Personal information, particularly health care information, is being exposed in more places, through more “things” and to more people every day, which is creating new risks for people, businesses, health care organizations, governments and society as a whole. People all around the world are more concerned than ever about their privacy and the security of the personal information they share with others, with good reason.
The coming of age of privacy awareness is imminent. The question for today is “will you express your opinion and take action?”
Source: Blogs | StaySafeOnline.org
Thanks to StaySafeOnline
- Privacy – or a lack of it – is what drives concern about IoT in the USA (70%) and France (69%) versus a global average of 62%
- While around the world 54% name security their number one concern, in the UK it’s significantly higher (67%)
- 65% of Chinese and 61% of South African mobile users demand transparency from wearables providers over the use of their data compared to 52% worldwide
- 17% of Indians don’t want their TV to be connected to the internet compared to just 10% of the global sample.
Source: IOT Report 2016
Thanks to MEF – Mobile Ecosystem Forum
Transform your engineering processes and tools to gain a competitive advantage from the Internet of Things
IoT design will ultimately improve simplicity, functionality, and (Yes, Virginia) security!
Source: The impact of the Internet of Things on product development – Embedded Computing Design
Thanks to IoT Design
“How to Enable WhatsApp Two-Step Verification Passcode to Prevent Your Account from Being Hacked”
This isn’t rocket science folks – even though it adds a step that takes an additional minute to secure your transaction. Is your privacy worth an extra minute?
Source: WhatsApp Adds 2-Step Verification Passcode — Enable this Security Feature
Thanks to The Hacker News
“As the Internet of Things becomes more widespread, consumers must demand better security and privacy protections that don’t leave them vulnerable to..
As mobile applications, wearables and other Wi-Fi-connected consumer products replace “dumb” devices on the market, consumers will not be able to buy products that don’t have the ability to track them. It is normal for consumers to upgrade their appliances, and it most likely does not occur to them that those new devices will also be monitoring them.”
Source: The IoT threat to privacy
Thanks to Tech Crunch
Key escrow – the process of keeping a set of keys for yourself “just in case” – has always been the US government’s modus operandi when it comes to security.
The TechCrunch article is a must read – for a number of reasons, not the least which are the conclusions. In my “guarded” opinion not having locks at all is ludicrous. In this case, I was tempted to offer no opinion at all (since it might be useless), but I am reducing risk (slightly) by taking issue with the premise and the conclusion. The facts speak for themselves, yet another thread might be No Passwords At All because they might be cracked or Don’t Lock Your Car because criminals know how to break in. Aren’t we forgetting the deterrent or delaying possibilities?
Also, I seriously doubt that the author ever managed a company security office. If he did, I want to know his secret.
Source: Security experts have cloned all seven TSA master keys | TechCrunch
Thanks to TechCrunch
Encrypted comms company Silent Circle, which also makes a security-focused Android smartphone called the Blackphone, has announced it’s closed a $50 million Series C round of financing, led…
Looks like investors are beginning, finally, to see the value of encryption. Go SafeJunction!
Source: Encrypted comms company Silent Circle closes $50M Series C | TechCrunch
Thanks to TechCrunch
The internet is a dangerous place with all sorts of shady people out to get your personal data. One of the best ways to keep your accounts secure is with 2-factor authentication.
The slight inconvenience is worth the effort. But just don’t get caught without your cellphone or you’ll be back to cumbersome codes again. This user likes the cumbersome codes, though. My opinion is that the easier we make authentication and verification, the easier it will be to breach it.
Source: Google adds 2-step verification approval prompt on Android devices
Thanks to Ryan Whitwam in Google, News and Android Police
Google, Facebook, Amazon and a myriad of other “edge providers” are not covered by the eventual privacy rules that will be drafted.
Our social media giants continue to provide the illusion that your identity is safe – just what you’d expect from a free service.
Source: New FCC regulations may not give consumers true online privacy protection | TechCrunch
Thanks to TC – TechCrunch
No. This isn’t shameless marketing for Microsoft. We’re just happy to extend the private document conversation. SafeJunction’s SafePouch® is THE solution to your employee privacy challenges, especially when access rules and shares don’t provide the security granularity required.
Source: Your guide to securing end-to-end enterprise mobility
Thanks to Microsoft