Tag Archive for: Cybersecurity

Facial Recognition, Privacy

Facebook and Facial Recognition? A Bad Combination!

If we have learned anything over the years, social media platforms, and particularly Facebook have undertaken many initiates that are less than ethical. With the latest news that most people will start to see facial recognition options in their Facebook platform today, privacy advocates are sounding alarms. And for good reason! What is missing is the information needed for an informed public on this topic. Most Facebook users will not realize the ramifications of letting Facebook use facial recognition.

Before looking at what this means now, we need to explore a bit of history. Let’s take a look back at some of Facebook’s less than stellar moments:

  • Back in 2014 it became known that Facebook conducted research on approximately 700,000 users without their knowledge. The research was intended to learn how users would react – emotionally – to either all positive or all negative information on their feeds. As someone who both teaches and also conducts research, this is a fundamental ethical breach of research guidelines. When conducting research, there is an ethical requirement to obtain Informed Consent. As a part of this, participants know that they are involved in a research project, what the research is, how it will be used and they can withdraw at any time, etc. Facebook ignored this and proceeded without any Informed Consent. Thus, the impacts on people could have been detrimental to their mental health with no plan to mitigate.
  • Increasingly since the 2016 US federal election, Facebook has come under fire for its lack of process, policies and actions that easily enabled foreign third parties to directly impact the election.
  • And while Zuckerberg testified before the US Congress, which looked as comfortable for him as getting your teeth pulled without lidocaine, he nonetheless showed up. In Canada however, Facebook was a no-show to discuss privacy breach issues of Canadian citizens.
  • In July 2019, Facebook was levied a $5 billion fine to settle a US Federal Trade Commission data privacy probe. 
  • And just last month, the US federal appeals court rejected Facebook’s effort to undo a 2015 class-action lawsuit claiming that it illegally collected and stored biometric data for millions of users without their consent in Illinois. 

In looking at just these few examples, any reasonable person would question why Facebook would need and/or want to collect facial recognition data. And, make no mistake. They are “collecting” facial recognition data. 

We have already seen how some governments are using facial recognition data to create states of surveillance. Think of China for one. The United Kingdom is another jurisdiction that has delved into facial recognition and, as we have seen, the results in many cases proved to be wrong in 98 percent of the time.

So, while there could be applications for national security, once there is proven technology, and of course, there are laws established to protect citizens, I have to question what possible need is there for Facebook to implement facial recognition in its platform. We have an established pattern for Facebook not adhering to laws and collecting information and using information in less than ethical ways. 

Facial recognition, when in the wrong hands, can be used in a variety of harmful ways. The mere fact that an individual does not have control over his or her image is alarming. If in the wrong hands’, could images potentially be used in the creation of deep fake videos or other images? Such deep fakes could show a person committing a crime, stating information against a government – which in some countries could result in detention or worse – or even stating slanderous comments against a person, an employer, etc. All of which could have negative impacts as the person then has to prove that they were not the person captured in a video. Now many would argue that you don’t store biometric data with images such as drivers’ licences, etc. That is nice in theory, but as we have seen with Facebook, what should happen, doesn’t always happen. So yes, it could happen.

And perhaps more disturbingly is that Facebook has stored our digitized face since we started using it – without our permission. (This was part of the Illinois lawsuit.) The question is…to what end? Some argue that the market for facial recognition is poised to reach $9.6 by 2022. There is definitely money to be made for Facebook. And, with the technology that they are working on, it won’t be just your face. It will be your posture, the way you walk and possibly even how you dress that will make you identifiable. 

As an individual, the implications are deeply concerning. As most of live in societies where privacy is a human right, Facebook – and others – will be using facial recognition to absolutely remove this human right. And sadly, most of us don’t even realize that this is happening. When we do, it will be too late.

If like me, you have already scaled back on using Facebook, the implementation of facial recognition has definitely been the tipping point to back away completely.

