[{"@context":"https:\/\/schema.org\/","@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/the-ping-your-smart-device-just-sold-your-data-to-the-highest-bidder\/#BlogPosting","mainEntityOfPage":"https:\/\/univista.com\/posts\/the-ping-your-smart-device-just-sold-your-data-to-the-highest-bidder\/","headline":"The Ping: Your Smart Device Just Sold Your Data to the Highest Bidder","name":"The Ping: Your Smart Device Just Sold Your Data to the Highest Bidder","description":"ShareTweet Ok, we\u2019re going to get a little conspiracy \/ someone-is-watching-me crazy right now\u2026\u2026\u2026 If you have a device with a camera that can access \u2013 or be accessed from \u2013 the Internet, then you may have a physical security problem. Someone may be watching you. Someone may be listening to your sensitive conversations. &nbsp; [&hellip;]","datePublished":"2018-03-06","dateModified":"2018-03-23","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/corie-bogan\/#Person","name":"Corie Bogan","url":"https:\/\/univista.com\/posts\/author\/corie-bogan\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","height":"126","width":"300"},"url":"https:\/\/univista.com\/posts\/the-ping-your-smart-device-just-sold-your-data-to-the-highest-bidder\/","about":["android","internet","malware","planning","safety","Security","The Ping","vulnerability"],"wordCount":490,"articleBody":"ShareTweet                                        Ok, we\u2019re going to get a little conspiracy \/ someone-is-watching-me crazy right now\u2026\u2026\u2026If you have a device with a camera that can access \u2013 or be accessed from \u2013 the Internet, then you may have a physical security problem. Someone may be watching you. Someone may be listening to your sensitive conversations.&nbsp;You\u2019re probably now thinking, \u201cYou\u2019re right, you are going a little crazy!\u201dHow many of your co-workers are walking around with an unsecured Android or iPhone that is listening for voice commands? How many of these devices have been in meetings when you were talking about very sensitive issues?If you\u2019d like to follow us down the path of paranoia, just do a web search for \u201chack android microphone.\u201d\u00a0Ok, so now you\u2019re paranoid too. What\u2019s the next step?The best first step to get a grip on employee-owned devices that are on your network is to create a BYOD (Bring Your Own Device) Policy. A BYOD policy dictates what an employee should and shouldn\u2019t do with their personal device when it interacts with your business\u2019 systems. It also can dictate how this device should be secured when at your business. For details on what makes a good BYOD policy, check out \u2013 The Ping: BYODCreate a network for all your sensitive data &amp; systems and closely control what gets plugged into it. Any device on this network needs to be monitored and carefully maintained to guarantee maximum security.Create a 2nd network for guest traffic and untrusted devices. This is where your customers and employees can connect their devices safely without sacrificing security. This is also where you\u2019d connect Internet-aware devices like smart appliances, thermostats, lighting systems, etc.\u00a0So you\u2019ve done all these things. Is there anything else to worry about?Of course there is!Physical access control &amp; camera \/ DVR security systems: If you can access the login for your security system through your network then this system can be hacked. Here are three important things to check for to keep your security systems secure:Change the passwords for all users frequently.Don\u2019t allow access to these devices through the Internet.If you do need access to these devices remotely, put multiple safeguards in place like two-factor authentication and SSL.Keep these devices updated.New devices: There are new, Internet-aware devices appearing every day: watches, displays, coffee makers, you name it. Evaluate each and every device before bringing it into your business.&nbsp;Now you\u2019re probably thinking, \u201cI should have never read this.\u201d I know it sounds like too much to worry about. You\u2019re not alone on this journey. We\u2019re here to help. Give us a call at 512-832-6209 and we can work this all out for you.&nbsp;Once you\u2019ve de-stressed a little, also check out our tips to keep you safe online: https:\/\/univista.com\/posts\/8-ways-fight-cyber-insecurities\/&nbsp;ShareTweet                                        "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Posts","item":"https:\/\/univista.com\/posts\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"The Ping: Your Smart Device Just Sold Your Data to the Highest Bidder","item":"https:\/\/univista.com\/posts\/the-ping-your-smart-device-just-sold-your-data-to-the-highest-bidder\/#breadcrumbitem"}]}]