Pub.7 2018 Issue 4
21 w i n t e r | 2018 Personal device assistants like Siri, Google, and Alexa listen to your questions, and document those and other things you have searched on your device. They try to be a step ahead to make your life a little more convenient. Allowing an app access to your assistant means the app is going to know a lot about your preferences, good or bad. Location Allowing your apps to access your location has its benefits and its downfalls. If you want to use your Maps app, you must have location enabled. However, if you’ve enabled Facebook or Instagram to track your location, the app may make unwant- ed suggestions when you’re browsing the app, like asking you to rate nearby businesses. Photos/Camera Access to your photos and the camera on your device is helpful if you plan to upload and share photos on a platform like Facebook. However, apps like Amazon or Fandango do not need access to your photos or camera to be used successfully. Siri, Google, and Alexa Personal device assistants like Siri, Google, and Alexa listen to your questions, and document those and other things you have searched on your device. They try to be a step ahead to make your life a little more convenient. Allowing an app access to your assistant means the app is going to know a lot about your preferences, good or bad. These personal assistants have enabled our phones to make suggestions to us based upon our day to day mobile device activity. • One example is Browser Activity. If you search for a specific term on your mobile device, it’s extremely likely that you will see that term popup in some sort of advertisement in another app that you use. Face- book is notorious for these types of integrations, but I have personally experienced similar situations on Twitter, Instagram, and even Snapchat. Coincidence or not, we should be mindful of what we allow our apps to access. • Devices have also started tracking Frequent Con- tacts. I have a group of friends I message on a regular basis, across multiple platforms. If I’m perusing my phone and navigate to the “Siri Suggestions,” Siri will suggest apps I should open, or people I should message. • Your mobile device also keeps track of your Daily Tasks. A personal example is when I leave for work each morning, my Maps pop up and tell me how long it will take to arrive at the office. It does the same thing at 5:00 PM each day, around the time I am leav- ing work for home. A colleague of mine has a similar situation. When she arrives at work, her phone sug- gests that she open the Music app and begin playing music. Advertising One final clever iOS setting is at the bottom of the Privacy page, there is a section called “Advertising.” This option al- lows you to limit ad tracking on your device. Essentially, your phone will stop suggesting ads to you based on your interests. However, there is an important note that also states turning off the advertising option will not necessarily show you less ads, but the ads you do see will be less relevant to you. Situations like the ones described above are a little un- nerving, but they do not mean us any harm. If you would pre- fer for your mobile device to not make these kinds of sugges- tions to you, review the privacy settings on your phone to see which apps are watching you, and modify your preferences in bulk. On an iOS device, you can do this by navigating to Set- tings > Privacy and reviewing the options there. If Android is more your flavor, go to Settings > Security & Location (or similar). Regardless of the kind of device you have, it is important to ensure we understand what our apps can access, not just for our own personal benefit, but for our friends and colleagues, as well. Samantha Torrez currently serves as a Senior Support Specialist for Tandem, an information security and compliance software suite provided by CoNetrix. She has been a member of the Tandem team for more than two years and has been part of the technology industry for five years. Samantha has achieved the ISACA Cybersecurity Fundamentals certification and has presented webinars and live conference sessions on a variety of information technology topics, including cybersecurity, business continuity planning, and risk management. B A N K B Y T E S
Made with FlippingBook
RkJQdWJsaXNoZXIy OTM0Njg2