4 possible reasons users are apathetic when it comes to data security and the Internet

To continue from yesterday…

I found this book from 2009 about security – The Myths of Security. It's a fairly easy read (many chapters, but solid material and broken down into easy to understand chunks). I read most of it – really enjoyed it! It helps confirm that security has been an issue for a long time, but unfortunately, no one seems to take more interest in it – even in 2009 when the book was written.

I was at a networking event last night and happened to meet a security executive. I told him about my thoughts on privacy policies at sites and how we don't really educate users – he agreed. We are painfully behind the times in this regard, and we are in some ways harming our users by not being so direct and straightforward with them. I learned a few more details about the problems – and hope to talk to him in the future to learn more. He clarified some questions I have had about security, the Internet, the cloud, and the need to put up warning bells.

The below list was inspired from a blog comments dialog about the apathy people have towards security. I put a few thoughts together on it, and hope this generates more discussion. I think there are 4 possible reasons why there is user apathy about data security and the Internet. 

 

1. Protected from impact

The most common identity theft most of us have experienced has been through credit card fraud (I have been victim of this 2-3 times). This crime turns into a plain inconvenience because we have to call our credit card companies, report the theft, get a new card, and then update auto-payments with the new digits. It's just kind of annoying. Each of us personally doesn't need to fix the problem – that's the credit card company's problem. The banks have mastered this process and do a great job! 

However, beyond credit card fraud events, we haven't really experienced a big Internet security breech. I mean something like the data systems for a water supply source going down, so there is no way to distribute water anywhere. Or the system that manages street lights going down and there being no lights during rush hour in a city. Or the power grid collapsing. Or a personal health data leak from a major hospital or medical center or insurance company. We have been lucky that the flaws in these systems haven't been exploited and they have been managed so that we don't think about them.

This insulates us from thinking about the what-ifs – and in some ways, being insulated encourages us to be naive to the risks that this may cause.

 

2. What we don't know won't hurt us. 

We will rely on experts to tell us what we need to know (which is generally a bad approach to life, never mind how we store and manage our personal data). 

To reflect on the conversation I had last night with the security executive…he told me that there are general security issues with the overall workings of the Internet. He commented that we are using pretty much first or second generation security technology/methodology/ideas on the Internet, which is why it is so fragile. And no one changes it because they don't feel there is a need to (or shall we say, it would be too much work to get everyone aligned worldwide to make some sweeping changes).

This gets us back to the knowledge discussion. If you knew that to transfer packets of data across a network, it is cheaper and faster to unencrypted it, how would you feel about that? Or that the Internet itself needs an upgrade, being data infrastructure in general? I know I don't feel super secure. 

I work in the industry, so I know enough to be dangerous. Most people I know who work on the Internet or in computing have similar sentiments about data and security. Those outside the industry are generally fine with surrendering their data because they don't fully know the what-ifs of such a situation. They want to be educated, but don't know where to go or what to do.

This scares me for them.

 

3. Most of us aren't criminals and don't think this way.

If you aren't a criminal, you don't think like one.

Long ago on a flight, I happened to sit next to a criminal psychologist. Of course I was curious about how criminals think, so I pummeled the poor man with a bunch of questions.

I started to regret my interrogation when I asked him how criminals really think and he said: "When you or I walk past Macy's, we wonder what's on sale in there? What could I buy? Maybe I should buy those pants or that shawl today? A rapist thinks, I wonder if there is anyone I could approach and attack? Will the situation present itself to do this? How could I get away with that?"

Disturbing? Most definitely. (I had a stiff drink after that conversation.) But the same logic applies with security. 

Most of us go to a site and use it to buy a book, clothes, etc. Or we write a blog post, send an email, share files or thoughts.

A hacker visits a site, wonders about the security methods used, and how he could hack it. 

 

4. Believe we can give up personal security for safety.

If you think about this carefully, this logic doesn't make a heck of a lot of sense.

Personal security keeps us all safe. It's not something you should consider trading for "safety." I won't get into the NSA debate, but in general, once you allow anyone to view your data, you have created risk for that information to get into the wrong hands. This could happen innocently (someone looks over a shoulder, walks past a computer, etc.). It is general temptation.