Now the question is, will this be a tipping point for you?

Heather MacLean, Privacy

Six Things to Do When Your Bank Has Been Hacked

Each day we hear about different companies that have experienced a hack or data breach. Somehow however, when we learn it is was bank that was hacked, it is quite different. Many more of us become very concerned for our privacy and more importantly, we become extremely concerned about our financial security. Rightly so. Our entire lives are now digital and at risk.

While we can’t turn back the clock and we can certainly hope that we won’t get a notification from our bank that we were one of the victims. We want to be one of those who weren’t impacted. If however, we are not so lucky there are some steps that can be taken to lessen the impact. Here are six things you can do immediately when your bank has been hacked:

  1. Update all passwords and security questions.
  2. Don’t use the same password for multiple accounts.
  3. If you use a password manager, maybe consider not using it for your banking. Keep your banking passwords separate and distinct.
  4. Be diligent in checking your online statements – both credit cards and banking and immediately report abnormalities to your provider.
  5. When monitoring your accounts, don’t just look for large purchase that you don’t recognize. Look for any abnormality. You could have a serious of purchases under $20.
  6. Monitor your credit rating. If your bank was breached, ask for credit monitoring and protection.

These are just six things that you can do immediately. If you are still worried about your privacy, contact us for more detail on how you can implement other privacy measures.

Heather-Anne MacLean, Cybersecurity

Hundreds of Thousands of Good Paying Jobs! Are you in?

Does this headline seem like a sales pitch that is too good to be true? You might think so, but it is not. The fact is each day organizations – small, medium, large, for profit, not-for-profit, etc. are in need for cybersecurity professionals. As October is cybersecurity awareness month, I wanted to highlight the opportunities that lay before us in both the short-term and long-term.

Putting Things into Perspective

To do so, let’s take a step back and look around your environment.

  • If you are at home, you likely have a multitude of devices that are connected to the internet – TVs, computers/tablets, watches, refrigerators, vacuum cleaners, washers and dryers, your home security system and now even lawnmowers and so much more.
  • If you are in the workplace, you are surrounded by even more connected devices – computers, projectors, printers, Smart Monitors, Smart Boards, toasters, refrigerators, etc.
  • And, if you are in neither place, there is still an excellent chance that you are connected whether it is via your car, an airplane, your pacemaker, your Fitbit, an aquarium thermometer in a restaurant or other public venue, security cameras collecting data about you…etc.

By now you get the picture.

Nearly every electronic device is either connected to the internet, or can be connected. From our entertainment, banking, shopping, weather checking, home security, communicating with friends and family on social media, nearly everything we do, is done online.

Being Connected Means More People are Needed

“The more we become connected, the more important it is to ensure that we are operating with security and privacy by design principles. Additionally, because we are operating online, we need more professionals who can protect our critical infrastructure – electricity, telecommunications, and our food and water supply!

 In fact, it is estimated that by 2022, more than 1.8 million cybersecurity professionals will be needed globally. In Canada, ICTC estimates that we will need more than 100,000 cybersecurity professionals. As far as I can see, these numbers will continue to climb. This presents a significant opportunity for not only our youth, but also people who are under employed or those looking to be reskilled and/or upskilled.

Fostering the Talent Pipeline – Focused on Results

My focus is just that: Cybersecurity Skills and Workforce Development – developing a talent pipeline for our short-term, mid-term and long-term needs. It’s an exciting time to be collaborating with industry, academia and government and I must say that our ecosystem is both vibrant and engaged. We are working together to achieve results. When everyone is rowing in the same direction and communicating together, great results happen.

