Understanding Social Media and Website Privacy Policy

Alberto Marmolejo-Daher, Cody Eckhoff, Justin Moore – March 29, 2024

Privacy Policies are an organization’s outline of how consumer data is aggregated, analyzed, stored, and protected. In this reading, we’re going to outline what these policies are and connect them to cybersecurity.

Historically the United States has allowed businesses and institutions to collect the personal information of its users without express consent, while regulating those in specific sectors like medical and educational via the following acts: Health Insurance Portability and Accountability Act (HIPAA), Family Educational Rights and Privacy Act (FERPA), and Children’s Online Privacy Protection Act (COPPA).

It’s important to recognize that regulations are under constant development because of how rapidly technology has been developed. The European Union adopted regulations in 2018 called the General Data Protection Regulation or GDPR that impose obligations on organizations anywhere. Here is a good article that explains how EU GDPR applies in the USA. Since 2023, states in the USA are beginning to enforce GDPR-like statues, states including California, Colorado, Utah, and Connecticut. These laws will change how US companies handle your data, please read the hyperlinked article for more detail.[Mo1] 

Organizations such as TikTok, Meta, and X (formerly known as Twitter) all have privacy policies that are meant to be transparent to consumers on how their data is managed. While different, they are foundationally the same. These policies generally include what information is collected, what information is shared with third parties, how that information is shared, and how long they keep your information. For example, Meta collects your feed activity, messages sent and received, payment information, preferences, geolocation, and more.[Mo2]  You can easily find these policies by searching “<company name> privacy policies” in a search engine.

Now that we’ve reviewed how privacy laws are ongoing and relevant, we can better understand how they relate to your information online. There have been many data compromises in recent years and a lack of transparency from organizations when data breaches occur. The Digital Guardian has a good article on the laws about disclosure of breaches, if you’re willing to read about them (I know it’s boring, but a quick skim of the text won’t hurt). Apple has a feature on their devices (if you store your passwords in their keychain) that notifies you if your account has appeared in a data breach. Also, you can use a website called haveibeenpwned to check if your email has been included in a data breach.

In cybersecurity, we have some key terms to identify data types that appear frequently in privacy policies. Some of these you may have heard of:

  • PII: Personally Identifiable Information
  • SPII: Sensitive Personally Identifiable Information
  • PHI: Protected Health Information

In addition to these terms, here are five recommendations for protecting your privacy and data.

  • Don’t post PII on your social media, as it may be used to reset your password through security questions such as the names of pets, relatives, high school mascots, etc.
  • Generally, organizations collect sensitive data; it’s important to be cautious when choosing usernames and passwords because if their data is breached, your data will be breached.
  • When choosing usernames, do not choose anything that can be linked to you in a way that could be used for more personal data.
  • Do not reuse passwords for multiple accounts. What if a threat actor gains access to your Facebook account using the same user and password as your bank account?
  • Enable Multifactor Authentication (MFA), also known as 2-factor authentication on your devices and accounts. This mitigates an incident where your password is compromised by requiring a second layer of security, such as biometrics, push notifications, etc.[Mo3] 

Intro [Mo1]

Social Media/ General Company Handling [Mo2]

MFA, SPII, PII, PHI [Mo3]

Defense Against Social Engineering

Alberto Marmolejo-Daher, Cody Eckhoff, Justin Moore – February 29, 2024

Defense against social engineering! It just rolls right off the tongue, doesn’t it? Social engineering is manipulating a person’s social perception to coerce the disclosure of private/sensitive information. So, let’s get into learning how social engineering works and how to identify it.

First, every social engineering attack has a lifecycle. The lifecycle of a social engineering attack begins with investigation, where a threat actor will select a target and method. A convincing narrative is set to exploit trust with familiarity or urgency; we can think of this as bait being set on a hook. Then, victims are tricked into compromising actions, such as opening infected attachments or divulging sensitive information, where the target takes the bait. In the exit stage, attackers cover their tracks; there is no better attack than one where the victim was unaware what happened. Because when an attacker’s ploy is hidden, they can then either escalate the attack or keep collecting information; often, it’s both.

The lifecycle may end after the attack, say an attacker steals bank account information and withdrawals money, something you will hopefully notice and fix immediately. But, if the attacker has gotten into an account of a person very valuable to an organization, they may extend the life of their attack to create backdoors or collect more information. The longer the attack is obfuscated, the greater the damage.

Now that we’ve described the lifecycle, we can get into details. There are several facets of social roles and cues that manipulators may draw from to create messages that easily obfuscate their malicious intent. Often, people’s trust gets exploited based on authority, familiarity or consensus. Many other times, people are coerced via intimidation, urgency, or scarcity. Be cautious about unexpected requests for sensitive information by verifying the identity of the person or organization making the request and questioning the legitimacy of unusual or urgent situations.

