Wednesday, April 25, 2018

Do You Know Who Has Seen Your Data Today?

Social networks are all about sharing. But before the news broke about Facebook and Cambridge Analytica, we may not have thought much about the fact that it’s not just friends and family seeing our posts. We now know that what we click on, what we share and what we like is being used by people we don’t consider our friends.

Regardless of the ultimate implications for using Facebook and other social platforms, it’s important that users of social media understand what information they are sharing when they allow access to their social media profiles or log in to other apps using those credentials. While it is very convenient to log in to an app with your Facebook or Twitter profile, this can lead to you sharing more information than you might realize. In most cases it is only your email address and social media profile that is shared, but you could also be unwittingly disclosing the types of posts you like, location data and even information about your friends on the social media platform. As we’re seeing in the Cambridge Analytica story, this data can be used to present you with information that is designed to influence your opinion on a wide range of issues.

If you use social media platforms, you won’t be able to stop third parties from getting their hands on your data. But there are ways you can limit the amount of data that can be mined from those accounts.


Review your connected apps section of Facebook settings to see which apps are accessing your social media profile. Click on “Settings” and then “Apps and Websites”. Check the “Active” and “Expired” sections and remove the apps you know longer want to share your data with.  


On Twitter, click on your profile and then go into “Accounts and Privacy”, then click on the “Apps” tab. Review the permissions for each app and determine if you’re comfortable with the data you are sharing. 

Some other things you might want to consider:

  • Weigh whether the convenience of your login experience is more important than the information you’ll be sharing with the creator of an application.
  • Consider what you’re sharing online before you do it. As fun as it is for all of your Facebook friends to wish you a happy birthday, remember that date of birth is a method of authentication when you need access to something, such as your online bank account.
  • Be wary of taking every quiz and entering every contest that comes your way on social media or other internet websites. Many of these quizzes ask questions that are also used to authenticate you to various websites if you forget your password.
  • Turn off cookies (browsing data) on your browser.
  • Read what information the app will take when you download it!
  • Delete old social media accounts that you no longer use.
  • Install a tracker blocker. These are add-ons you can install within your browser. In some cases they may result in a website not working properly.
  • Install an add blocker. This is another add-on that can be installed on your browser.
  • Take the time to research ways to enhance the privacy settings across your social media accounts.
Using social platforms to connect with friends, family and for professional networking likely won’t go away anytime soon. If you’re going to use these platforms you should expect that the information you include is public, so don’t reveal anything you would not want publicly known. But if you take the time to review your accounts and make sure permissions are set the way you want them, you’ll be going a long way towards controlling your own data and only sharing what you want.

Wednesday, December 27, 2017

Remote Colorado Counties Rally for Broadband Coverage

Today's blog comes from Anthony (Tony) Neal-Graves, the executive director of the Colorado Broadband Office. Tony is responsible for driving the state’s broadband strategy and utilizing public and private sector relationships in communities across the state to support broadband expansion.

Pagosa Springs, Colorado
A wonderful benefit of my job is travelling around the state to work with local communities. Hinsdale and Archuleta counties presented one of those great opportunities. On my way to visit Pagosa Springs and Lake City, I saw some of the most beautiful scenery in the state. On the drive between the towns I passed a sheep farmer in Mineral County, with his five sheep dogs, herding an entire flock down the middle of the road. How many places are you going to get to see sheepherding? Hinsdale County is one of the most remote counties in Colorado and the United States; it is the least densely populated county in Colorado and is mostly (97%) made up of public land.

These remote counties have the same need for broadband access as any other community in the state. The wilderness and national forests attract large populations every year to enjoy the outdoor experience through camping, hunting, and fishing. Each year the expectation to be connected while experiencing nature continues to grow. Access for public safety services in critically important. Finally, these communities want to attract businesses and robust, high-speed, internet access is a must-have.

Pagosa Springs and Archuleta County are partnering with southern Hinsdale County to develop a strategic plan for ubiquitous broadband within the region. Archuleta County also participates in the Southwest Colorado Access Network (SCAN) project, a regional broadband plan for the Southwest Colorado Council of Governments (SWCCOG). Hinsdale County is active in Region 10 and the planning/development efforts led by that organization. Hinsdale needs to hold a SB152 election in order to be able to move from planning to execution for the county.

Bringing high-speed broadband to this region will enhance the tourist experience of this picturesque area of the state. More importantly, it will be a catalyst for sustainable economic development.

Tuesday, December 12, 2017

Northwest Colorado is Getting Across the Divide

Today's blog comes from Anthony (Tony) Neal-Graves, the executive director of the Colorado Broadband Office. Tony is responsible for driving the state’s broadband strategy and utilizing public and private sector relationships in communities across the state to support broadband expansion.

I took a four day, whirl-wind tour of the northwest corner of the state hosted by the Northwest Colorado Council of Governments (NWCCOG). I visited 9 counties and 5 towns meeting with the local leadership to gain insight and provide support to the planning and projects they have underway to solve rural broadband access. Each municipality and county is at a different point on the continuum of broadband development but what is common among all is the passion and focus to bring high quality, affordable broadband to the citizens in their community. It is viewed as key to being able to participate in the state, national, and global economy in this century.

While every meeting was invaluable in providing insight to the solutions that are required in each community, two stops stood out in my mind as unique: Meeker in Rio Blanco county and Red Cliff in Eagle county. By now most are aware of the success of the public-private partnership in Rio Blanco County led by Blake Mobley, IT Director. Through a combination of fiber and fixed wireless, the county will provide broadband performance that would challenge the services in any place in the US. More significantly, the county has built the infrastructure with forethought to be prepared for future needs of the community.

