In our normal day to day lives we understand the value of privacy. Locking the door to our homes or closing the curtains to the outside world comes naturally. But as we live more of our lives online and become increasingly dependent on our mobile and IoT devices, why do we give so little thought to our digital privacy?
Perhaps we don’t know exactly what to protect or why. The reality is that our personal data holds real value, and most of us are willing to trade it for small rewards, such as ‘free’ wi-fi, without a second thought. In these instances, it’s a trade-off, as we give away information voluntarily to get something in return. However, many of us don’t realize what we are actually giving away. Most companies don’t fully disclose what they are collecting or what they are planning to do with our information once they have it. Google, for example was recently fined for not enabling users to fully understand the extent of its user data processing operations.
The risks multiply as we spend more time on our mobile devices. Recent research claims that we spend around 24 hours a week online, which is twice as long as it was 10 years ago, and one in five of us is spending as much as 40 hours per week. It’s clear we are a generation dependent on our mobile devices, using them for everything from shopping, booking travel, looking up our health concerns to doing our online banking. In fact, Americans alone spent over $780 billion in mobile payments in 2017 and this number is expected to rise to $1 trillion this year.
Consider the impact of over 11 billion IoT devices globally. IDC estimates that this number will increase to 80 billion by 2025. As we allow our smart watches and health trackers to collect our personal data, our video cameras and doorbells to collect images and our virtual personal assistants to answer our questions, the potential privacy issues are hard to ignore. Recently it was reported that Amazon pays thousands of workers to listen in on our conversations and owners of Google’s Nest Secure system found that their devices contained ‘secret’ hidden microphones. It’s evident that as we allow more of these IoT devices into our daily lives our privacy will be further compromised.
Technology has many upsides, and it’s clear that our dependency will only increase as new products come to market promising to make our lives easier. However, there are downsides we can’t afford to ignore. As we willingly (and sometimes unknowingly) share our personal information, our digital footprint grows and becomes more valuable, and therefore more susceptible to falling into the wrong hands. We assume that vendors are building devices and services with a high level of security to protect our personal information, but the reality is that once our data is online our privacy and security are easily compromised.
Our digital profiles have a price, and, in many cases are sold legally, mostly for targeted advertising and digital marketing, and while this raises some concerns, that data is typically anonymous. What about the data that does include our personal information and isn’t sold through legal channels? Our data is valuable, and hackers are relentless in their pursuit of personally identifiable information that can be used for financial gain. The more data we share, the easier it becomes for them to obtain. Witness the attack on Equifax that exposed 147 million US citizens financial records.
As technology and privacy converge, we must be vigilant in protecting our personal information. Whilst we may be a generation of over sharers choosing to live our lives out loud on social media, no one wants to share their medical records, bank details or salary information. In a perfect world we would be able to trust organizations to protect our information but in reality, we need to take some responsibility ourselves. As Ronald Reagan once said, “Trust, but verify”.
Adopting a preventative approach to privacy and cybersecurity is more important than ever. Ensuring we are protected online and that our data is secured on the device is the first step in protecting ourselves from unwanted data collection and profiling. Software is now available to monitor outbound data connections in real-time to prevent the loss of data, so what’s on YOUR device, stays on YOUR device.
Related Posts
Ransomware Containment: Effective Strategies to Protect Your Business
Discover effective ransomware containment strategies for your business. This guide discusses network segmentation, zero trust, and practical best practices for IT managers and cybersecurity professionals to reduce ransomware damage.
Ransomware Meets Retail: Sainsbury’s, Starbucks and Morrisons Feel the Heat from Blue Yonder Attack
The Blue Yonder ransomware attack disrupted major retailers like Sainsbury’s, Starbucks, and Morrisons, highlighting the vulnerabilities of global supply chains and the urgent need for stronger cybersecurity defenses.
Top 5 Cyberattacks During Black Friday and Thanksgiving
Find out about the top five biggest cyberattacks for Black Friday and Thanksgiving, from data breaches and ransomware, to see the risks businesses experience during the holidays.
Healthcare Ransomware Attacks: How to Prevent and Respond Effectively
Learn how to protect yourself from healthcare ransomware attacks. We discuss the main security weaknesses, suggest security steps, and offer possible means of protecting patient information.
Everything That You Need to Know About the Dark Web and Cybercrime
Learn about the dark web, including who uses it, how it operates, and what tools cybercriminals obtain on it. Find out how BlackFog monitors networks, forums, and ransomware leak sites in order to stay ahead of new threats.
Ongoing: New Ransomware Gangs in 2024
Ransomware gangs continue to break records and BlackFog will track all new ransomware gangs in 2024.