For example, an attacker may impersonate IT in your organization and ask for your password to verify your account, and if you don’t, your account may be deleted. This type of narrative falsifies the attacker’s authority and creates an urgency for the user to act. Instead of listening to the impersonator, the user should stop interacting and investigate the request further. Remember, it’s okay to take time to verify before sharing any personal or sensitive information.

Let’s look at a real common scam that occurs daily. These images show some real email scam messages that you may receive.

As seen in the above examples, often these scams will seem too good to be true, and that’s because they are. They will often offer hundreds or thousands of dollars a week for a remote job and ask you to click a hyperlink, however it is never good to click a hyperlink in an email from someone you don’t know. Another way to recognize these types of scams is they will often have bad grammar and weird formatting, such as the capitalization of “part-time job” in the first example.

We could talk all day about types of scams but here are some interesting scams to read up on:

Don’t ever interact with scammers and the content they send but, if you’re feeling curious and want to investigate the links that these phishers send, you can utilize open-source tools like:

Is ChatGPT Taking My Data?

Alberto Marmolejo-Daher – January 30, 2024

Can the use of ChatGPT be compromising me or my organization’s data?

Alrighty folks, let’s *chat* about the use of Open Ai’s ChatGPT tool! Anyone? No? Okay then. Using generative AI can be a fun and useful supplement to your workflow, whether that be in your school or work. Yet, there are security concerns we should all have with its use. Should we assume that ChatGPT and other generative AI tools are automatically secure? That there isn’t a possibility of sensitive and/or proprietary data being compromised?

First, let’s cover some of the information that we find online. Cybernews’ article on a report done by LayerX shows employees regularly using generative AI. LayerX collected data from 10,000 employees who used their browser extension. Fifteen percent of those employees regularly post company data into the AI’s engine; nearly a fourth of that is considered sensitive. That means six percent have given sensitive data to ChatGPT. LayerX also found that four percent of these employees are posting sensitive data regularly. Of the data that was pasted from employees, 31% was source code, 43% was internal business information, and 12% was personally identifying information (PII).

Based on that data, we know that sensitive and/or proprietary information exists outside of an organization’s database, making it vulnerable and possibly putting other data at risk. Data from PII can be used to craft convincing phishing attacks, putting user accounts at risk, which may lead to more serious cyber-attacks.

            Well, if OpenAI ensures ChatGPT’s security and maintains it then we won’t have to worry right? As we can see from an article from interesting engineering it’s possible that user’s chat history can be leaked unintentionally. Another article from Hacker news reports that stolen ChatGPT account credentials were sold on illicit marketplaces. If ChatGPT is becoming more involved in workflow with sensitive data, then that means that a compromised ChatGPT account or its chat history will lead to compromised proprietary data.

Next steps…

            Let’s say that you want to continue using ChatGPT in your workflow. Tech.co has a great article on this subject; here is our summary. The nature of generative AI is that it’s also trained on the data that you input, so don’t risk putting that data out there. Instead, you should opt-out of sharing data. Don’t share creative work that you’re not okay with being used in other people’s conversations. Financial conversations with the chatbot can also put you at risk, so when talking about finance, do not share credentials, account information, or documents that contain that information. Don’t put any PII out there because it can be used in malicious impersonation or could be used in password resets.             Always be mindful of what data you put on the internet and be knowledgeable with how organizations use and store your data.

Insecure Internet Connections

November 28, 2023: Jasmine Fitt, Alberto Marmolejo-Daher, Cody Eckhoff

Have you ever connected to a coffee shop’s public Wi-Fi?

If so, your data & privacy may be at risk! While convenient, using public Wi-Fi Networks or hotspots in malls, airports, and stores may be unsafe. Most free Wi-Fi is unencrypted, meaning that anyone in the area can intercept and read your data.

Most websites use encryption to protect your data while you use it. However, you can never be too careful. Avoid accessing or entering sensitive information such as financial, email, or social media while on a public Wi-Fi network.

HTTP and HTTPS: What’s the difference, and why is it important?

To the average eye, the text in the address bar may seem meaningless, but one character can reveal how secure that website is.

Hypertext transfer protocol (HTTP) and hypertext transfer protocol secure (HTTPS) are sets of communication rules between the client (you) and servers (the website’s host). As you may have been able to guess, HTTPS provides a more secure connection through data encryption. When transferring data through HTTP, the data is unencrypted, meaning it can be easily read. However, HTTPS transmits encrypted data, meaning it cannot be easily read by people who intercept any data.

To tell if your connection to a website is HTTP or HTTPS, you can check the address bar. If the website starts with https:// or has a lock symbol on it, then it uses HTTPS. These will most likely appear on both mobile and desktop browsers. If they aren’t there, then do not use that website or proceed with extreme caution when inputting information and data.