You can't trust anyone's intentions, especially if that person thinks that it is ok to view information you consider private and personal. This goes back to point #3 – just because we don't think like a criminal, doesn't mean criminal minds, when tempted, don't exist.

Personal security for your data is important. It is your data to keep stored safely and securely.  

I'm curious to hear your thoughts.

4 possible reasons users are apathetic when it comes to data security and the Internet

Internet of Things, the cloud, and data security: Why we need to care

I recently upgraded the OS on my Apple laptop. As I was completing the installation, some questions on the screen asked me if I was connecting to iCloud.

I have been reluctantly storing a lot more of my data to cloud storage systems. I like the cloud because it is convenient; I dislike the cloud for data security concerns. I'd feel better if I could understand exactly what is happening to my data on the way to the cloud, through the cloud, and on the way back. This isn't magic – there are systems involved for routing and parsing the data.

Companies could do a better job describing what they do with our data. (Ok, Box.net does. If there are others, let me know.)

On the screens during the upgrade, Apple wrote that the data would be encrypted and saved/stored. But what should that mean to me? I know my data will be placed on servers, storage, and backup systems along the way.

  • Where will this data live?
  • How will it get from place to place?
  • Will it be encrypted?
  • Will it ever be unencrypted?
  • Is there a way to hack into this?

I mean, a bunch of celebrities got their photos hacked on iCloud. Why couldn't my info be hacked too?

I think we trust most cloud companies simply because they claim they are the "experts." Most of us don't understand the intricacies of data security and protection, and it can be overwhelming. Rather than trying to learn the information, we will often accept what an "expert" tells us because it is easier – mentally and emotionally – although this approach comes with great risk.

From childhood, we are trained to believe "experts" if a subject is too complicated. However, these experts can often over simplify processes and downplay risks/problems. This happens frequently when corporations try to sell a product. They try to make that product simple and easy to understand, but some key details could be left out of the discussion, which if included, could raise some concerns.

If you don't know what you don't know – you don't ask, which means you still don't know. This means that you don't know enough to even learn what's right.

Health insurance is a great example of this.

Health insurance is complicated. In one study, 3 out of 4 claimed they felt confident knowing what their plan was all about, when in fact only 1 in 5 could accurately calculate the costs to visit a doctor with that plan. (I'm not kidding!) Transparency could fix the problem, but the industry is so full of jargon, generally intimidating, and frankly, not entirely trustworthy. We take them at their word, because again, you don't know what you don't know, so you can't ask and you can't learn any different. 

But we all know what happens when we "trust" anyone with data, money, health. It doesn't always work out for the best. (Remember the mortgage crisis, the dot-bomb crisis, etc.)

The devil is in the details; we need to understand the details in order to understand the best way to work with a system.

 

Data security is probably the most important element of the Internet of Things movement.

(Personally, I hate the term Internet of Things the same way I hate the term "evergreen content." It's like a new generation of Web-Folk stumbled upon an idea that has existed for years, gave it a name, and now it's a new, exciting movement. What is up with that?)

The vision of the Internet of Things has existed for years – remember the Internet fridge from LG in 2001? The only difference as to why this is so hot now, is that it's more technically feasible and accessible with the emergence of mobile devices and wireless access. It's a truly wonderful vision, but if you get into the details, it quickly becomes a scary (honestly, apocalyptic) vision if data security isn't fully addressed. 

Here's a great example I found at Tech Target about how much the details matter in data security with the Internet of Things:

…consider what happened to Affinity Health Plan of New York. In 2010, the CBS Evening News acquired a network-connected photocopier that had been previously leased by the company. The copier was equipped with an internal hard disk and contained protected health information for over 300,000 people. The Department of Health and Human Services fined the company $1.2 million for allowing the data to be exposed.

Although there is probably no need for backing up the contents of a digital copier, this incident serves to illustrate the fact that network-connected devices can sometimes contain substantial amounts of data. For example, some security systems are equipped with hard disks and store everything from video data to employee door-access logs. IT pros must identify the devices that store data internally and then determine if that data needs to be backed up, and how to do so.