In just two short years we have had significant gains:

  • First and foremost, it is the collaborative nature that has developed here in New Brunswick. When you have competitors working side by side to make things happen, you know something special is occurring.
  • In our Youth Development strategy, we have worked with our education partners to have curricula changes and gains from grades six through 12. Additionally, we have become the national leader in the CyberTitan  Program. Three years ago, we had seven teams. Last year we had 48 teams that represented 54% of the teams nationally. This year? Well, this year we knocked it out of the park with 126 teams of the 196 teams nationally. We also have 60 of the 65 middle school teams. This my friends is our future talent pipeline!
  • In our mid-term strategy, we have worked with all of our post-secondary institutions to not only add new program offerings for cybersecurity, but the offerings are compliant with the NICE Framework. This is significant in and of itself as we continue to expand our circle of collaboration with the United States, Australia and the United Kingdom.
  • Finally, in our short-term strategy, our private-sector partners have created new professional development opportunities for their own resources as well as training opportunities for those in our ecosystem and abroad. Again, these offerings are all compliant with NICE.

Of course, this is a high-level view of many activities that are taking place to grow out talent pipeline and I would be remiss if I didn’t mention that focusing only on coding is only part of the solution. The solution also includes a multidisciplinary approach as we need criminologist, sociologists, psychologists, teachers, lawyers, etc. After all, we are not a linear world and there are plenty of opportunities to go around. And as a University Professor, I can say that I get completely excited when I see my students see the vast opportunities that lay before them!

As someone working in the ecosystem, being a part of something with real collaboration and with real results, is rewarding!

Want to collaborate? Let’s connect.

 

 

 

 

Heather-Anne MacLean, TaylorMade Solutions

Book Review: The President is Missing

I don’t normally do a book review on a piece of fiction on this blog, however, I am making an exception this time as there is a definite connection to cybersecurity, privacy and trust.

I picked up this book as I needed a book for my vacation. I had originally picked up The Woman in Cabin 10. It was a really good read, not cybersecurity related, and I blew threw it much quicker than I thought, but I digress.

When I picked up The President is Missing, I have to confess that I wasn’t sure what to expect. My first experience with a book by Clinton was My Life. It wasn’t a positive experience. I couldn’t finish it. I think it is the first book ever that I just could not finish. While Clinton is a very intelligent person, I just can’t imagine that someone can recall that level of detail of their lives, including what one wore on what day when a child. The detail was incredible and made it overwhelming and unbelievable, but again I digress.

I decided to buy the book because of James Patterson. He has an impressive pedigree and a great writing style.

So, the review? What did I think?

Well, I was pleasantly surprised. First because it was about cybersecurity and secondly, if you are a fan of Dan Brown, it has a similar feel, without the very clear formulaic approach. I have read all of Brown’s books and have enjoyed them, the last one, somewhat less. In fact, Origin felt was so predictable and obvious I have absolutely forgotten what the book was even about. I had to look up the name to reference it here.

The President is Missing has a good storyline and I am hoping that people who read it might have an increased awareness of what can happen to an entire country’s critical infrastructure – water supply, water quality, ecommerce, banking systems, electricity grid and military response and capabilities should a cyberattack happen. The authors do a really good job of describing just what could happen so that the lay person would get it. At the same time, I am hoping that people knowing that this is a piece of fiction won’t think that the impact or ramifications of a cyberattack are also fiction, because it is not.

The details about the workings of the White House, the US government and the Secret Service, etc. were well done. Of course, Clinton and others thanked in the book brought that reality to the book.

I also liked that there were some twists and turns and with most whodunits I tend to get a good idea of the main protagonist very early on because I like them, read them and watch them in movies a lot. In The President is Missing, I did began to wonder, but it did take a little longer, which is a good thing.

So, in the end, I do recommend this book as an entertaining and interesting read. And my hope is that people will get some insight on the ramifications of a cyberattack on our critical infrastructure and give people more of the desire to support our elected officials in making decisions supporting the protection of our critical infrastructure against attacks.

Want to talk more about cybersecurity or cybercrime impacts your business, reach out to us. We would love to work with you.

