The digital age has brought with it a host of concerns for parents regarding the privacy of their children in light of the information and activities that is now being shared online. And with good reason:
“An Associated Press-MTV poll finds 3 in 10 teens and young adults have had people get into their Facebook, Twitter, MySpace or other Internet accounts and either impersonate or spy on them. That’s nearly double the level seen in 2009,” the Washington Post reports.
Teens report that 72% of these incidents are for “spying”, while 65% are for “hacking”, and that often these instances are not driven by malicious intent: “It’s meant to be funny,” said Lindenfelzer, a junior at Ithaca College in New York.
The new digital generation is, in other words, coming of age with the access to social networks and online presence with all the wisdom and experience of teenagers. Until the boundaries are tested and learned, it is adolescent nature to treat the parameters of online privacy with the carelessness of youth–some of the subjects interviewed for the story report both breaching another’s online account in addition to having been hacked.
It’s a life lesson to have one’s privacy be violated- only then could one know the true value of encryption and security. Children and teenagers are often unfortunately ill-equipped to regulate and manage their own privacy and couldn’t possibly be trusted to do so all the time- this is why parental controls are invented in media sources and TV channels.
Providing your child with the bullet proof protection of military-grade encryption is one way to not only keep them safe from the outer world of malicious hackers, but also from other teens and young adults. At the very least it removes them from being a sitting duck target for exploitation.
Many of the people who have relied upon BlackBerry’s Password Manager function found themselves in dire straits these past few days during the failure of service to 70 million of its users. Of the many problems and snafus that this created, the most critical one was the inability of BlackBerry users to connect to the internet.
Those who rely on the Password Manager function to store and keep passwords and login information experienced the problem of not being able to connect that data to the users most important websites. We hear from users who use the program for the most critical of functions (otherwise, why bother to store and encrypt it?) and we assume that it must be the same for users of BlackBerry’s Password Manager.
This service failure makes a case for the importance of cloud storage, in addition to highlighting the essential limitations of mobile devices in general. If lost, stolen or out of commission due to service problems, the programs storing your important information have no way to help you work on a different device.
We foresaw this scenario when we developed Keeper Backup. By storing your data in the cloud, you will always have unrestricted access to your files at any time, in any place. All of the information that enter into Keeper is encrypted from the moment that you input it. This encryption is based on the secret password that you choose, ensuring the safety of your information when you do store it in the cloud.
This way, life can continue seamlessly even if you lose your mobile device or service to it.
Regular followers of Callpod’s blog know that this has been an extraordinary year in mobile device security. Breaches of security are occurring at rates that only continue to accelerate. Hacking is taking place for all kinds of reasons as our lives become increasingly enmeshed in technology, targeting everyone from workers to regular consumers accustomed to shopping through online merchants and banking through the internet, to leaders of corporations and governments.
One thing that we can all admit after experiencing a year in which reports of mobile device security breaches have amplified is that there is a now a greater need than ever for protection from hackers. Most people now fall into the category of having something to protect- from contact lists, photos and files to passwords and login information, the value of the information that we carry is inestimable. Software developers are beginning to scramble to in response to the need to keep up with the new demand for protection from malicious users. Canalys recently reported that “investment in mobile security will increase 44% annually through 2015“.
Our product, Keeper Password and Data Vault™ provides a simple solution to the anxiety that can be felt over the perceived lack of control that you as a consumer may feel over the data and personal resources that are stored in your mobile device.
Keeper encrypts your data with military grade encryption that has met the criteria of approval for security software by the U.S. Department of Homeland Security. In the context of our software, this encryption is egalitarian and unbiased- our software has no agenda other than to protect anyone who uses it. No one can crack the code to the encryption of the files stored on your device because it is based on the password that you choose.
It has become clear that privacy in a highly technological information society is a relative term, as the most sensitive details of an individual’s life are networked and accessible online. The only true solution to alleviating the uncertainty and unease of this is to create a realm of security—a virtual vault—that encrypts the most important data that you possess.
This is how Keeper was designed. Our software has been downloaded over 5 million times and usage is only increasing in response to the obvious threat that is posed by hackers.
“No one wants to die. Even people who want to go to heaven don’t want to die to get there. And yet death is the destination we all share. No one has ever escaped it. And that is as it should be, because Death is very likely the single best invention of Life. It is Life’s change agent. It clears out the old to make way for the new. Right now the new is you, but someday not too long from now, you will gradually become the old and be cleared away. Sorry to be so dramatic, but it is quite true.
