New Zealanders will travel more during the summer period and it is more important than ever to use the contact-tracing app to improve our chances of controlling any potential outbreaks.
Universities hold valuable information but are large and porous communities, with legacy IT systems often adding to the risks. But following a few basic rules can help counter cyber attacks.
Artificial intelligence insatiable data needs has encouraged the mass collection of personal data, placing privacy at risk. But AI can help solve the very problem it creates.
One bespoke contact tracing device is a bluetooth ‘pen’ device, which can be handed in if diagnosed without relying on smartphones.
Even though passcode options include swipe patterns and long passwords, many users still use easy 4-digit PINs. This is because people are often lulled into a false sense of security when they use fingerprint login.
SHUTTERSTOCK
While the data from a fingerprint is very hard to retrieve, cybercriminals can get around biometric technology in various ways. And having a weak passcode is like giving them a hall pass.
An absolute ban on Huawei might stunt the next technological revolution.
Shutterstock
A recent leakware attack targeting Johannesburg was the second of its kind ever recorded. Hackers demanded A$52,663 worth of bitcoins, in return for not releasing senstivie civilian information.
If only it were as easy as pushing a button.
REDPIXEL.PL/Shutterstock.com
Many sites offer the ability to ‘opt out’ of targeted advertisements, but doing so isn’t easy. Simplifying and standardizing opt-outs would help improve privacy on the web.
Insurance companies collect data from fitness trackers to help improve business decisions.
Shutterstock
While shifting cyber safety education beyond privacy is a step in the right direction, teachers already have to contend with an overcrowded curriculum.
There are several flow-on effects from the recent Facebook hack.
Shutterstock
There is always a tension between usability and security. People want systems to be secure so that their identities aren’t stolen, but they want those same systems to be easily accessible.
Everyone’s using technology – but they’re not all as safe as they could be.
Akhenaton Images/Shutterstock.com
Unless you take action to remove yourself before October 15, the federal government will make a digital copy of your medical record, store it centrally, and give numerous people access to it.
Data breaches are fact of modern life. It’s likely each of us will have our personal information compromised at some point. Here’s how to reduce the risk and limit the damage if and when it occurs.