TaylorMade Solutions, Heather MacLean

Data Privacy, Breaches and the Impact on Your Bottom Line

Why Boards of Directors Are Losing Sleep Over Data Breaches

 

Like many news stories, we become numb to the constant barrage of data breaches and begin to think that it is both normal and acceptable. In fact, just last month it was revealed that thousands of patient records were held for ransom in Ontario home care data breach in Canada. Similarly, data breaches in the healthcare sector continue to plague the United States

Sidebar: In the Ontario case, the breach was announced in June 2018; however, the full extent of the situation is only coming to light recently because of the group claiming responsibility, reached out to CBC. In addition, some of the victims claim they have not yet been notified.

If you are business owner or a member of a board of directors, news reports of this nature are likely causing you to lose sleep. And, if they don’t, they should. Data privacy, breaches and the impact on the business’ bottom line should be top of mind. Protecting, or not protecting, the personal data of your customers/clients and/or employees is serious business. It could cost you thousands, millions or even result ceasing operations. Regardless, as a business owner or a board member, the fiduciary duty may be more than you are aware of. Data or security breaches should never be thought of as normal and a course of business operations. More than ever board members need to demand that the proper investment and human resources are allotted to protecting the organization’s data. It is also no longer acceptable to not have awareness and increase your knowledge about data protection and cybersecurity risk management.

If you are a consumer, you should never accept that data breaches are normal. You should also never accept that your privacy is a thing of the past. Data is valuable. Your data is extremely valuable to you and your piece of mind. You own your data.

Increasingly privacy laws are being strengthened and for good reason. As consumers we have a right to protect our personal information. And, if this information isn’t adequately protected by businesses or organizations, then they should be liable for this breach and the ramifications for those who data they hold.

The good news is that many business leaders know and understand that data breaches and privacy do matter. They matter to boards of directors because they do have significant financial ramifications. For example, with the General Data Protection Regulation now enforceable it means significant fines for anyone doing business in Europe. In fact, the research is clear. More and more Boards are considering the critical importance of IT oversight and cybersecurity. According to Price Waterhouse Coopers (PWC) “less than one-fifth of directors are satisfied with the current levels of expertise on their boards. Only 19 percent say they have enough IT/digital expertise and don’t need more, and only 16 percent say the same about cybersecurity.”

So, what does this all mean? It means dollars. It means thousands, hundreds of thousands and possibly millions of dollars in fines and penalties. Some organizations are still playing Russian Roulette in the sense that will gamble with the fines at the time that an incident occurs. An interesting approach for a one-time event. However, the gamble may not pay off when board members are held accountable too. Or, if customers and investors walk away. Additionally, the probability that it is a one-time event is both naïve and short-sighted.

The risk of a data breach increases daily and the time to act is now. The time for consumers and investors to hold the feet of executive teams and boards of directors is now.

Want to talk more about privacy, communications and board governance? Connect with us.

BOOK REVIEW: Have You Been Hacked Yet?

There is no shortage of books on the market about cybersecurity. Some detail cyberattacks. Some detail the history of cybersecurity or cyber warfare. And of course, there are more and more books emerging on how to protect yourself online.

This latest book review is on Have You Been Hacked Yet? By Dr. Natalia Stakhanova.  Dr. Stakhanova is by no means a slouch when it comes to cybersecurity. In addition to being an Assistant Professor at the University of New Brunswick, which has a stellar and robust history in cybersecurity, Dr. Stakhanova is the New Brunswick Innovation Research Chair in Cyber Security. In her spare time she is also the co-founder and CEO of CyberLaunch Academy, an initiative focused on promoting science and technology for children.

From the book’s synopsis:

“….this book gives a gentle introduction into the practical aspects of your daily security. It introduces the most common risks associated with the daily use of modern computing technology. Building on that, the book articulates the importance of, and demonstrates the use of, various types of defence strategies to protect you as a user.”

And now the review:

From first glance at the Table of Contents, I feel that most people would not be intimidated by reading this book. For the most part, the language is straightforward. It covers all the things that one would want to learn about in order to help protect their families and themselves.

