item’s security features can be critical in mitigating risk. Ultimately,
you may decide that an internet-connected thermostat or fire
detector isn’t worth the hassle.
Second, once you’ve decided which devices are worth keeping
around, take stock of the potential threats against your privacy and
security. You may not be completely aware of the devices that create,
save, and communicate sensitive information about you. Even though
many people click the “I agree” button, most are not fully aware of
what their consent implies or means for the companies that profit
from this kind of mass data sharing. A compromised device can also
be used to execute greater attacks. It should be noted that hackers
don’t discriminate. An internet-connected device is always a target,
regardless of whether it’s a toy, a phone, or a computer.
If one or more devices are spying on you, it’s difficult to pinpoint
who or what is doing it. As Sean explained on KARE 11, there
are no individuals at the receiving end, but rather an automated
process comprising advanced algorithms to decipher the data being
sent. Knowing how best to configure the settings on your internet-
connected devices, and being aware of how many devices may pose
security and privacy risks, are two keys to a proactive approach to
minimizing the potential of digital spying.
This article originally appeared in Bench & Bar of Minnesota, the official
publication of the Minnesota State Bar Association. It is reprinted with
permission.
Save the Date
for the
2020
SBAND
Annual
Meeting
June 10-12
Grand Forks
2020
“ It was a dispute that had conflicted
an entire county for years. By the
end of the day, Wick got it settled.”
Doug Gigler - Fargo, ND
Wick Corwin
A uniquely qualified mediator
• Former trial judge and civil litigator
• Over 40 years of experience
• Prepared, persistent and effective
701-541-0965
[email protected]
WINTER 2020
19