Some websites are imposters

Remember that phishing comes in all shapes and sizes and that the devious tactics that scammers use are constantly changing.

One certain scam is presenting a user with a phony website that looks real to gain the user’s trust and then their information. Let’s run through a phishing scenario.

Let’s say you receive an email from your organization saying that you need to change your password as required by their yearly change policy. In the email is included a link to the organization’s website, and you click on it. The website looks legit, it has the same colors and logo that you’re familiar with, it all looks grammatically correct. Are you sure that you should change your password on this site?

To find out, you must look at the address bar and see if the domain is legitimate; if you were browsing that site on your phone, that key aspect may be hard to pick up on!

Always investigate your organization’s policies so you understand what actions are required of you. Often you may receive a scam request about something that you are not required to do. Look at who sent you the email; if it’s not from the organization’s official domain, then don’t click on anything they’ve sent you.

Resources

https://aws.amazon.com/compare/the-difference-between-https-and-http/

Cybersecurity Toolbox

October 27, 2023: Jasmine Fitt, Alberto Marmolejo-Daher, Cody Eckhoff

For Cybersecurity Awareness Month we’re going to dust off the ol’ toolbox to make sure we’re keeping ourselves secure. Let’s go over the fundamental topics of keeping yourself secure.

Passwords

Having a password is good, something that we can all agree on, except for hackers. Depending on the password that you create, it can be brute force guessed by a hacker in anywhere from just a few seconds to a few days. Did you know that in 2022, the most common password was “password?”. It takes less than a second to crack that, so let’s make sure that you aren’t one of those people who get easily hacked.

A good password (write this down) will be 15 or more characters in length composed of upper and lowercase letters also containing numbers and symbols. See CSU’s password requirements for more information.

Now this next part might be hard to hear but, don’t share one password with multiple accounts! Okay, so you may be wondering, “so I have to memorize all my passwords for all my accounts?” Well, not if you utilize the help of a password manager.

A password manager that’s in your browser or computer/phone can be incredibly helpful to store this information, just one caveat. If you lose the codes/passwords for this manager or lose the device with the passwords then you are out of luck, so use them wisely. 

Multi-Factor Authentication

Multi-factor authentication (MFA) is like having your own personal Gandalf present to stop anyone but you from gaining access to an account of yours.

MFA is mainly going to be three things: something you know, like a PIN or password; something you have, like a device or smartphone; and something you are, like fingerprints.

MFA works great in conjunction with good password knowledge. Some accounts like Gmail may have the option to set this up with them directly but you can also use the help of apps like DUO Mobile or Microsoft Authenticator. We use Duo at CSU for a 2FA solution.

In a similar vein to a password manager, if you lose the device that you have the authenticator app on then you may be out of luck unless you kept the backup codes in a safe place. Set up MFA so you can tell all the hackers: “You shall not pass!” (it’s written in the book as, “You cannot pass.” But that is not nearly as cool).

Defense Against Phishing

Phishing (pronounced ‘fishing’) is a serious problem that uses social engineering to make itself more effective and trickier to detect. In 2023, 36% of all security breaches involved phishing attacks.

A good rule of thumb for all phishing attacks is to spot if there is urgency to give information or money, or just any unwarranted asking of money or information to facilitate a process.

To defend against phishing emails, be sure to double-check the sender address that may look real but is impersonating an organization. Also, you may hover over the link (but don’t click on it) and see that what pops up, it will probably look like a long and sketchy address link. You may also receive spear-phishing emails that appear to know your name and role at work, making it even more convincing. A training video on phishing is available on our Cybersecurity Training & Awareness page.

You may also encounter text message phishing usually reporting suspicious activity and you need to log onto the website through the fraudulent link that they sent you which takes you to a website controlled by the scammer to grab your information.

If you believe that you received a phishing email, do not click on any of the links. You should contact sources directly to verify if there are any actions that need to be completed. Furthermore, you should report the message (right-click on the email, then scroll down to ‘report’ in Microsoft Outlook), then delete it. Remember that you are the first line of defense against phishing and to never respond to their emails. We have put together a training video on this as well.

Using a VPN

At some point, you have probably heard of a VPN/Virtual Private Network. A service that creates an encrypted connection between your device and a server. You can purchase access to a VPN from various providers who provide full tunnel encryption, and they will instruct you how to set up their service on your device.

VPNs authenticate your client with the VPN service and then apply encryption to your data that is sent and received. Another layer is applied to keep your data safe while in motion. A caveat for all users of CSU’s networks, the CSU VPN (Global Protect) provides split tunnel encryption which means that only the data that is connected to CSU resources is encrypted; all other data is public.

Summary

Applying the strategies in our toolbox helps protect the confidentiality, integrity, and availability of your data and others at CSU.

Some sources:

Security.org | “How Secure is My Password?”

ProofPoint: 2023 State of the Phish