“Your time is limited, so don’t waste it living someone else’s life. Don’t be trapped by dogma — which is living with the results of other people’s thinking. Don’t let the noise of others’ opinions drown out your own inner voice. And most important, have the courage to follow your heart and intuition. They somehow already know what you truly want to become. Everything else is secondary.”
Steve Jobs’s Best Quotes
Callpod has been watching the news recently with a high degree of interest, as a recent wave of cyber attacks ensued upon the sensitive data stored online by members of Wall Street and those affiliated with the establishment against which the “Occupy Wall Street” movements has been been protesting. Earlier this week we shared the story of Goldman Sach CEO and Chairman Lloyd Blankfein’s data hacking, as well as Deputy Inspector Anthony Bologna’s exposure by hacker collective Anonymous.
JP Morgan Chase CEO Jamie Dimon is the latest target of online activists, CNBC reports. “A document containing Dimon’s addresses, family members, political donations and other personal information were posted on the website Pastebin by hackers going under the name of “CabinCr3w.”
We recently reported on a data leak by hackers on Goldman Sachs CEO and Chairman, Lloyd Blankfein earlier this week. Since then, news reports have been developing regarding the connection of online activism and protests against Wall Street and the financial system.
“Members of the Anonymous collective are not just taking their activism to the Internet and the streets; they’re now targeting corporate financials with a securities research arm,” according to CNET, who displayed a type of logo for Anonymous, describing the organization as “Acquiring information through unconventional means”.
The unconventional means that are being described here have to do with the power that hackers have to infiltrate any computer or device that is connected to a network. In support of the hacker group Anonymous’s “anti-corporate, anti-censorship, pro-civil liberties messages” connected to the “Occupy Wall Street” movement, hackers have been using their skills for social activism.
Hackers found the personal information of Deputy Inspector Anthony Bologna and posted it online, after the officer was accused of spraying protesters with pepper spray in a video widely circulated on the internet. According to the NY Post, “the hackers collective known as Anonymous put out the name and personal details of a high-ranking cop who pepper-sprayed penned-in Wall St. protesters over the weekend”.
Efforts by the hacking collective appear to be focused around the strategy of releasing the sensitive personal information of its targets.
The eminent need for mobile device protection continues to grow. As we’ve pointed out several times in the recent past, we’ve entered a time in history in which mobile device security cannot be disregarded. Confidential company data that is analyzed and processed through devices that are susceptible to loss or theft holds immeasurable value. It’s not just competing companies that would like to access industry secrets held within your laptop, tablet or mobile phone, but state-supported hacking organizations and foreign cybercriminal rings that might find you and your information interesting if it were worth it to them.
Lloyd Blankfein, CEO and Chairman of Goldman Sachs found himself to be the victim of cybercriminal efforts recently, according to CNET.
Hackers released the personal information of Blankfein, “including the CEO’s age, recent addresses, details of litigation he has been involved in, as well as registration information for businesses, but no sensitive information such as financial data”.
We emphasize the fact that your Keeper account is encrypted from the moment that your enter data into the program, according the the key that is established when you create your Master Password. This way only you hold the key to your data secured in the Cloud Security Vault™.
“By encrypting data themselves, using software with no backdoor, sites can assure themselves of privacy. The cloud provider, government officials, and hackers cannot get at the data in usable form.” Andrew Binstock, Dr Dobb’s
We saw a video on the mobile security standards that are being developed by the National Institutes of Standards of Technology (NIST). Our mobile security software, Keeper® Password and Data Vault stays one step ahead of the standard and leads the way by having addressed the major issues that this government agency is just beginning to identifying as the most important elements of mobile security software in its key features.
Keeper Enterprise allows the administrative control of the content and data on an employee’s mobile device, meaning that access to the encrypted data stored and managed within Keeper can be remotely wiped when it is decided that the information needs to be restricted.
In addition to this infinitely valuable function for enterprise users is the flexibility of Keeper. Our developers work steadily throughout the year to not only improve the software, but to also make sure that it can be used by as many people as possible. Available in the widest platform base of any mobile security software, Keeper provides the benefit of a standard of mobile security that does not require regulating an organization to use the same mobile device.
Our application works consistently with 99% of the mobile devices and operating systems on the market, meaning that a company would not have to restrict mobile device usage but could allow their employees to use Keeper on whatever is available—while still retaining control of what is stored within it. This addresses the concern expressed within the aforementioned video regarding the statement that the “many and evolving platforms are a moving target for standards and practices”— Keeper itself evolves quickly and constantly so that you are always protected on all fronts.