Mobile Device Statistics on Our Children

I found these mobile device statistics on our children’s use of technology to be eye-opening. 38% of kids under 2 have used a mobile device – the digital babysitter, I suppose. Anyway, I think it’s important that we know what direction our kids are heading and what we, as parents, are doing to point them there. Part of security involves access: how much they have, how well they are monitored and what the consequences are for improper use.

Zero_to_Eight_2013_infographic

John Sileo is an author and highly engaging speaker on internet privacy, identity theft and technology security. He is CEO of The Sileo Group, which helps organizations to protect the privacy that drives their profitability. His recent engagements include presentations at The Pentagon, Visa, Homeland Security and Northrop Grumman as well as media appearances on 60 MinutesAnderson Cooper and Fox Business. Contact him directly on 800.258.8076.

CryptoLocker Alert: A Virus You Need to Understand

Are you prepared for CryptoLocker, the next wave of Internet virus?

CryptoLocker is the next generation of internet virus that is currently circulating all over the world in large numbers. Once a computer becomes infected it will lock all your files plus any network files it has access to, even your server. Once the files are locked it will give you a three day countdown to pay the ransom, usually $100 or $300. If the time expires your files are locked with no option to pay the ransom.

Currently there are only two known methods to remove the infection, restoring your files from a backup or paying the ransom. Please be aware that paying the ransom is not guaranteed to work. We don’t condone paying the ransom as it supports and encourages these cyber criminals.

What makes CryptoLocker exceptionally dangerous is the fact in most cases it can pass right through all Anti-virus protection suites (my go-to IT security firm for matters like this, Sierra Ridge Networks, is working with their anti virus partners to make sure they provide the most current solutions – make sure your tech guys are doing the same.)

How CryptoLocker Generally Invades Your Systems

  • In the form of attachment, usually disguised in an email appearing to come from your bank, insurance company or courier service or scanner.
  • Through Trojan websites, which will ask you to download a piece of software in order to watch video clips or download songs off the internet.
  • Through malicious websites with names similar to popular ones, waiting for you to mis-type the URL and share as if on your favorite website.

Advice for Preventing the CryptoLocker Virus

  1. Never open attachments if you are unsure of the contents, the sender or if your gut says something isn’t right.
  2. Look for clues in the email content. Most legitimate emails will address you by name and not something generic like ‘customer’ with vague wording.
  3. Misspellings, faulty English, promises of riches, freebies or other bribes are all signs that something is fishy.
  4. Do not click on website links in emails until you have viewed the link location. Do this by hovering over the link, which will display the actual link at the bottom of your email program – if the link and the hyperlinked text don’t match, you’ve got a problem). Instead of clicking the link, you are best to manually type the URL into your browser.
  5. Make sure your anti-virus is updated regularly on EVERY system connected to your network, including mobile devices.
  6. Make sure your backups are current and working and backing up ALL critical data.

If You Get Infected by CryptoLocker

  1. Stop work! TURN OFF YOUR COMPUTER! Shut down your entire network, if possible until help arrives. 
  2. Contact an IT Security specialist. I use Sierra Ridge Networks out of Colorado.
  3. Alert people on your network, as any work completed after infection will be overwritten when the backup is restored.

John Sileo is NOT an IT Security Specialist, but an author and highly engaging speaker on internet privacy, identity theft and technology security. He is CEO of The Sileo Group, which helps organizations to protect the privacy that drives their profitability. His recent engagements include presentations at The Pentagon, Visa, Homeland Security and Northrop Grumman as well as media appearances on 60 Minutes, Anderson Cooper and Fox Business. Contact him directly on 800.258.8076.

Internet Privacy & Kids: Social Network Monitoring in Schools

librarians-watching computer useSocial network monitoring becomes big business. Fresh off the heels of learning that the NSA has been gleaning data about us using information found on social networking sites comes the news that a school district in California is paying a monitoring service to watch and report on what students are posting on sites like Twitter, Facebook and Instagram.