When getting into the content, Dr. Stakhanova explains things clearly and easily. I particularly like that she covers off just how easy it is for someone to fall victim to cybercrime. She makes it easy to understand that these criminals play on our emotions, our concern for others and our need to help to scam us. So many people are embarrassed to admit that they have fallen victim that we often don’t have a true picture of just how many people have been scammed.

One of my favourite chapters has got to be Chapter 2. Dr. Stakhanova explains what our digital valuables are and why we should protect them. It is a very common sense perspective, but we often don’t take the time to stop and think about it this way.

I also appreciate the time she has taken to focus on social engineering. I know far too many people who have succumbed to social engineering and/or those who fail to see the concerns around how much information they are sharing online. I hope that this helps change behaviour.

There is, of course, lots of other good information in the book. It is the first edition and I know that Dr. Stakhanova will be making some edits to update some information and fix a few “bugs” shall we say.

So, who is this book for? It is definitely a book for those who know they should be more careful but don’t know what they should be doing about it. It’s a book for those who want to better understand how to protect and educate their children. It’s a great resource for consumers that want to learn how to be “safe” or “safer” online. There are two people in my life that I will be giving this book to immediately.

Want to talk more about cybersecurity, privacy and how you can be protected? Connect with us.

TaylorMade Solutions, cybercrime

Are Communication Failures Lessening the Impact of Cybercriminals?

Not a day goes by where we don’t hear of some hack or another where cybercriminals are making a killing. Despite this however, there are a couple of things that appear to be happening:

  1. The average person, consumer or even worker is not connecting the dots to either realize that they are at risk, or that their actions are the risk and the entry point for these cybercriminals. 
  1. Organizations, for profit or not-for-profit, are not heeding the simple warnings to carry out simple tasks such as patching, but they aren’t also being held accountable for the compromise of personal data breaches.

The lack of accountability is very significant and we as consumers need to hold their feet to the fire and require that regulations, laws and enforcement occur.

So, why is this? I think that there are a few reasons that the message for action and taking precautions are not getting through. They include:

  1. We continue to use language that people don’t understand. This definitely tops my list. I see it when I speak to business people all of the time. I talk about cybersecurity issues or risks and they just don’t get it. One of the first comments is: we outsource our IT. Or, we operate in the Cloud, so it’s not an issue.

These comments definitely demonstrate that they are only seeing cybersecurity as an IT or networking issue. It’s much more than that and we need to educate our front line defence! Our human resources! And to arm them properly, we need to find a common language that people understand, not just the people in the “biz.”TaylorMade Solutions, cybercrime

Rather than refer to cybersecurity breaches, we need to help people see the criminal aspect of what is happening and that there are some easy steps to take to help protect each of us from them. For example, how many people lock their homes when the leave? Heck, how many of us keep the doors locked all of the time? It’s a matter of personal protection. Protecting our families and protecting our property. We now need to think about online safety in the same way. We need to lock the doors (our computers and internet access from criminals) and ensure that ensure that our windows are also closed and locked. If by chance a lock doesn’t quite work like it used to (continuously update our versus protection and software patches), we replace it immediately.

      2. When we do talk about cybercrime, we paint the picture of the villain in a hoodie in a dark basement. This is an old and outdated picture. Reality is, cybercriminals are often the people you least expect and can quite frankly be anywhere in the world, including next door, or in another country on the other side of the world. The point is, they aren’t likely lurking in a basement, but rather in comfortable quarters living off the ill gotten gains of people who might just be a little too trusting. Maybe you, maybe your neighbour, maybe a family member.

So, what is the solution?

In my opinion we need to go back to basics. Communications 101 actually. Who is our audience? What are we trying to tell them in order to get them to change behaviours? What language should we be using so that they understand? In other words, stop with the tech talk or cybersecurity industry talk. Speak to them in their language. And finally, where are they consuming information so that we can reach them?

