As technology becomes more powerful yet smaller, fitting in the palm of our hands, it also becomes more integral to both business and personal life. However, this integration comes with security risks, as unencrypted devices or files can enable malware and identity theft if not properly safeguarded with passwords and awareness of privacy and permission settings. The largest security risk comes from willingly sharing too much personal information publicly online ourselves.
Your Digital Life: Security and Privacy in the Modern Age
1. WOULD YOU LEAVE YOUR
HOUSE .
UNLOCKED?
Photo: Natasha McMillan
Flipbook by: Natasha McMillan
2. AS TECHNOLOGY GETS
SMALLER IT BECOMES MORE
POWERFUL
WITH VASTLY INCREASED
Photo: Natasha McMillan
6
STORAGE CAPACITY.
3. CAN FIT IN THE PALM OF OUR
COMPUTERS
Photo: Natasha McMillan
HAND.
4. “WE MAY BE INSTITUTIONALIZING
RUDENESS WITH OUR GADGETS,
BUT INCREASINGLY IT’S A MORE
WAY TO WORK.”PRODUCTIVE
Photo: Hayley McMillan
3
5. WE ARE WITNESSING A
TECHNOLOGY IS BEGINNING TO PLAY AN AMPLE
ROLE IN BUSINESSES AND PERSONAL LIFE.
MERGE.
Photo: Natasha McMillan
Edited: Ken McMillan
6. HAVE PASSWORD PROTECTED
THEIR DEVICES.
BUT ONLY
61%OF USERS
Photo: Natasha McMillan
*
8
* This is a US statistic from 2015
9. BUT IT DOESN’T END WITH PASSWORDS.
NEED TO LEARN SAFEUSERS
COMPUTER-USE PRACTICES,
AND CLOSE THE GAP.
Photo: Hayley McMillan
10. SEEMINGLY HARMLESS FILES SUCH AS .DOC, .XLS, AND EVEN .PPT
CAN BE HARMFUL TO YOUR COMPUTER?
NEVER OPEN A FILE IF YOU
ARE UNSURE OF THE CREATOR.
THE LAW TO FOLLOW:
DID YOU KNOW?
10
Photo: Natasha McMillan
11. MALWARE IS MALICIOUSLY INSTALLED
SOFTWARE WHICH CAN RUN
QUIETLY IN THE BACKGROUND.
ONCE INSTALLED IT
CAN STEAL YOUR
INFORMATION,
WHETHER YOU ARE
CONNECTED - OR NOT.
Photo: Natasha McMillan
13. SOFTWARE CAN PERFORM TASKS SUCH AS,
KEYSTROKE LOGGING
EMAIL SAVING
DOCUMENT DOWNLOADING
AND
INTERNET SEARCH HISTORY SAVING.
2
Photo: Hayley McMillan
15. IT’S THE FINER DETAILS THAT
GET YOU.
APPS, WEBSITES, AND DEVICES ASK FOR
EXTENSIVEPERMISSIONS EVERYDAY.
Photo: Hayley McMillan
16. APPS RECORD YOUR
LOCATIONEVEN WHEN THEY
AREN’T IN USE.
BECAUSE “MARKETERS PAY 10% TO 20%
MORE FOR LOCATION BASED ADS.”
Photo: Hayley McMillan
4
17. DID YOU KNOW?FACEBOOKLOOKS AT YOUR
CONTACT LIST AND MAPS A NETWORK
OF PEOPLE; IN ORDER TO MAKE
REASONABLE GUESSES ABOUT
YOUR FRIENDS.
5
Photo: Natasha McMillan
19. WE WILLINGLY
PERSONAL INFORMATION IN
SHARE OUR
“OUR PERMANENT - AND
PUBLIC - DIGITAL FILES.”
Photo: Hayley McMillan
IN THE WORLD OF TECHNOLOGY,
YOUR BIGGEST THREAT IS YOURSELF.
1
20. Photo: Natasha McMillan
CITATIONS
1. Rosen, Jeffrey. "The Web Means the End of Forgetting." The New York Times. The New York Times, 21 July 2010. Web. 01
June 2016. <http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?pagewanted=all>.
2. Ingram, Mathew. "Snooping on Your Kids: If the NSA's Tools Were Available, I Probably Would Have Used Them." Gigaom.
07 Aug. 2013. Web. 01 June 2016. <https://gigaom.com/2013/08/07/snooping-on-your-kids-if-the-nsas-tools-were-available-
i-probably-would-have-used-them/>
3. Eichler, Leah. "Sorry to Be Rude, but My Smartphone Needs My Attention." The Globe and Mail. The Globe and Mail, 04
Oct. 2013. Web. 02 June 2016. <http://www.theglobeandmail.com.proxy.queensu.ca/report-on-business/careers/career-
advice/life-at-work/sorry-to-be-rude-but-my-phone-needs-me/article14706158/>.
4. Dwoskin, Elizabeth. "Where Were You 3 Minutes Ago? Your Apps Know." The Wall Street Journal. The Wall Street Journal,
23 Mar. 2015. Web. 02 June 2016. <http://blogs.wsj.com/digits/2015/03/23/where-were-you-3-minutes-ago-your-apps-
know/?mod=LS1>.
5. Dewey, Caitlin. "How Facebook Knows Who All Your Friends Are, Even Better than You Do." Washington Post. The
Washington Post, 02 Apr. 2015. Web. 02 June 2016. <https://www.washingtonpost.com/news/the-intersect/wp/2015/04/02/
how-facebook-knows-who-all-your-friends-are-even-better-than-you-do/?wprss=rss_technology>.
6. "Technology Quarterly | After Moore's Law." The Economist. The Economist Newspaper, 12 Mar. 2016. Web. 02 June 2016.
<http://www.economist.com/technology-quarterly/2016-03-12/after-moores-law>.
7. Shwartz, Matthew J. "How USB Sticks Cause Data Breach, Malware Woes." Dark Reading. 08 Aug. 2011. Web. 02 June
2016. <http://www.darkreading.com/risk-management/how-usb-sticks-cause-data-breach-malware-woes/d/d-id/1099437>.
8. McCabe, David. "Survey: More Consumers Password Protecting Their Smartphones." The Hill. 19 Oct. 2015. Web. 02 June
2016. <http://thehill.com/policy/technology/257295-survey-more-consumers-password-protecting-their-smartphones>.
9. CloudTweaks. "Cloud Infographic – Computer Virus Facts And Stats." Cloud Tweaks. 11 Apr. 2014. Web. 02 June 2016.
<http://cloudtweaks.com/2014/04/cloud-infographic-computer-virus-facts-stats/>.
10. Hoffman, Chris. "50 File Extensions That Are Potentially Dangerous on Windows." How To Geek. 12 Feb. 2013. Web. 02
June 2016. <http://www.howtogeek.com/137270/50-file-extensions-that-are-potentially-dangerous-on-windows/>.