Glendale Unified School District is paying $40,000 over the next year to a company called Geo Listening to monitor its students’ social media activity.  This program was introduced after one of their students, 15-year-old Drew Ferraro, committed suicide by jumping from the roof of Crescenta Valley High School.  It started as a pilot project in three schools last year and is now being rolled out to all middle and high schools across the district.

Glendale is not the first school system to use monitoring services.  They are used fairly commonly at the college level.  Louisville and Kentucky use a social media monitoring system with their athletes that flags words for coaches that relate to drugs, sex or alcohol and they also have access to all of the athletes’ photos and videos.  (LSU, Florida, Texas A&M, Texas, Missouri, Ole Miss, South Carolina, Auburn, Baylor and New Mexico are among the other schools that use similar monitoring methods).

 

Mount Wachusett Community College was one of the first schools to monitor social media on a dedicated level and was recognized for being proactive by the National Council for Marketing and Public Relations.  Robin Duncan, vice president for marketing and communication at MWCC says simply, “If you don’t have someone paying attention to your new media … you’re being negligent.”

In Indiana, a high school senior, Austin Carroll, was expelled from Garrett High School and forced to enroll at an alternate school to get his diploma for a profanity-laden tweet that was flagged by his school’s social media monitoring system.  Many schools that don’t pay for a monitoring service still task their administrators with doing it.

So, while it’s nothing new for schools to monitor their students’ communications (I recall having a few notes intercepted and read by my teachers), it begs some questions:

  • Who should be in charge of monitoring our kids?
  • How much privacy should kids be allowed?
  • To what extent should schools be involved?

The answers are not straight-forward.  When daily reports of government surveillance cause a public outcry over privacy issues, we want to extend those same privileges to our kids.  Yet, there are cases like the Ohio school shooter, T.J. Lane, who killed three classmates and wounded others.  Lane had posted chilling comments on Facebook a few months before and tweeted the morning of the shooting that he was bringing a gun to school.  It was right there, publicly posted, yet no one knew to stop him.

It’s easy to blame the schools, to blame the district, to blame someone else, but as parents, WE should be the ones to monitor our kids’ posts…

  • WE need to remind them that all posts are permanent, public and exploitable – forever.
  • WE need to look for warning signs of violent intentions toward self or others, substance abuse, bullying…
  • WE need to get off our own Facebook pages and check in on our kids.
  • We need to have engaging, heart-to-heart conversations with our kids so that they feel we are the ones to reach out to when the dark days come.

The truth, however, is that some (okay-most) parents don’t do it.  As with countless other issues that we have come to expect our schools to teach (sex education, drug resistance, anti-bullying), keeping up with social media is something most parents aren’t comfortable with, don’t understand completely, or just don’t want to deal with. And that unwillingness has disastrous consequences for kids who are troubled, in trouble, or the victim of another troubled child.

Ralph Hicks, superintendent of Ashburnham-Westminster Regional School District in Massachusetts, explains that the legal doctrine “in loco parentis,” which is Latin for “in place of a parent” allows school officials to interfere in the lives of students only in issues involving the school.  More and more, that definition involves anything said about the school (or students and staff) whether the communication occurs on campus or not.

Parents (and students) who think that this monitoring is a violation of their kid’s privacy should remember that EVERYTHING BEING MONITORED IS ALREADY PUBLICSchools aren’t breaking into your child’s Facebook account, they are simply monitoring what everyone else on the Internet can see. And if it saves a life, thwarts a bully, or rescues a child in need, it’s worth it. 

John Sileo is a keynote speaker on Internet Privacy and CEO of  The Sileo Group, a think tank that trains organizations to harness the power of their digital footprint. Sileo’s clients include the Pentagon, Visa, Homeland Security and businesses looking to protect the information that makes them profitable.

Interview with Reputation.com on Business Identity Fraud and Online Reputation

reputationcomDo you want to know how businesses can protect themselves and enhance their online reputations?

Would you like to know the answers to the following questions?  

  • Are businesses adequately protecting themselves online? If not, what more should they be doing?
  • What is business fraud and how does it differ from consumer fraud?
  • What should companies be thinking about when they get involved with social media?
  • What can businesses do to monitor their online reputation?
  • Should companies respond to everything negative said about them online? If not, what should they focus on?
  • Should businesses be paying attention to their employees online? If so, how can they do that in an ethical way?
  • What is the most important advice you would give a new business just starting to develop an online presence?

To learn the answers to these important questions, read the interview I recently did with Reputation.com.

Financial Planners: Give Your Clients Mobile Security this Holiday Season

Santa in summerWrap Up Your Mobile Security this Holiday Season!

Your clients compute almost as much on mobile devices as on desktop computers. They read banking and investment emails on their smartphones, log in to sensitive financial accounts via their iPad and store mission critical data on their laptops. But along with the freedom and efficiency of mobile computing comes a great deal of risk – risk that threatens their net worth. Small devices are easier to lose, simple to steal and are tempting targets for data theft. And to top it all off, your clients protect their mobile devices like mere phones and book readers, instead of the computers they really are.

So, if you are thinking ahead about what to get your best clients for the holidays, we have the answer.   How about a thorough list of privacy prevention practices to get them safely from Black Friday through New Year’s Eve?  Sure beats a reindeer sweater or a fruitcake!

Gather a group of your best clients and treat them to an hour of tried and true practical ideas to safeguard their privacy.  You provide the cookies and eggnog, we will provide the expertise and your clients will appreciate the useful gift!

We will provide simple, actionable tools to protect and enhance the mobile tools your clients use to do business. You will learn how to add value to your clients by helping them:

  • Lock down smartphones and tablets from thieves
  • Track mobile devices if stolen or misplaced
  • Safely use free Wi-Fi hotspots in cafés, airports and hotels
  • Determine which apps are safe and which aren’t
  • Evaluate mobile banking and investment apps

In addition to mobile security, we can customize the speech to cover other holiday hot topics, such as:

  • Protecting your identity from being stolen (think of poor George Bailey) at this busy time of year.
  • Becoming aware of what you unwittingly share on social media sites during the holidays.
  • Preventing your holiday parties at home or at work from becoming sources of data theft.

We’ll tie it all into a holiday theme to keep an edge of humor and the holiday spirit, all while delivering seriously practical ideas to protect your clients.  (Click here for a sample.)

Limited dates available. 

Call us today to secure your date The Sileo Group 303-777-3221

John Sileo is a keynote speaker and CEO of The Sileo Group, a privacy think tank that trains organizations to harness the power of their digital footprint. Sileo’s clients include the Pentagon, Visa, Homeland Security, Van Wyk Risk and Financial Management and businesses looking to protect the information that makes them profitable.

 

 

 

 

 

 

 

 

 

 

 

Keeping Grounded When the Surveillance Accusations Start to Fly

, , ,

NSAI’m in the business of encouraging people to keep their guard up.  I’m always telling people to watch for signs of something that doesn’t feel quite right, take precautionary measures, and stay informed.  But even I have to question the tactics some are recommending when it comes to reacting to the NSA PRISM surveillance program leaked by Edward Snowden.  In a previous post on this topic, I said it isn’t a black or white argument, but some people are asking you to make it one.

Best-selling author, technology expert and Columbia Law School professor, Tim Wu, has said that web users have a responsibility to quit Internet companies like Google, Facebook, Apple, Yahoo and Skype if it is indeed verified that they have been collaborating with the NSA.  In fact, Wu bluntly proclaimed, “Quit Facebook and use another search engine. It’s simple.  It’s nice to keep in touch with your friends. But I think if you find out if it’s true that these companies are involved in these surveillance programs you should just quit.”  Wu acknowledged that there is still much to learn about this program and admitted it was no surprise that PRISM exists, saying, “When you have enormous concentrations of data in a few hands, spying becomes very easy.”

Of course, the companies in question vehemently deny such complicit cooperation.  Google CEO Larry Page stated, “any suggestion that Google is disclosing information about our users’ Internet activity on such a scale is completely false.  Facebook CEO Mark Zuckerberg said reports of Facebook’s involvement are “outrageous,” adding  “Facebook is not and has never been part of any program to give the U.S. or any other government direct access to our servers.”  Yahoo’s Ron Bell stated, “The notion that Yahoo! gives any federal agency vast or unfettered access to our users’ records is categorically false.”  Similar statements were issued by from spokespersons for Apple, Microsoft and others accused of complying.

