Create an account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Microsoft - Oversharing and safety in the age of social media

#1
Oversharing and safety in the age of social media

<div style="margin: 5px 5% 10px 5%;"><img src="http://www.sickgaming.net/blog/wp-content/uploads/2019/04/oversharing-and-safety-in-the-age-of-social-media.jpg" width="1200" height="630" title="" alt="" /></div><div><div><img src="http://www.sickgaming.net/blog/wp-content/uploads/2019/04/oversharing-and-safety-in-the-age-of-social-media.jpg" class="ff-og-image-inserted"></div>
<p>Many years ago, I worked with healthcare organizations to install infrastructure to support the modernization of their information systems. As I traversed hospitals – both in public and private sectors – I was often struck by one particular best practice: the privacy reminders were ubiquitous. If I stepped into an elevator or walked down a hallway, there was signage to remind everyone about patient privacy. Nothing was left to chance or interpretation. This was also pre-social media, so the concerns ranged from public conversations or inappropriate use of email, to leaving a document on a public printer.</p>
<p>Fast forward to 2019. Our society and culture have changed. We are much freer with our personal information on social media. We talk openly about our lives and post pictures and family information in the wild. We are less concerned about our privacy, as we use these platforms to connect with others – a connection we might be denied given our busy lives. However, as has oft been written, these platforms can be a cache of riches for someone seeking to steal your identity or compromise your email and other accounts. This same type of free flow of information is also following us to other parts of our lives and making it easier for the bad guys to attack and profit. Let me explain with a few examples.</p>
<p>I travel a bit (okay, a lot). While my global travel is mostly for work, this provides an informative world lens for people watching and listening. I am often between flights in an airport reading or catching up on email and overhear a wide variety of conversations – without even trying. Recently, I was in the U.S., delayed at the Chicago O’Hare airport for several hours as “there is (was) weather in Chicago,” the worst phrase in the US travel industry. I overheard a man on the phone discussing his declined credit card in detail, including his full name, billing ZIP code, card number, expiration date, and so on. My shock quickly faded when I started thinking about how many other times I was in public and overheard things that could lead to financial or IP or other loss for an individual or company. The number is non-trivial. That’s when I decided to tweet some simple advice, and solicit input via my twitter feed.</p>
<p>The results were equally horrifying and amusing. Some even thought my post was an attempt in social engineering. Overall, the response convinced me to write a blog as the evidence I gathered suggests this isn’t a small problem. Rather, it’s a real problem. So let me start by sharing some examples and then make some suggestions (which may seem obvious to many of you) on how to protect your privacy and security.</p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Notes from the airport lounge: social engineering is a thing … a really big thing. Please protect your personal information (like credit card numbers, sensitive customer information etc).</p>
<p>— Ann Johnson (@ajohnsocyber) <a href="https://twitter.com/ajohnsocyber/status/1117807206987194370?ref_src=twsrc%5Etfw">April 15, 2019</a></p>
</blockquote>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">I’ve overheard people many times talking in lounges about confidential info re: unannounced acquisitions. ?‍♂️</p>
<p>— Orion (@OrionListug) <a href="https://twitter.com/OrionListug/status/1117834687739723777?ref_src=twsrc%5Etfw">April 15, 2019</a></p>
</blockquote>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">And a few drinks later I’ve learned about unannounced acquisitions… marriage infidelities, the amount of debt someone owes, passwords pulled up from a word doc. <a href="https://t.co/pPDDZd6xq7">pic.twitter.com/pPDDZd6xq7</a></p>
<p>— root (@rootsecdev) <a href="https://twitter.com/rootsecdev/status/1117839838751936513?ref_src=twsrc%5Etfw">April 15, 2019</a></p>
</blockquote>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">My favorite are people who have had their credit card disabled because their travel inadvertently flagged fraud prevention.<br />So they are in the middle of the airport, reciting all their personal info to the bank to get the card turned back on.</p>
