Data protection and privacy in the age of the ‘internet of things’
In a hurry? Tap or click below to listen to this story about security and the internet of things on your drive to work.
(Hey there … You can also subscribe to us on iTunes, listen on Spotify and hear us on Stitcher, Google Play and iHeartRadio, too. Tell a friend!)
What is the ‘internet of things’?
The internet of things, or IoT, refers to our connected world and all the devices, software applications and technology that allow us to stay connected digitally every day. The price we pay for this convenience is our information. Data is the currency of the internet. When you use your Alexa at home to help you prepare meals, open your garage and set your thermostat, you’re “feeding the beast,” says Steven Teppler, an attorney with the law firm Mandelbaum Salsburg.
Teppler talks on this episode of Komando on Demand about the nonconsensual use of people’s information. He points out that just a few years ago, no one cared about data collection. We were willing to pay the price in exchange for the convenience that these online applications, services and websites offered. Today with allegations of data breaches and non-consensual use of people’s information against companies like Facebook and Android have sensitized people about data collection and how it’s being used.
Protect yourself and the IoT
If you run a business or have a website, whether or not you sell anything online, if you get attacked through a data breach or ransomware, cyber insurance will offset some of the costs, Teppler says. He recommends talking to your broker or insurance company about it, and he says it isn’t very expensive.
Your insurance company may require you to adhere to certain standards, though. If you practice what he refers to as “bad computer hygiene,” your insurance company may reject your claim if you’ve been hacked or your data breached. So, if you buy cyber insurance, and you visit Dark Web sites, online casinos or other notoriously nefarious sites, no cyber insurance will cover you if you’re hacked.
Teppler talks about this, IoT security, and cyber law in this episode of Komando on Demand.
How to listen and subscribe on different devices
Don’t forget to subscribe to the podcasts so you never miss an episode. Here’s how to listen and subscribe on different devices:
For iPhone, iPad, or iPod Touch
Listening to the Komando FREE Podcasts on your Apple device is as easy as going to the podcast app.
- Open the Podcasts app on your iPhone, iPad or iPod touch.
- Click on the magnifying glass search icon at the bottom of the screen
- Select Search and type in “Kim Komando”
- Select the podcast from the list of search results.
- Click “subscribe” when “my podcasts” pop up
- Select the podcast you want to listen to and double-click to play
For Android gadgets
Follow these easy steps:
- Install the free Beyond Pod podcast player for your Android here
- Open the app and click on the MENU dots (those are the 3 dots in corner)
- Select Search and type in “Kim Komando”
- Click “subscribe” next to Komando on Demand
- Add to a Category or click + New Category and Label the category “Kim Komando,” then select New Category
- Refresh the page
- Select what episode you want to listen to most and click play
Bonus: Leave me a review and win a great prize!
If you love podcasts, I have a great place where you can get all your favorites in one place. And the best part is: you win a prize! (It’s my undying gratitude.)
The best way to find and listen to Kim’s podcasts is through PodNet.com. It’s an on-demand digital audio network built by podcasters. You’ll find a collection of podcasts that are produced, distributed and available in one place.
You can listen to Kim’s free podcasts and others we know you’ll enjoy. When you’re done, leave an honest review on any of Kim’s podcasts on iTunes and let us know what you think!
Just a couple of minutes of your time can be a huge benefit to you and all of our other subscribers who want to hear informative podcasts they will enjoy.
Tags: Apple, Apple iPhone, cybersecurity, security