–Brien Posey, How the Internet of Things will impact backing up data, TechTarget

That copier-device should have been identified as a data storage device, and the data should have been protected and then swiped when decommissioned. Any one of us could be one of those individuals with exposed health data.

Imagine if some copy clerk was able to see if/when you had chlamydia, cancer, or any other private illness. Sure, he doesn't know who you are on the street, but he has seen your personal information. It's an anonymous violation of your privacy.

In the wrong hands, this isn't just a problem. This is a disaster. 

All it takes is a snippet of your private, personal health records to replicate your identity. The research tools to find your complete identity are public and the work to accomplish identity theft is mainly in the research. This is why data security is so important – just a little bit of information goes a long way. It is truly frightening to learn what's easily accessible. 

As an example, think about how you may go online to trace who called you using only a phone number. Or how you may Google a guy (or girl) before a date to make sure he is who he says he is. These are harmless identity searches, but identity searches nevertheless.

Now, think about identity searches using the mind of a criminal who wants to use your information to benefit himself.

All he needs is one piece of personal info. The next thing you know, you have maxed out credit cards you never applied for and have a foreclosed house in the Bahamas, even though you can barely pay rent. And no one believes that you didn't do it. Heck, the identity thief even knew about your parrot, Larry, those red heels you bought last week, and the real reason you were on penicillin 5 years ago.  

This brings us back to the discussion, why we should care about security (but we don't). More tomorrow. 

Internet of Things, the cloud, and data security: Why we need to care

Jibo – time for home robot technology

I saw the cutest thing on the Internet today – and I'm not sure how I missed it. 

Jibo.

Here's a video of the little guy. Yes, I want one. It appeals to my inner little girl.

 

It seems user-friendly, helpful, and human. It's great to see more human technology (for once). Modern home technology is really coming into its own with this, Ness and other products. It can provide company to the elderly, remind you of things you need to do, take photos, help educate your kids, and as said in the video, be a member of your extended family.  

It works using voice command, which in this case is more secure and helpful. The robot becomes a person-like when you call it by name and talk to it like you would a friend. 

Sure, you could say this opens the future for an AI or I, Robot situation. However, I think it's a step in the right direction to integrate technology in our lives. And if we use it in the right way, it offers great potential for our own personal growth.

 

Jibo – time for home robot technology

4 ways to improve privacy and security communication

I've wanted to get a Fitbit to track my workouts – from gym to belly dancing to walking. And I really want to get one so I can participate at the UnderArmour Record site. But I'm reluctant to buy one. Why? Because I wonder where my data goes when Fitbit gets it.

(The irony – I'm fine putting this data on the UA site, but not giving it to Fitbit. I think it's the social sharing reason more than anything else – there is a larger purpose to sharing the data. It's almost as if sharing negates the risk of exposing personal data.)

Sure, if I were to use a Fitbit, the data would go to their systems and according to their privacy policy, they would store it and wouldn't use it elsewhere. I'm sure they wouldn't use it, but I'm paranoid about hacking and if that data could be used to create a profile of me that could be used as a type of identity.

The questions that race through my head: Can they be hacked? What types of servers will have my data? How many? What will happen to my data on servers that are decommissioned? 

 

Although we live in a world where our data naivete has been shattered by Edward Snowden, Julian Assange/Wikileaks, and Anonymous, it seems as if there is still an apathetic view towards data privacy and security. The NSA has been rummaging through our personal data without proper authorization in the name of security. Identity theft is rampant – check out a hacker news site. We all know at least one person who has had a credit card number stolen from an online store (if it hasn't happened to you already). With all of this going on with our data, one would think that we would be more paranoid about what happens when a company gets it. 

It seems that no one cares about privacy and security anymore. Privacy policies are important, but people seem to care as much about this as they do terms and conditions legalese when downloading software. It has turned irrelevant.

Privacy policies were created during a time when companies were collecting names, addresses, phone numbers, and emails as leads. For that purpose, telling you that they were storing this info and not sharing it with third parties was being transparent enough.  

