Our Continuously Connected Lives: What’s Your ‘App’-titude?
Week 4: October 24-28, 2016
We are quickly advancing into a world where there is an app for everything. And more is still to come as smart cities, connected healthcare devices, digitized records and smart cars and homes are fast becoming our new reality. With compounding growth of connected technologies we are confronted with the need to be aware of how they impact our privacy and identity.
Week 4 looks to the future and discusses how cybersecurity is being built into advanced technology along with areas of opportunity for individuals to operate securely in a digital society.
The App in “App”titude
Most of our virtual interactions happen via our smartphones. Apps facilitate the use of external devices, social networks and productivity such as online banking. Be aware that all apps are not equal in terms of security or in the consequences of a successful hack.
15% of smartphone apps can scam you, study finds (Mashable)
Researcher Says It Only Takes Minutes To Hack Most Smart Home Security Devices (Consumerist)
The Internet of Things has a child privacy problem (Washington Post)
Privacy and the Internet of Things (New York Times)
Now more than ever, consumers spend increasing amounts of time on the Internet. With every social media account you sign up for, every picture you post and status you update, you are sharing information about yourself with these social media companies and the world. How can you make sure you and your information stay safe online? The Department of Homeland Security (DHS) has a more comprehensive Social Media Guide (PDF) for students, parents and bloggers.
The Human Factor
At CUNY and Hunter College we are aware of the increased use of smart phones to connect to the world, especially the social world.
Useful tips fron the ICIT Security website:
• Hunter and CUNY will never ask you for personal information (such as Social Security number, credit card information, passwords, etc).
• Don’t respond to emails or phone calls requesting confidential Information, especially if unsolicited. Remember it is OK to say NO.
• Social networking sites (Facebook, Twitter, etc.), personal web pages, and blogs are great places for people to find personal information about you -- and once you post something, you can't take it back.
• Make sure to clear browser data, log off sites, and do not use public computers to make purchases online.
• Don't attach devices to unknown networks or computers.
The CUNY CIS Information Security website has a list of Do’s and Don’ts