Tuesday, October 3, 2023

Our Privacy

 

Privacy is a subject that I didn't know much about, nor did I want to learn more about it, specifically the security of our privacy. I knew it was important, but didn't want to bother with it and just thought it wasn't something that would pertain to me. "With so many people in the world, why would my data be target." was probably my thought process. Taking this class and listening to a handful of interviews, TED Talks, and documentaries has taught me about the importance of protecting our privacy. 

A great case that involves a breach in the privacy of myself, my family and my friends' is that of our cell phones. Cell phones are essential communication tools in modern life, but they can also infringe on individual privacy. Knowing where a person's phone is located can reveal sensitive information, such as medical appointments, political activities, and sleep patterns. Law enforcement agencies can obtain this information without a warrant, and the federal government can use surveillance authorities to collect call records, contact lists, and text messages. This can compromise individual privacy and the security of personal information. 

Government organizations are lagging in setting cybersecurity guidelines for mobile devices, with 45% of the public sector lacking an acceptable-use policy. This lack of proper security measures can be harmful, particularly if dealing with confidential information. The Federal Mobility Group (FMG), chartered by the Federal CIO Council, has released a mobile management ecosystem that includes four strategic pillars: Unified Endpoint Management, Mobile Threat Defense, Native Mobile OS Security Functionality, and Mobile App Vetting. The government must evolve their policies and take proper precautions to counter potential threats and ensure the safety of all mobile devices. By implementing these measures, the government can better protect its citizens and ensure the security of mobile devices. 

To avoid constant surveillance, it's crucial to pay attention to your online activities and use a reliable proxy service to change your IP address. Encrypt your systems and store backups to protect your data. It's essential to consider how much information you should share on the web, as everything you say can be tracked and collated in a digital file. This privacy invasion is a complete invasion, and it's essential to protect yourself and your data. 

It's essential to stay aware of potential threats and take steps to protect your privacy.


https://www.egovreview.com/article/cybersecurity/64/how-do-governments-deal-mobile-security 

https://www.uscybersecurity.net/protect-yourself-from-privacy-invasion/

No comments:

Post a Comment

My Relationship with Technology ~ Final Blog Post

Technology is a subject that has slowly become fully integrated  within my life. It wasn't something I had a particular interest in (whe...