<p>— Andy Mallon ?️‍? (@AMtwo) <a href="https://twitter.com/AMtwo/status/1118507986564079617?ref_src=twsrc%5Etfw">April 17, 2019</a></p>
</blockquote>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">How you never lock your system when you walk away because it’s so inconvenient to enter your credentials. o_o. // How people on the CTA hold their phone outward and call utility companies and banks and provide information loudly. &gt;_&lt;</p>
<p>— Christopher Clai ?? (@ChrisClai) <a href="https://twitter.com/ChrisClai/status/1118520129887846400?ref_src=twsrc%5Etfw">April 17, 2019</a></p>
</blockquote>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">At one of my first IT gigs we kinda beat each other out of the first one by changing people’s desktop backgrounds to annoying memes. (I got to the point of using a bluetooth dongle and my almost-smart phone to autolock it lol)</p>
<p>— Chris ?? (@tuba_man) <a href="https://twitter.com/tuba_man/status/1118522094638133250?ref_src=twsrc%5Etfw">April 17, 2019</a></p>
</blockquote>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">I recently interacted with a thread where it asked individuals for the security weaknesses that they recognized in their orgs and felt would be critical if not fixed. I’m sure if people didn’t warn against accurately responding might in fact harm their org if used by attacker.</p>
<p>— C:…Security (@chris_foulon) <a href="https://twitter.com/chris_foulon/status/1118499851673788416?ref_src=twsrc%5Etfw">April 17, 2019</a></p>
</blockquote>
<p>So how do you protect yourself from theft of personal or proprietary company information in public? The super obvious, somewhat flippant answer is: don’t share any of this type of information in public. But, at times, this is easier said than done. If you travel as much as I do, it becomes impossible to refrain from conducting some confidential business whilst you are on the road. So how do you actually protect yourself?</p>
<p>Many people will read this blog and say, “well that’s obvious,” but sadly it is not, based on what I have personally observed and the feedback I received in preparation for this post. When in these types of situations, my recommendations are:</p>
<ul>
<li>Use privacy screens on your laptop and your phone when in public, in meetings, and on airplanes. I cannot tell you how much confidential information I could have obtained just sitting behind someone on a plane.</li>
<li>Do not discuss confidential information in a public place: restaurant, club, elevator, airplane, etc. Based on the Twitter solicited feedback, people somehow think planes are cones of silence.</li>
<li>If you must conduct personal/confidential business on the road, wait until you arrive at your hotel or find a quiet place in the airport/club/restaurant where your back is to a wall and you can see anyone who is located by you. Use your best judgment.</li>
<li>Never give anyone your password. I don’t know how to say this more strongly. Do not ever give anyone your password.</li>
<li>Use a password manager. Don’t reuse passwords. This way if someone does obtain one of your passwords, you limit your exposure.</li>
<li>Be cognizant of what you put on social media. I am very active on social media but, remember, your information can and will be used against you. Be careful of when and how you post to avoid advertising when your home will be vacant for vacation or any personally identifiable information that could expose your passwords.</li>
<li>If someone calls you claiming to be from your bank, the IRS, the police, your company, a tech support organization, offer to call them back from a number that is published on their legitimate website or the back of your credit card, etc. Do not give any confidential information to an inbound caller.</li>
<li>Use encryption for sensitive data and sensitive communications.</li>
<li>If you must install IoT devices at home, segment them to a unique network.</li>
<li>If you are renting a private vacation home, there are some very good apps to scan the network to make certain you have privacy (e.g., cameras in a location that was not disclosed by the owner)</li>
<li>I am not a fan – at all – of listening devices at home, but if you do have one, remember there is a possibility we will find out all of your conversations were recorded. Be aware of what you say….</li>
</ul>
<p>The world is quickly evolving as we embrace more technology. The onus is largely on users to protect yourselves. While this blog is just a high-level discussion on social engineering and privacy, using common sense is always your best defense.</p>
</div>
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Forum software by © MyBB Theme © iAndrew 2016