Take steps to secure what little online privacy you still have

Living in a connected, online world is encroaching on our privacy, but if you use security tools you can maintain some sense of control

Before you can take steps to protect your privacy, you need to define just what the word means. And the second task can be more difficult given the spread of social-networking tools and Big Brother legislation such as CISPA.

Microsoft's recently launched privacy-awareness campaign includes a survey ostensibly designed to help consumers determine their "privacy type," based on how they use the Internet and how they perceive privacy concerns. The campaign is a subtle attack on its primary rival, Google, but it also enables Microsoft to ascertain the public's thoughts on privacy and how people go about protecting theirs.

While the very concept of privacy is rapidly evolving, you can protect yours with a combination of discretion and knowing how to use available privacy-protection tools.

Privacy? LOL

Privacy is in danger of being rendered quaint. Cameras note your presence at virtually every intersection and place of business. Your smartphone betrays your general location when it connects to the nearest cell tower. You disclose your exact location each time you use a debit or credit card. And unless you pay cash, your every purchase is recorded and tracked. The NSA eavesdrops on online communications, and the IRS recently asserted it has the legal authority to do the same.

What privacy?

Services such as Rapleaf and BeenVerified have built entire businesses on making public information more accessible. You'd be surprised how much someone can find out about you from public records such as contest submissions; speeding citations and parking tickets; mortgage loan, real estate, and automobile transactions; child support orders, criminal records, and much more. You might consider all this information personal, but it's openly available to anyone who bothers to look for it.

How personal privacy impacts business

When it comes to social networks, the seemingly innoculous actions of employees at every level have the potential to disrupt a business. When a Verizon or AT&T store employee posts a Facebook update complaining that their vacation plans have been nixed due to a mandate that all everyone has been put on call can put the world on alert that something big is coming up, such as a new iPhone launch.  

That's just one example. Business managers and owners must convey to their employees the implications of sharing too much information. While you can't prevent an employee from publicly grumbling about disrupted vacation plans, you can suggest how they phrase their complaint so that it doesn't reveal sensitive information.

On the other side of the equation, business owners and managers must also understand their customers' privacy concerns and how they can manage their expectations. People don't like to have their privacy infringed upon, but most are more than willing to share all kinds of sensitive information in exchange for something. Just look at how many customer loyalty and discount cards the average person is registered for.

Use the tools you have

Managing privacy isn't a hopeless task. While there are things you can't control--such as public records and surveillance cameras mounted at intersections--there is plenty of information you can control. Do you really want to share that Vine video of you dancing in your underwear? Beyond discretion, you must stay informed as the best tools for protecting your privacy and how to use them.

Tweeting is an inherently public way of sharing information, but most social networks--including Facebook and Google+--provide users with a variety of options for controlling how their information is shared and who is allowed to see it.

Obviously, Microsoft would like businesses and consumers to accept the premise that Microsoft's services are inherently more private than Google's. Whether or not you agree with that assertion, it's incumbent upon you to ensure you don't share information you don't want to be made public, and to use the tools that are available to protect the information you do share.

Join the CSO newsletter!

Error: Please check your email address.

Tags GoogleMicrosoftsecuritysocial networksprivacybusiness security

More about Brother International (Aust)FacebookGoogleIRSIRSMicrosoftNSAVerizonVerizon

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Tony Bradley

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts