• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Consumer   »   Data Privacy in the Age of IoT

Data Privacy in the Age of IoT

  • Posted on:February 1, 2018
  • Posted in:Consumer, Data Privacy, Internet of Things, Security
  • Posted by:
    Trend Micro
0

On Data Privacy Day, January 28th, we should have all taken a few moments to think more carefully about safeguarding our personal data, staying safe online, and improving our privacy habits. Just what does that mean in the age of IoT — the Internet of Things?

In previous years, cyber threats mostly consisted of ransomware, data theft, and business email compromise (BEC) scams. Thieves have stolen credit card numbers and other personal information, and victims might even pay a ransom to hackers holding their computers hostage.

Keeping data private often required working with administrators to intercept and stop these attacks, and learning to avoid opening messages from an unknown sender.

The Deluge of Data

Because a host of convenient smart devices now continuously gather, process, and send data to make our lives more convenient, they have also magnified the threats to data privacy.

You just have to look at all the connected devices around us to see a simple dilemma: our ability to collect and process data has overwhelmed our ability to protect that information. Our smartphones, fitness trackers, smart TVs, and even smart appliances generate a massive amount of sensitive information, from browsing habits to purchasing patterns to real-time location to personal health information.

Attackers employ a variety of methods to infiltrate these helpful devices and use them to gather, process, and transmit data. The more information they can transfer, the more valuable it becomes, making this type of hijacking ever more tempting. Check out the IoT Security Guidelines – Device Life Cycle Overview to learn more.

Securing Devices, Not Just Data

The design of IoT technology focuses on convenience, not security, which makes data vulnerable. Managing the risks associated with data collection begins with making the gathered data more secure. The time has come to ask what privacy truly requires.

Right now, threats to a connected home include hardware vulnerabilities, network threats, ransomware, and distributed denial-of-service (DDoS) attacks. Securing the home router can prevent vulnerable devices from becoming compromised. Welcoming Security to the Connected Home explains in detail how to secure home devices.

The Responsibility for Data Privacy

It might seem counter intuitive, but data privacy does not necessarily mean keeping your data private — it means taking charge of what we choose to divulge about ourselves. We now leave a trail of data behind us that grows wider with every smart device we acquire. Billions of smaller and smarter devices will soon paint highly detailed portraits of almost everything we do.

Given that we do not have full control over the devices that require our data to work (like GPS devices that track your specific location), you must pay close attention to the data that you share. Carefully read the end-user license agreement (EULA) before selecting the “Yes, I agree” option. Protect the electronic doorway to your home by setting up a secure router. Change the default password of any new IoT device that you set up. In fact, use strong unique passwords for all of your online accounts.

Take charge of protecting your data, because nobody else will care as much as you do about your privacy.

Learn more about Data Privacy Day: https://staysafeonline.org/data-privacy-day/

Find out how Trend Micro has addressed Data Privacy Day in years gone by:

  • Data Privacy Day 2017: Tips for Protecting Small Businesses
  • Data Privacy Day: A Call for Better Privacy Practices
  • Data Privacy Day: Why Data Privacy Awareness Is Important

For more information on Trend Micro Internet of Things (IoT) solutions click here. 

Related posts:

  1. Privacy and Security: Why US Consumers Feel Overwhelmed in a Connected World
  2. What Do People Really Think About Security and Privacy in the Internet of Things?
  3. Connected Threats: Would You Sell Your Personal Data for Money?
  4. Using Trend Micro Security’s Privacy Scanner – Part 1: Social Network Privacy

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.