These are simple steps that we can do. We just need to do them.

Do you have other ideas? We would love to know.

Do you need help implementing your internal Comms Plan or even developing a Privacy Breach Plan? If so, let us know.

Intel, Heather-Anne MacLean

Intel’s Security Flaw Puts Spotlight on Security by Design

Well, 2018 is starting off with a significant cybersecurity and privacy hit. Intel Corporation just confirmed Wednesday of this week that flaws in the Intel processor could leave computers – around the world – open to vulnerabilities. As the largest chipmaker in the world, computers – and not just PCs – are now exposed, and this quite frankly puts a spotlight on security by design.

Security by design is something that consumers should be concerned about. We should demand it actually. But, what is security by design? Using a simple definition from TechTarget, it is “an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards and adherence to best programming practices.” In addition to security by design, privacy by design should also be included and with the previous definition, privacy by design should be pretty easy to figure out.

Security and privacy by design are two minimum standards that consumers should be asking about and confirming that they are being fully implemented by the companies from whom they purchase products. After all, once a consumer is compromised the level of damage can range from embarrassing to fully destroying one’s life. For example, it could be someone getting access to your social media and taking it over and posting pornography. Or, it could be someone getting access to all your credit card information and then using the information to spoof you and to get many more credit cards in your name and thus ruining your credit and leaving you with thousands or tens of thousands of dollars of debt. It can also mean someone getting access to all your personal information, including all your health records and in addition to getting credit cards in your name, posting all your medical history online and on your own social media for the whole world to see.

Security and privacy by design are not new. People have been talking about these principles for years; but the kicker is that there is no legislated requirement to ensure that companies adopt these principles and build them into their standards and operations.

This Intel discovery should really be a warning and wake-up call globally. With Artificial Intelligence (AI) and the Internet of Things (IoT) becoming more and more entrenched in our daily lives, security by design and privacy by design must become the standard and be baked-in at the start of the design process rather than just emerging after an “oops” discovery.

For those that don’t think that IoT is in their lives, think again. Do you have a mobile phone? How about a computer at home? Did you get a fancy new fridge for Christmas that can tell you when you are running low on milk? Or, how about the latest craze in home assistants such as Alexa or Google Home – perhaps this was a new addition to your life? If you said yes to any of these, then you should definitely care about security by design and privacy by design.

So, once you have updated your computers with the patches sent out from your computer provider, let’s use the Intel incident to collectively start asking, no demanding, that all software and hardware providers implement – immediately – security and privacy by demand principles, protocols and standards! If consumers stand up for their rights and only support companies that adopt security and privacy by design, this will cause all companies to follow suit. Better yet, let’s legislate it and have severe penalties in place for those that don’t comply.

Want to learn more about how security and privacy by design impacts your marketing and communications? Connect with us.

Privacy, TaylorMade Solutions

The Unintended Consequences of Security Cameras: Children’s Privacy Breached

These days we can expect to be “on-camera” and recorded in most public places we frequent. Despite the fact that most of us don’t think twice about this, there are significant privacy consequences related to security cameras that we should be very, very concerned about.

First and foremost there are at least five questions we should be asking:

  1. “Who” is actually recording/watching us?
  2. What are they recording/watching us for?
  3. How long are they retaining this information?
  4. Can they “legally” record us?
  5. And finally and perhaps the most concerning, “Are they live streaming?”

This final question really rose to the top of the list just last month.  Parents and school administrators were somewhat shocked to discover that a school in Cape Breton, Nova Scotia was “LIVE” streaming video of kids in various school locations. Of course the intention was not to live stream, but unfortunately inadequate protocols were in place and this meant that firewalls were not in place. The result: images of kids were able to be live streamed for months.

In fact, the images had been live streaming for some time. Equally disturbing is the message that was displayed with the video. “Change Password” is clearly shown with the date and time of the video. The risk here of course was that some bad actor or actors could have taken control of the video system. Equally disturbing was the fact that in some cases, the camera position and the ability to zoom could have been accessed and actually changed.