Red Cliff, a former mining community in Eagle County with a population of 390, has endured years of no internet service beyond a single T-1 line at 1.5Mbps; in other words, no internet. This fall, the entire community will have access to high quality internet for the first time as result of a public-private partnership. Mayor Anuschka Bales has been a leader in driving the project and we all look forward to celebrating Red Cliff jumping across the digital divide!

These two projects were made possible through the collaboration between local governments, the Department of Local Affairs, the Department of Regulatory Agencies, and the private sector. It is proof of what partnerships can achieve.

Friday, October 20, 2017

Seven Ways to Make Sure Your Stuff is Safe in the Cloud

Whether you know it or not, chances are you are storing at least some of your data in a cloud-based service. Cloud services make accessing and backing up your data a breeze (pun intended). For instance, if you dropped your phone in a river while hiking, the cloud has likely already saved all of your photos, contacts and crucial data.

Not only can your life be backed up, but you might even have information about others. The days of posting on Facebook to ask your friends to send a text to your new number so you can save theirs is a thing of the past, given most people have their phone number linked to their social media. The adoption of cloud services by consumers has exploded in the last couple of years, to the point that as of February 2016, 782 million people are using Apple’s iCloud (Apple Insider, 2016).

However, where there is convenience there is also opportunity. It is so easy for you to access your personal data that, well, it is very easy for someone else to access your personal data. Needless to say, extra precautions do need to be taken when storing your personal data in the cloud. This is because when your photos, videos, music and personal data are backed up to ‘the cloud’, they are not really being backed up in a specific place. With data centers opening, migrating, closing, and data being stored in multiple data centers for redundancy, where is your personal data really? Vic Winkler of Dublin Business Wire explains, “Data may not remain in the same system, the same data center, or within the cloud provider’s systems. Conceivably, data may even be stored in another country, incurring considerable concern” (2011). If your data could be anywhere, you should probably do your part to protect it, right? Below are some suggestions to help you in this noble quest.

1. Strong Passwords

You might be surprised to know that software exists that can correctly guess your password in a matter of hours, maybe minutes. This is known as a brute force attack, and as non-threatening and friendly as it sounds, is pretty scary stuff. This software comes in licensed and open-source (free) forms and is usually used for security testing by companies, but it can also be used for personal gain. You have more than likely heard about the 2014 celebrity hack which compromised very personal photos. This came about after very weak passwords were exploited by hackers.

Many users create passwords they find easy to remember, but in turn are easy to crack given all it takes is for a hacker to gain a small amount of information about the user. A very common and vulnerable password is one containing the name of a user’s pet, which can be easily attained through social media.

2. Two-factor Authentication

Two-factor authentication is available for many of the accounts you have, including cloud accounts. This heightened level of authentication adds an extra layer of security to your login credentials. When you or anyone tries to log into your account with the password, you will be notified by text, email or, depending on the cloud service, in-app notification. You will then have the option to approve or deny the connection, according to the location and device data provided by this notification in regards to the client signing in. Two-factor authentication gets two thumbs up from us!

Here is a website where you can search for which of your accounts offer two-factor, and how to enable it.

3. Don’t keep work files in your personal cloud accounts

Keeping work information in your personal cloud accounts is just asking for trouble. Nobody wants to be the person who is responsible for a breach at their company. For example, the breach of customer information that occurred when a Dropbox employee’s Dropbox account was compromised in 2012. This employee had a document saved in this cloud-based service which was storing a large amount of Dropbox customers’ email addresses, and later on ended up saved in the hard drive of a hacker’s computer, before hitting the public realm. Do yourself and your career a favor and do not store anything work-related, especially sensitive information in your personal cloud accounts.

4. Don’t use the same password for all of your accounts

You would not use the same key to lock your home, car and other property, so it is definitely not a good idea to use the same password for multiple accounts. Often, bad actors will attempt to crack your password on a less valuable account and then use that password on higher value targets, like your online banking or social media accounts.

It is not always easy to remember multiple passwords for all of your accounts, and that is why password applications like LastPass exist. These applications not only save your passwords with the added security of two-factor authentication, but they also offer a password generator that makes securing and re-securing accounts a very standard process.

If applications are not your thing, another helpful practice is to use a sequence that makes sense to you for your passwords:

  • You pick one number and one special character (like *2).
  • Then you use that combination at the front and end of your password *2xxx*2.
  • You can use a sentence that describes the account you use, but only using the first letter of each word.

Example: For an Amazon account, you could use ‘Love to shop at Amazon’ as the phrase + your number/special character combination, so the password would be *2Lts@A*2.

5. Make sure your cloud provider uses encryption on your data

Whether you are using a service like iCloud or another application, make sure that the provider encrypts your data. For example, our Google platform encrypts data by default, with no additional action required from you. Apple’s iCloud uses a minimum of 128-bit encryption (an industry standard) and SSL (Secure Socket Layer) on your backed-up data. Not only does this sound highly technical and fancy, but it ensures that your data can only be utilized by you.

There are also apps that use a high level of encryption on data that you can store your stuff in.

We love encryption and so should you, so here is a more in-depth look at it:

6. Consider whether you want your data to automatically upload to the cloud

If you have data that you would not want anyone else to see, you might want to disable automatic cloud back-ups. This way, you can make sure the data in your cloud is only what you feel comfortable storing there. This practice also ensures that if your cloud account has a size limit, you will not be uploading content that is not valuable.

7. Use additional backup methods

It is definitely a good idea to backup your data in more places than just in the cloud. If your cloud account was compromised, and you had it backed up to an external hard drive for instance, you would be just fine.

Another alternative is a network-assisted drive (NAS), it behaves like an external hard drive, and all devices in your secure network can back-up to it without the need of a USB connection. NAS’s also tend to double as a media server where content can be viewed by all authorized devices in your network.