
“Nothing personal” — Sharing data on a need-to-know basis
Editor's note: This is the final article in our four-week series to help our community #BeCyberSmart during the ASU Think! Campaign.
The extent to which your life, preferences and schedule are etched into your devices feels almost magical. No supernatural force guides your technology, however – your devices' uncanny synchronization with your behavior is made possible through the power of data. From cookies to location tracking, the puzzle pieces that compose your life can be easily assembled. Though this enhances convenience, keeping this wealth of information from falling into the wrong hands is imperative.
All that connects to the “Internet of Things” (IoT), like phones, iPads and laptops, can be vulnerable to cyber-spying if left unsecured. The following actions will help you safeguard your data and protect your privacy:
Research and understand the data each app, software, or service is collecting from you. Does this app track your activity across other applications and websites? Does it store highly personal information, such as payment methods or addresses? Though some tools logically collect sensitive information (banking applications and medical portals wouldn't function otherwise), others request unwarranted personal tidbits. Before opening an app, ensure a clear understanding of the data it will collect from you.
Be mindful of GPS tracking and stored location data. Does the ordering app for your local arts and crafts store really need to know where you are, 24/7? Unless you've forged a dubious pact in exchange for unlimited gouache paint, the odds are slim. Keep your whereabouts private by disabling location services in the settings of apps that don't need them.
Remove apps or software you no longer use. Beyond gathering virtual dust, apps you haven't recently updated or reviewed your security preferences for can develop security gaps over time. If you’re no longer using an app or software, deletion protects you from the vulnerabilities inherent in inactivity.
Don’t fear your data – leverage it as a valuable asset! Reaping the benefits of staying connected through IoT is easier than ever before. Visit GetProtected to learn more about data management and browse other resources during the ASU Think! Campaign for Cybersecurity Awareness Month.