To add fuel to the fire of this debate, top US intelligence officials have stepped forth with their own comments.  US Director of National Intelligence James Clapper asserts the National Security Agency’s PRISM program is “not an undisclosed collection or data mining program” but instead “an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information.”

In addition, claims that the sweeping surveillance programs have prevented multiple attacks keep swelling.  Immediately following the leak, House Intelligence Committee Chairman Mike Rogers cited one attack that he said was thwarted by the program, but would not give specifics.  Since that time, however, there have been dozens of reports of foiled terrorist attempts, from a plot to bomb the New York Stock Exchange to an attack against the New York subway system, that were prevented because of the surveillance.  Army Gen. Keith Alexander, director of the National Security Agency, said more than 50 attacks have been averted.  Alexander also stated that Snowden’s leaks have caused “irreversible and significant damage to this nation” and undermined the U.S. relationship with allies.

No doubt, the debate over the propriety, as well as the effect, of Snowden’s actions will rage on for some time.  There will be others who recommend and take drastic actions, such as quitting the Internet giants, for fear of their safety and/or privacy.  The key is to keep cool, find the facts and then NOT forget. The biggest risk is that our discomfort will be forgotten in a week when the next big topic arises. You can take the reasonable steps of doing your research, acting in calculated moderation and following through on what YOU feel is important.

John Sileo is a keynote speaker and CEO of The Sileo Group, a privacy think tank that trains organizations to harness the power of their digital footprint. Sileo’s clients include the Pentagon, Visa, Homeland Security and businesses looking to protect the information that makes them profitable.

Talking Surveillance Once Again–Know Your Phone Carrier More Precisely

, , ,

phone moneyWhen you log onto the Verizon Precision Market Insights website, the giant catch phrase that jumps out at you in bold red letters is:

“Know your audience more precisely.

Drive your business more effectively.”

Verizon is pulling no punches when it comes to letting advertisers know that they have valuable data- OUR data- and they’re willing to share it.  For a price of course.  Phone carriers, who see a continued decline in contract subscriber growth and voice calls, are hoping to generate new sources of revenue by selling the data they collect about us.  They already collect information about user location and Web surfing and application use (which informs them about such things as travels, interests and demographics) to adjust their networks to handle traffic better.  Now they have begun to sell this data.

Note: Verizon customers can OPT-OUT of this data sharing by logging into their accounts online and following the opt-out instructions. I recommend that you do so immediately.

Instead of seeing themselves just as providers of valuable services to their customers by providing a means of communication, carriers now see the potential profit beyond the service.  Businesses such as malls, stadiums and billboard owners can gather information about the activities and backgrounds of cellphone users in particular locations.  For example, Verizon’s data service is being used by the Phoenix Suns to map where people attending its games live “in order to increase advertising in areas that haven’t met expectations”, according to Scott Horowitz, a team vice president.

In Verizon’s own words, their analytics platforms allows companies to:

  • Understand the demographic, geographic and psychographic makeup of (their) target audience.
  • Isolate where consumer groups work and live, the traffic patterns of a target audience and demographic information about
what groups visit particular locations.
  • Learn what mobile content (their) target audience is most likely to consume so (they) can cross-sell and up-sell more easily.

The program does not include information from Verizon’s government or corporate clients and individuals do have the right to opt out on Verizon’s website.  Some European companies have launched similar programs and Jeff Weber of AT&T says they are studying ways to analyze and sell customer data while giving users a way to opt out, but at this point they do not have a similar product.

Carriers do acknowledge the privacy issues related to such data surveillance and companies say they don’t sell data about individuals but rather about groups of people. But Chris Soghoian, a privacy specialist at the American Civil Liberties Union, is worried according to an article in the Wall Street Journal.  In it, he says “the ability to profit from customer data could give wireless carriers an incentive to track customers more precisely than connecting calls requires and to store even more of their Web browsing history. That could broaden the range of data about individuals’ habits and movements that law enforcement could subpoena.  It’s the collection that’s the scary part, not the business use.”

