Avoiding The Privacy Paradox In The Workplace

For cybersecurity professionals and online users alike, the burning question is no longer “do platforms bridge our privacy?” Rather, it’s “which platforms bridge our privacy?” Nowadays, data tracking is a known side effect of using internet-connected devices and services. And the data shows users are indeed concerned about, well, their data:

As many as 72 percent of Americans feel that all, almost all, or most of what they do online is being tracked by advertisers, technology firms, or other companies and 79 percent of Americans are concerned about how companies are using the data they collect about them.

  •     Over 80 percent of online users in the U.S. also feel that their data is vulnerable to hackers.
  •     Yet, 59 percent understand very little or nothing about what data companies collect.

What’s more, according to Norton research, 40 percent of Americans admit they don't know how to protect themselves from cybercrime. And cybercrime victims collectively spent 2.7 billion hours trying to resolve their dilemmas in the last 12 months. 

This dichotomy in how someone intends to protect our online privacy versus how they actually behave online is called the privacy paradox. And it can be a big problem for businesses - just think about that cybercrime recovery time. 

Considering cyber security teams are understaffed in the workplace, it’s up to decision-makers in the public and private sectors to encourage employees to be proactive about breaking the privacy paradox problem in the workplace. To that end, consider the following common places and platforms online users sacrifice their online privacy and how the risks can trickle down to organizations. 

Video Conferencing Services

The Covid-19 pandemic threw many workplaces into a remote-work mode, and many companies relied on video conferencing platforms to get through it. Even as organizations might move back into in-office meetings soon, video conferencing services are sure to stay in some capacity — and so are the cyber threats that come with them. These mainly regard webcams and the fact that cybercriminals can access them via spyware, committing a true invasion of online users’ privacy. 

    TIP: Instilling webcam awareness in employees, such as using a video background to not expose physical spaces, closing out video conferencing accounts after every call, and covering webcams when not in use, can all go a long way in protecting an employee and, in turn, organization’s privacy.  

Online Banking Institutions

Online banking is nothing new to companies and the staffers they employ. But what’s most overlooked is that online bank accounts are also the most sought-after platform for cybercriminals to hack into. 

    TIP: To level up your organization’s online banking activities, instill strong password practices in accounting or financial services departments. This means using a long, unique password and changing it often. A password managing software can also help keep track of the ever-evolving logins. In addition, opt for two-factor authentication, if it’s an option. 

Online Shopping Sites

Especially for employees with a company credit card handy, online shopping sites can be a bane to a business’s privacy. The convenient act of saving payment methods for later online shopping sites means these payment methods are sitting ducks in the event of a data breach.

    TIP: To offset any unfortunate circumstances, encourage employees to never create accounts on online shopping sites and instead manually input information for every individual transaction.    

Finally, a Virtual Private Network should be viewed as mandatory for every employees’ online activities. 

Pew Research:     Statista:      Norton LifeLock:      Image: Unsplash

You Might Also Read:

Why You Should Never Use A Free Proxy:

 

« Online Fraud Costs British Investors £63m
Cyber Security Mergers & Acquisitions - May 2021 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

S2 Grupo

S2 Grupo

S2 Grupo is the benchmark company in Europe and Latin America, for Cyber Intelligence and mission critical systems operations.

Basis Technology

Basis Technology

Basis Technology provides software solutions for text analytics, information retrieval, digital forensics, and identity resolution.

TÜV Informationstechnik (TÜViT)

TÜV Informationstechnik (TÜViT)

TÜViT is a leading service provider in the IT sector offering unbiased and independent tests and certifications of IT products, hardware, software, systems and processes.

AKS IT Services

AKS IT Services

AKS IT Services (an ISO 9001:2015 and ISO 27001:2013 certified company) is a leading IT Security Services and Solutions provider.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

SensorHound

SensorHound

SensorHound’s mission is to improve the security and reliability of the Internet of Things (IoT).

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

Cyber Coaching

Cyber Coaching

Cyber Coaching is a community for enhancing technical cyber skills, through unofficial certification training, cyber mentorship, and personalised occupational transition programs.

Twingate

Twingate

Twingate help organizations secure and manage access to their technology resources in a world where people work from anywhere.

Dataships

Dataships

We help companies automate their privacy compliance while building healthy, transparent data relationships with their customers.

Techstep

Techstep

Techstep is a complete mobile technology enabler, making positive changes to the world of work; freeing people to work more effectively, securely and sustainably.

Centroid

Centroid

Centroid is a cloud services and technology company that provides Oracle enterprise workload consulting and managed services across Oracle, Azure, Amazon, Google, and private cloud.

VC3

VC3

VC3 provides a full range of Information Technology Solutions and Services to hundreds of municipalities and organizations throughout the USA.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.

ArmourZero

ArmourZero

ArmourZero help organisations redefine their cybersecurity strategy - increase visibility, minimise complexity, manage risk, and enhance protection, all under a unified security operations platform.