As a parent, you would have obvious concerns with this. School administrators would have these  same concerns, but you need to add the liability issues. And then the question is, who if anyone, is liable? And, should they be?

As someone who advocates for privacy, I have a whole host of concerns with video surveillance. Consider the questions I list above. We have a right to know these things. Of course, there are very legitimate reasons for security surveillance. And please don’t get me wrong, I think that in the right circumstances, video surveillance is not only a necessity, but critical.

Let’s break down the questions above in a little more detail:

1. Who is recording us?

It’s true that we are being recorded more than we think. In public spaces, there should be an expectation of video surveillance. This surveillance however, is meant to be a deterrent against crime or other less than other desired behaviour. For example, I am sitting in a coffee shop right now and taking a quick look around, sure enough, I can spot two surveillance cameras. They aren’t actively pointed at the seating area, but rather the cash and the access to the back room.

The key to this are the words “public spaces.” Street corners are public spaces. Shopping Mall hallways are public spaces. Schools may not fit the traditional definition of public spaces. While a public space, a school is not open for any random strange to enter and wonder through. Additionally, public but private spaces such as locker rooms change rooms or washrooms are not truly public spaces.

An additional layer of complication is when children are involved. In these cases there do need to be extra precautions. There are many legal requirements when it comes to capturing images of children and how you use those images. In my business, I will not use a photo of a child, unless I have written confirmation from the parent(s) that I can. Live streaming children does not pass the smell test. In other words, if you are live streaming children, make sure you have your legal requirements covered and most importantly protect the identity of the children!

2. What are they using this information for?  

Remember that when using surveillance cameras, the information collected should be done in such way that the minimum amount of information is captured. For example, there is an expectation in change rooms and washrooms that there would be no cameras. If using cameras for security at a banking machine for example, the camera should not capture images of people walking by on the street outside the bank.

Additionally important is the capturing of audio. This is yet another level of detail that impacts privacy. Capturing images is one thing, but capturing conversations is a real intrusion upon one’s privacy. Live streaming it takes it to a whole other level of violation of privacy.

People have a right to know that they are being recorded and signs should be posted. You see this in airports for example.

3. How long is the data kept?

As stated previously, if surveillance is recorded, the information captured should be such that it is not capturing more intelligence than what is needed. Additionally, keeping this information is not something that is meant to be indefinite. Organizations must look at retention schedules. These of course can vary, so it is important to set realistic timelines and to properly delete the files.

Laws do change over time and what you may be able to do now, you might not be able to in the future. There is definitely a need to balance the rights of privacy of individuals while also collecting data that is needed to protect citizens. If you are using surveillance cameras, be sure to check with the applicable legislative and legal bodies for your region.

Want to learn more about privacy and how it impacts your marketing and communications? Connect with us.

Heather-Anne MacLean, TaylorMade Solutions

Blue Spurs and the Internet of Things Case Study

[Editor’s Note: This post previously appeared on the CyberNB blog]

We all interact with the Internet of Things (IoT) every day. Our kids interact with the IoT every day. Everything from our mobile phones to our smartwatches to the devices used to heat and cool our homes are connected to the IoT.

Despite connecting with it every day, many of us still don’t really know what it is.

Like cybersecurity, the IoT is one of the fastest-growing sectors of our economy. To put it in perspective, Ericsson has predicted that there will be 28 billion internet-connected devices by 2021. IoT is a natural tie-in with cybersecurity which makes this case study and interesting connection to educating our students and growing the talent pipeline.

Most importantly, it’s essential for our students to learn about IoT and the job possibilities it brings. To help students learn about its full potential Canadian-based Blue Spurs has created the Blue Kit, a creative, low-code product that teaches students about IoT.

For a complete look at Blue Spurs and how this award-winning Blue Kit evolved download the case study.