In other words, it’s about more than well-meaning companies collecting our data; it’s that their company databases are vulnerable to attacks by hackers, competitors and foreign governments. And when a breach happens, it’s our data that goes missing.

John Sileo is a keynote privacy speaker and CEO of The Sileo Group, a privacy think tank that trains organizations to harness the power of their digital footprint. Sileo’s clients include the Pentagon, Visa, Homeland Security and businesses looking to protect the information that makes them profitable. Watch John on 60 Minutes, Anderson Cooper and Fox Business.

Summer School for Parents: Protecting Your Kids' Social Media Privacy

,

girls phones summerSchool is out for the summer and the tasks that often fall upon the shoulders of your local schools are now sitting squarely on yours.   In addition to making sure your kids practice their math facts, read regularly and get plenty of exercise, you’ll want to watch out for how they spend their free time when it comes to using Facebook, Tumblr, Instagram, Twitter, YouTube and other sites that can expose their social media privacy.

Social Media refers to web-based and mobile applications that allow individuals and organizations to create, engage, and share new user-generated or existing content in digital environments through multi-way communication.  Okay, that’s too technical. Social media is the use of Internet tools to communicate with a broader group. Some of the most common examples are listed above.  If you have elementary aged children, they may use more secure, school-controlled forms such as Schoology, Edmodo or Club Penguin, but if your kids are older, I can almost guarantee they’re into Social Media sites whether you know if or not.

Statistics show that 73% of online adolescents visit social networking sites daily and two billion video clips are watched daily on YouTube.  The American Academy of Pediatrics recently conducted a study that found that 22 percent of teenagers log onto their favorite social media sites more than 10 times a day, and that 75 percent own cell phones.

So, how do you battle such a time-consuming, captivating influence over your children?  You don’t, because you won’t win!  Instead you look at social media privacy best practices that schools implement and do the same at home.

  • Expect the Internet to be used appropriately and responsibly and set agreements and consequences with your children if it is not.  The Family Online Safety Institute can guide your discussion and even provide a contract.
  • Expand your typical discussions about strangers to include social media
    • Don’t accept unknown friend requests
    • Don’t give out personal info – specifically: last name, phone number, address, birthdate, pictures, password, location
  • Warn kids about the dangers of clicking on pop-up ads or links with tempting offers, fun contests, or interesting questionnaires, even if they’re sent from a friend.  They may really want that free iPad being offered, but chances are it’s just a way for someone to glean their personal information.
  • Monitor the information your kids give out and their use of sites; let your children know they should have no expectation of privacy.  (Make that part of your contract.)  You can also install filtering software to monitor their social media use and even their cell phones.  A few popular ones are Net Nanny and PureSight PC to help keep your child safe online and My Mobile Watchdog to help with monitoring their cell phones.
  • Check your privacy settings for all Internet sites and make sure they are set to the strictest levels.
  • Remind your child that once it’s published, social media is public, permanent, and exploitable forever- even when “deleted”
  • If your children are not 13, keep them off of Facebook since that is their stated age limit. There are plenty of reasons, not the least of which involves the emotional repercussions of being “unfriended” or cyber bullied.  When they are ready, have your children read and study the actual Facebook user agreement and privacy policy and discuss it with them.
  • Set limits on social networking time and cell phone time, just as you would for TV hours. Many families limit total screen time, which includes everything from computers, iPads, smartphones, and video games to our old fashioned notion of television.
  • Be a good example yourself.  Monitor your own amount of time spent online and seek to find a balance of activities. When you are on you iPhone at dinner, you are letting your kids know that this is acceptable behavior.
  • Monitor your child’s activities and try to stay educated about the latest platforms!