Fast forward 20 years. Today, companies collect much more personal, sensitive information from users – ranging from credit card and other payment information, health information, pictures (depending on the content, can be incriminating), identity information and more. Also, some cloud companies are now collecting other company's electronic documents to store, and some of that information may be competitive and confidential.

Most users don't know what really happens to their data once they type it into a browser and submit it to a company. The journey of your data can be fascinating, going across countries, encrypted, possibly replicated, depending on the infrastructure setup. Most users think they don't need to understand this and it should stay a mystery, but what if the company you were sharing with didn't really use best practices to transport and store data? How would you know you were exposed to great personal risk? 

 

At the Digital Dallas Summit in December, mobile leaders predicted that if we really want to make a go of these apps that store sensitive, personal data, we need to elevate awareness about security and privacy. I strongly agree with them and wrote about this in the 2015 trends article at UX Magazine.

 

Box.net has started addressing this problem with their extended version of a privacy policy. They tell you the journey of data you trust to them to store, how it gets processed along the way, and how they protect it. It's awesome! 

I think what they are exploring is exactly what users need to understand in today's data world. Simply knowing the legal use of data isn't enough anymore – users need greater protections and education about what is happening to their data when they give it to a company.

Here are 5 key changes that need to happen for us to move to a new era of data usage and adoption for anyone to be more willing and open to share data:

  • The industry needs to communicate best practices for backup and recovery systems – and teach users what they should minimally expect from a vendor
  • The industry needs to communicate best practices to prevent hacking - and educate users about they should minimally expect from a vendor so their data isn't hacked
  • Companies need to educate users how data travels in their systems from data entry on a form to long-term storage at a data center
  • Companies need to openly tell users the risk of sharing data with them – what could be used in identity theft, what could happen to an account if hacked, etc. 
  • Companies need to educate users about their responsibilities to keep their data safe and protected beyond passwords

How do these ideas contribute to a new type of privacy policy? 

  • Include diagrams: be transparent and show the user where his data travels in a simple, easy to understand way. All users need to understand where their data is going. As technologists, we often believe users won't understand this, but they will if we explain it to them properly. Sometimes we want to cut corners, do something non-standard and withhold that information from a user, as if that makes it ok. The user is trusting a company's system to store their data, and if that system isn't using proper industry standard security protocols, then the user should understand that during account creation and accept that risk.
  • Educate users about industry data practices. Educating users about data security is the same as educating people about FDIC, banking, and what will insure their money. Users should understand what https is; how backup systems work; why data protection and encryption is needed. In today's world, this is now part of our baseline knowledge – it shouldn't be a magical mystery anymore. 
  • Have surgeon general type warnings for users about the risks of sharing their data. People smoke even though they know it may kill them. Users may share data with an insecure system, but they need to understand the risk of doing so. It's only fair – it is their data and they need to understand the risks. Most users don't think like a hacker and do not easily see how their data could be used against them. It is a company's responsibility to expose that risk to them.
  • Tell users what happens to their data when servers/appliances are decommissioned. A laptop computer will hold deleted data as a shadow on the hard drive -why you always want to salvage your hard drive and keep it safe. Personal data on that drive can always be reconstructed in forensic computing. What happens to your data on a machine that is replaced? How does the wiping happen before it is discarded? That policy is key to understand data risks if someone stole old equipment. 

 

In this new world driven by data, it is about time that users had a clear understanding of where their data goes, what happens to it, and the risks of giving it to a company. When we invest money, we are told about the risks. When we mail a package, we are told the risks. When we cross  the street, we understand the risks. However, when users give data to a company they are only told that the company won't share our information with third parties. That's not enough. Users should know how their data is secured.

On the flip side, for a user to claim that it is ok not to understand how his data flows at a company's Web site is the same as someone saying he doesn't understand how to manage his money. If you know where your dollars go, you should understand where your data goes. It is that simple.

 

4 ways to improve privacy and security communication

Why I like the Hyatt hotel brand? Simplicity, friendliness and architecture

I usually choose to stay in a Hyatt property. I’m not a fan of a Marriott; Hiltons are ok, but I just don’t seem to stay there (not sure why); the W is fun, but more of a party/social hotel; Sheratons don’t really do it for me; boutiques and independents are great – the experience can be awesome but occasionally you get a meh experience. I prefer to stay in independent hotels, but if I have to choose a brand, I’d choose Hyatt. 

