Page 1 - GS190701
P. 1

July 8, 2019  •  Issue 19:07:01

                          Privacy and social media:



                                    a delicate balance





                                                               publicly available information and open-source intelligence
                                                               (OSINT), criminals can access online accounts and steal
                                                               identities. This makes it imperative to understand and
                                                               properly configure the media platforms you use.

                                                               "Facebook and Google don't make money unless they are
                                                               getting  data,"  he  said.  "Are your default privacy  settings
                                                               more supportive of you or the organization that uses your
                                                               data?"

                                                               Who owns your data?
                                                               "I don't feel I have any privacy when using social media,"
                                                               said  Dale  Cardarelli,  vice  president,  enterprise  sales  at
                                                               Citizens Bank Merchant Services/Worldpay.  "We live in
                                                               an-enter-at-our-own-risk era. Whether I post or my friends
                                                               post, the world of social media knows who we are."
        By Dale S. Laszig
                                                               Cardarelli's daughter, Olivia, is a college co-ed who uses
              n a hyperconnected world of one-click checkouts and  Instagram and Snapchat to keep in touch with friends,
              same-day deliveries, the race is on to provide seam-  relive memories, follow favorite influencers and stay up to
              less, frictionless commerce. Consumers share buying  date on pop culture. She is careful about what she shares
        I experiences and reviews on social media, encourag-   online. Social media platforms "are not safe, and they listen
        ing or discouraging others who contemplate similar pur-  to what you are searching for," she said. "Also, they can
        chases. Merchants thank positive reviewers and beg critics  see through the camera screen and see what you look like,
        for a second chance. Service providers bundle reputation  what you wear and how you style yourself. I keep all of my
        management with processing, helping merchants engage  accounts private; therefore, I keep my own privacy."
        with customers in the always-on, virtual marketplace.
                                                               APIs and endpoint technologies can be backdoors for
        And mostly hidden from view, fraudsters package datasets  cybercrime, according to security analysts. To illustrate this
        from social media and mobile apps for quick sale on the  point, Dan Salmon, a computer science student, scraped 7
        Dark Web.

        Marc Punzirudu, vice president, security consulting
        services at ControlScan, said consumers sometimes        Contributed articles inside by:
        unwittingly expose sensitive data when interacting on
        social and mobile channels. Criminals can easily defeat   Brandes Elitch ........................................................................................19
        typical security questions such as your mother's maiden
        name, where you attended high school or favorite pet just   Dee and Emily Karawadra .................................................................32
        by looking at your online profile, he stated.            Jeff Fortney .............................................................................................36
                                                                 Nicholas P. Cucci....................................................................................38
        They can scrape your geolocation and time stamps from
        uploaded photos, unless you modify settings. Armed with   TOC on page 3

                                                                                      Continued on page 30
   1   2   3   4   5   6