Social Media can be a positive way for kids to continue to develop friendships while they’re home for the summer and to feel like they’re connected to a community that matters more to them than anything.  But there are risks that come with it and it’s your job as a parent to protect them from those risks just as surely as you keep them from taking candy from a stranger

Social networking has an addictive component because dopamine (a natural feel-good drug produced by the body) is released anytime we talk about ourselves. And what is social networking if not a constant exposé of what is happening in our lives? Just make sure you know what is happening in your child’s life, even in the more relaxed months of summer.

John Sileo is an online privacy expert and professional speaker on social media privacy. His clients include the Department of Defense, Pfizer, Visa, and Homeland Security. See his recent media appearances on 60 Minutes, Anderson Cooper and Fox Business.

 

Social Media Privacy Laws Provide Protection for Employers and Employees

Do you know your social media privacy rights as they pertain to your workplace?

They will be different depending on where you live because the laws vary from state to state. Utah recently became the fifth state to put into effect such a law that governs the rights of both employees and employers. Legislation has also been introduced or is pending at the Federal level and in 35 states.

This has become a hot topic because more than 90 percent of employers use social media sites to help screen applicants. Since applicants have the ability to determine their online privacy settings to decide what is out there for public viewing, some employers have asked for access to their private social media content to get the real picture.

In addition, employers contend that having access to social media accounts of employees allows them to protect sensitive company information such as trade secrets and financial figures. Employees argue that the information may be used to discriminate against them and inherently invades their privacy. In reality, most of the current legislation actually seeks to protect both sides.

Utah’s Internet Employment Privacy Act enforces protection of employees’ online identities, dictating that an “employer may not request disclosure of information related to [a] personal Internet account.” Also known as House Bill 100, this law, which applies to both employees and applicants, includes asking for usernames and passwords. If employers are found guilty of this, they may face up to a $500 fine. Additionally, the law states that employers may not “take adverse action, fail to hire, or otherwise penalize” anyone who will not disclose their information.

There are exceptions built in to protect the employer. They may legally require such information if the employer has provided the device and/or service or if the information is needed to carry out a disciplinary investigation, particularly if the employee’s actions in some way compromise the company – i.e. sharing of proprietary/confidential information or financial data. In addition, the employer can still view publicly available information in order to conduct due diligence.

In the ever-changing world of social media privacy legislation, one thing is clear; it will keep changing! Both employees and employers should check the current status in their state. The National Conference of State Legislatures provides a good listing to help you do this. As always, know your rights and act on your responsibilities.

John Sileo is a social media privacy expert and professional speaker on building digital trust. His clients include the Department of Defense, Pfizer, Visa, and Homeland Security. See his recent media appearances on 60 Minutes, Anderson Cooper and Fox Business.

How long will Weiner’s bad online reputation haunt him?

Anthony Weiner is notorious for a gaffe made on Twitter, but will his online reputation recover?

I’m sure everyone remembers the infamous 2011 incident when Representative Weiner became something of a national punchline for lewd tweets that revealed his “private data,” so to speak.

Or do we remember?

At the time, Weiner’s indiscretions left him a laughingstock and a near-disgrace in one fell swoop. Now, as he ramps up a possible New York City mayoral campaign, he’s returned to the same social platform that almost cost him his political career. Is it possible that we will forget and forgive so soon?

A natural byproduct of our 140-character driven world is that everything is always old news. By the time the next tweet or Facebook post appears, we have forgotten the last one. Our online reputation, on the other hand, never disappears. And at some point, we will again value character in our public figures – making digital reputation a permanent, if often inaccurate, representation of that character.   

The lesson here is that you must cultivate your online reputation with the world view that it will forever be public, permanent and powerful. Because our posts and tweets, photos and videos are recorded for all of time, shared with all of humankind and used by ethical viewers and manipulative abusers alike, we must think before we hit the send button.

I bet this time in office, Weiner will pause before sending. Or maybe, just maybe, his reputation will get in the way of winning back the office his indiscretion squandered away.

John Sileo is an online reputation expert and professional speaker on building digital trust. His clients include the Department of Defense, Pfizer, Visa, and Homeland Security. See his recent media appearances on 60 Minutes, Anderson Cooper and Fox Business.