Hotels are the last stand for unique travel experience, now that airlines and car rental companies have pretty much managed to commoditize themselves (except Virgin Airlines – they are unique). Hotel rooms in some respects are a commodity – they have a bed, a desk, Internet access (hopefully in this modern age), and a bathroom. What adds value to make them unique are things like:

  • the type of bed
  • the cost of Internet access (and its quality)
  • the types of towels
  • bathrobes
  • mini-bar items
  • hotel restaurant or bar
  • staff personalities, friendliness, and their memories
  • and more

I searched the Internet to find perspectives on what makes the various hotel brands different, and all I found were summaries about their rewards programs (if you have any suggestions for where to find a hotel brand comparison table or article – please forward. I’m curious). Rewards programs are one part of a hotel experience, but by focusing on that, the hotels are being turned into commodities. And they aren’t.

I found this brand statement for Hyatt:

Our mission is to provide authentic hospitality by making a difference in the lives of the people we touch every day. We focus on this mission in pursuit of our goal of becoming the most preferred brand in each segment that we serve for our associates, guests, and owners. We support our mission and goal by adhering to a set of core values that characterizes our culture.

This brings me back to Hyatt and why I like it.

One of my favorite Hyatt hotels is the Hyatt Place in Fremont, CA. I like that you can go to the lobby, get a regular salad (not an over-designed salad with multiple ingredients that I can’t pronounce, that, although lovely, is just more needless complication after a complicated workday), get a glass of wine, go back to your room, and chill on a living room couch. I feel like I’m at home.

The other is the Hyatt Regency in Boston – the staff is super friendly and helpful, the rooms are fairly large with great bathrooms, and it’s brutalist architecture (I just wrote about my experience there over Christmas – I have a bizarre attraction to brutalist architecture that most people think is the ugliest thing going. I’m not sure why…). I still can’t believe that some of the staff at the Hyatt in Boston remembered me after a year. It’s incredible!

The 3 reasons why I like the Hyatt:

1. Unique Architecture

I think this is more true for the Hyatt Regency brand than the Hyatt Place brand. Every Hyatt Regency has something unique about it.

San Francisco Brutalist Architecture

I think it’s quite an interesting building to look at!

San Francisco Internal view – gorgeous lobby!

Boston Brutalist Architecture

Boston – Unique Interiors

Hyatt Regency Cambridge – Unique design allows

each room to have a great view

Glass elevator to see a beautiful lobby

2. Friendly and Relaxed

I don’t feel like I have to be “on” when I go to the hotel or the lobby. Hyatt has a relaxed, casual feel to it, although it is stylish and unique. Some other hotels feel “corporate-y” (Marriott) or “scene-y” (the W). When I run out to get coffee in the morning, I don’t want to feel awkward schlepping into the lobby wearing my over-sized, hoodie sweatshirt and exercise pants. I prefer not to feel like I have to look 100% fresh when I’m wandering around my home away from home. At a Hyatt, I get that anonymity and at the same time, a friendly face that greets me in the morning. I’m not sure how else to describe the experience.

3. Simplicity

  • Food offerings. Seared tuna and avocado salads with some special nut crumbled over is interesting, but I don’t want to eat that every day. When I can’t identify a food ingredients (and considering that I’m a foodie, this is an accomplishment) or sauces on my food, I know I’m in over my head. At a hotel, I want the food to be simple and straightforward.

A new offering that I’m excited to try for the Hyatt Regency is a mix and match dinner – pick a protein, pick a sauce/topping, pick a veggie – dinner! That’s just as nice as the simple salads they offer to which you can add protein. Life is complicated enough – dinner choices should be easy.

  • Free Internet. Starting in February 2015, Hyatt will be offering free Internet access across the brand. (All hotels should have free Internet – but that’s for another post!) Some hotels already do this, but it’s good to hear that the entire chain will be offering this as part of the room.

What are your thoughts about Hyatt? Look forward to hearing your opinions!

Why I like the Hyatt hotel brand? Simplicity, friendliness and architecture