Personal Data

Personal Data

  • 7 questions to ask yourself as a business owner after 150 million individuals have their data leaked

    150 million individuals have their data leaked by a Fitness App. Data leaks are a common issue that continues to go on and on. Each time more and more money and time is lost by people, companies, and governments in fixing, patching, strengthening and understanding why it went wrong this time.

    Let’s look at the positives on the latest data breach

    • The data breach was reported to all users within 4 days of the hack being discovered, and that was only a month after they believe it occurred
    • The passwords were all stored using encryption, although some the encryption was a lower level than it could have been.
    • Only usernames emails and encrypted passwords were exposed, no personal information such as date of birth, credit cards, height or weight

    As yet the Under Armour (who own the MyFitnessPal app) have yet to confirm the cause, although speculation is that it was due to user clicking an infected email attachment. User training on security is becoming more and more important, if you don’t have a training program for your team that is run at least annually you are putting your customers at risk. As firewalls and antivirus and spam detectors have become more and more robust, the hackers are also adapting with more and more elegant and creative ways to get the link to the user.

    Things to think about as a business

    • If you allow any (and we mean any) employee to connect their own device to your wifi, is that wifi separate from the corporate network ?
    • If you have any corporate mobile devices, are you monitoring the patch, firewall and antivirus status of the devices, what access to other physical ports are allowed?
    • What intelligent devices do you have on your network that are connecting and talking with the outside world, are they on a separate network ?
    • Are there any physical network cabling / ports in public places, are they disconnected or protected ?
    • How are you monitoring the training of staff on their security awareness, is cybersecurity awareness part of a new starters induction ?
    • Consider unwanted people that might enter the building, are staff aware of which doors should be kept closed ?
    • How would you detect a data breach ?

    If you don’t have the answer to these 7 questions our security consultancy services are available to assist.

    #telanovaReporter

  • Just when you thought it was safe to go online

    Facenet and dating of the future

    Sometimes there are times when you read something that makes you consider the future in a very poor light. Having this particular program made publically available at this early stage of development is also a cause for concern of how skewed the world will become in the near future.

    Many people will have by now at sometime in their adult life joined , have a close friend or family member that has experienced one of the online dating services. The services generally rely heavily on the basis of instant attraction. In many, you are presented with a visual of the person before any details of the personality are supplied to the browser. Again on the visual impact, the browser can choose to like / skip etc.

    Think now to the newly released python script, from Charles F. Jekel and Raphael T. Haftka of the University of Florida [arXiv:1803.04347 [cs.CV]], that based on just 20 of your likes is able to build a generic facial representation, which when applied to further images has an accuracy of 60% of knowing if you will like that image.

    Once trained on 406 profiles, where each like represented a different classifier, it was over 70% accurate. Being one of the first algorithms in the area, accuracy is likely to improve over time. The question being then is where will this lead ?

    Will you be able to take your liking profile from one supplier and use them with another. The reality of how oddly familiar this all seems, think about where else your liking data is used for marketing. Marketing teams will see the usefulness of this data being collected. Will the privacy agreement you’ve signed protect you liking data. The company you use could use that data for their own purposes as long as it is in their privacy agreement.

    Fast forward a few years, and every website you visit could be presented by a computer generated personna that is facially configured to match your dream person. How could you resist not purchasing 63 pallets of widgets that you really don’t need just because you want to please them.

    During the rise of computers we were wowed by the amazing graphics and realism that slowly grew as processors became more powerful. Soon the realism will not be realism but a distortion of reality based on our dreams and desires.

    Back in reality however, it may just be time to think twice about how you let companies use your data, not all of your data is input by you on a clearly laid out form. Your data is how you navigate, how you interact, how you choose, what you look at. Under GDPR companies must release all your data they collect about you to you, and must tell you how they are processing it.

    For more information about the FaceNet script see https://github.com/cjekel/tindetheus/ * arXiv:1803.04347 [cs.CV]

    For more information about GDPR email This email address is being protected from spambots. You need JavaScript enabled to view it.

    #telanovaReporter

We use cookies to provide you with the best possible experience in your interactions on our website

You agree to our use of cookies on your device by continuing to use our website

I understand