Page 20 - Cyber Warnings - November 2015
P. 20







Clearly, a new era of security risks has arrived and should be in the mind of every consumer who is
adopting these new technologies.




What’s Being Done to Protect Privacy?

The U.S. Federal Trade Commission (FTC) released a report in early 2015, “Internet of Things:
Privacy & Security in a Connected World,” which said IoT-specific legislation would be premature at
this time because the industry is still in its early stages. The report did, however, advocate for
Congress to pass strong federal data-security and breach-notification legislation.

The FTC also recently created the new Office of Technology Research and Investigation (OTRI) to
help ensure consumer protection keeps pace with the fast-changing digital economy. The OTRI isn’t
tasked with helping create new laws but will instead provide research and insights on key issues,
such as privacy, data security, connected cars, smart homes, emerging payment methods and
more.

These developments aside, the responsibility to secure IoT devices will continue to fall to device
makers through self-regulation for the foreseeable future. The only other thing that could possibly
spur action among lawmakers or organizations might be a major data breach and class-action
lawsuit resulting from an IoT device security exploit – similar to how major retail data breaches
helped spur the new microchip-based payment requirement implemented on retailers in 2015.




Security Steps for Consumers

A few easy security measures can go a long way to helping consumers protect their privacy and the
security of their information when using connected devices.

First and foremost, a custom and complex password should be used in place of the simplistic
passwords that are sometimes provided for devices out of the box. Also, use different passwords
across multiple devices or apps when possible.

Consumers should also be more conscientious of their surroundings when accessing and managing
connected devices from public places via their smartphones, tablets and laptops.

Visual hacking is a growing concern for IT and security professionals in the business world, but it’s
just as relevant to consumers who are increasingly accessing private and potentially valuable
information on their personal devices.

Most people have learned to pay reasonable attention to their surroundings and potential onlookers
when using an ATM. The same can’t be said when using smartphones in public places – which is
ironic given that smartphones can access not only those same bank accounts but also homes,
health records, work and personal email, contact lists, and much more.



20 Cyber Warnings E-Magazine – November 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide
   15   16   17   18   19   20   21   22   23   24   25