect against unauthorized access to an individual’s personal information when disposing of the records they keep
• Act 137, Social Security Number Protection: Restricts businesses and government agencies from disclosing consumers’ Social Security numbers to the general public. Y
|
|
Data Security & Privacy Beacons*
People and places making a difference
|
|
Entrepreneur Magazine shined a light on eight data stealers, specifically apps that put Android cell phones at risk. After reading up on them, you may choose to uninstall the apps assoon as possible.
FightCyberCrime.org produced a COVID-19 scams infographic that succinctly describes several pandemic-related data security and privacy traps.
Fakespot developed a browser plugin that lets you spot and avoid shady sellers, products with dishonest reviews and scam websites. We’ve not tried this out yet, but plan to.
The US Department of State instituted the Rewards for Justice (RFJ) program. It offers up to $10 million for information leading to the identification or location of any person who, while acting at the direction or under the control of a foreign government, participates in malicious cyber activities against US critical infrastructure in violation of the Computer Fraud and Abuse Act (CFAA). This is tied to many recent US privacy breaches.
IPQaulityScore helps internet users check to see if a URL is malicious. The site provides more information than most other URL checkers, giving those of us who want more information beyond "this site is safe" the ability to make more informed safety determinations.
*Privacy Beacons do not necessarily indicate an organization or person is addressing every privacy protection perfectly. It simply highlights a noteworthy example of privacy-aware practices.
|
|
Worldwide Web Day
August 1
|
|
Interesting facts about the World Wide Web (WWW):
- The WWW was conceived by Tim Berners-Lee on August 6, 1991, at the CERN center in Geneva, Switzerland. He was looking for a way to communicate with co-workers via hyperlinks.
- The WWW grew significantly 1993. At the start of the year, there were only 50 servers around the world. By October, there were more than 500.
- Two of the earliest webcomics, NetBoy and Doctor Fun, also started in 1993.
- As of July 17, 2021, there were 1.9 billion websites in the world, but just under 200 million are active. Imagine how many of those inactive sites have been repurposed by cybercrooks for nefarious purposes!
|
|
Privacy & Security News
We're changing it up!
|
|
Of those who decided to let their opinions be known, they overwhelmingly say they love the Privacy & Security Brainiacs News Page where we now post daily pointers to news articles. We are earning increasingly more visits to the page every day, as we add news items of interest. So, we will continue. Thank you for all your feedback!
About the Privacy & Security Brainiacs (PSB) News Page
The PSB News page contains news grouped by each month, and within each month by specific topic. We add new news items regularly, often daily. We curate the news we find of most concern and interest, so those going to that page can see what we pass along to our clients and employees.
Some of the recent news we included covered...
- security flaws and privacy problems with mobile apps
- brushing (getting stuff in the mail you didn’t order)
- artificial intelligence risks
- SBOMs (software bill of materials)
- cryptography
- firmware vulnerabilities
- supply chain vulnerabilities
- surveillance…of many different types
- cybercrime and cyberattacks
- disposal security incidents
Check out the news page and revisit often to keep up with news items our team finds worthy of mention.
|
|
A Slew of Culinary Days in August
Can you spot the privacy implications?
|
|
August contains a large number of days devoted to pies and pie-like desserts, along with bacon! We couldn't resist including just of few of these tasty tidbits in the Tips this month (Believe it or not, there are many more!).
Savory to balance out the sweet.
As you scan the list, think of ways to relate these tasty bites to security and privacy insights and tips. We’ve included one for you as an example; did you spot it?
Sweets…
- August 15: National Lemon Meringue Pie Day
- August 18: National Ice Cream Pie Day
- August 20: National Chocolate Pecan Pie Day
- August 22: National Pecan Torte Day
- August 27: National Pots De Creme Day
- August 28: National Cherry Turnovers Day Don’t “turnover” your password or personal information to others!
- August 30: National Toasted Marshmallow Day
Savories…
- August 5: National Oyster Day
- August 12: National Julienne Fries Day
- August 20: UK National Bacon Lovers Day
- August 26: National Burger Day
- August 31: National Bacon Day
Ask your employees, co-workers, friends and family how they can relate security and/or privacy with these food items. Let us know your inspirations! We may include some of them in an upcoming issue.
If you want links to the pages with information about each of these, just let us know. We did not include the hyperlinks here because we didn’t want to set off the spam filters with too many embedded web addresses.
|
|
Where to Find the Privacy Professor
|
|
Podcasts, webinars, news articles and other content featuring Rebecca's insight
|
|
IANS Webinar
Watch On-Demand
|
|
Cybersecurity Online Summit: Threat Trends and Opportunities
August 4, 2021, at 9 am central
Rebecca is joining Lawrence Cruciana from CIT in the session
|
|
A few recent industry articles to which I've contributed thoughts...
|
|
 |
Report on Patient Privacy Volume 21, Number 7
|
|
 |
 |
|
 |
|
|
Latest Episode
Next Episode
Airing first on August 7, 2021!
|
|
|
|
Privacy & Security Brainiacs| Website
|
|
|
Permission to Share
If you would like to share, please forward the Tips message in its entirety. You can share excerpts, as well, with the following attribution:
NOTE: Permission for excerpts does not extend to images.
Privacy Notice & Communication Info
You are receiving this Privacy Professor Tips message as a result of:
2) making a request directly to Rebecca Herold; or
3) connecting with Rebecca Herold on LinkedIn.
When LinkedIn users initiate a connection with Rebecca Herold, she sends a direct message when accepting their invitation. That message states that in the spirit of networking and in support of the encouraged communications by LinkedIn, she will send those asking for LinkedIn connections her Tips message monthly. If they do not want to receive the Tips message, LinkedIn connections are invited to let Rebecca know by responding to that LinkedIn message or contacting her at rebeccaherold@rebeccaherold.com.
If you wish to unsubscribe, just click the SafeUnsubscribe link below.
|
|
|
|
|
|
|