Posted by Kalyani M. on Jun 21, 2013
Privacy concerns all web users, from individuals to small businesses and massive enterprises. Hackers don’t discriminate and just about everyone is familiar with at least some degree of security measures against potential third party attacks. But true security online goes much further than changing passwords and trusting websites to guard your information. Depending on your use and needs, the privacy measures you should take will vary. Here at The Privacy Post, we offer our readers updates throughout the week that tackle the latest in privacy issues, security concerns, and cloud solutions for both individuals and enterprises. But we are just a starting point, and those looking to learn even more about protecting their privacy can find a treasure trove of information at some of our favorite cyber security blogs.
At Privacy Revolt! visitors can learn more about civil liberties in the digital domain. From CISPA to California’s Right to Know Act, Privacy Revolt! covers issues on technology and civil liberties, government surveillance, data mining, and data security. Privacy Revolt! is an ongoing project of the non-profit Consumer Federation of California Education Foundation. Another consumer rights blog that tackles issues of technology and privacy is the CDT blog. This public policy blog educates the public on issues and concerns related to a free and open Internet. The mission includes preserving the unique nature of the Internet, enhancing freedom of expression, protecting privacy, and limiting government surveillance. According to their mission statement, “CDT fights for the right of individuals to communicate, publish and access an unprecedented array of information on the Internet. We oppose governmental censorship and other threats to the free flow of information. We believe that technology tools—not government controls—are the best way to allow families and individuals to make choices about the information they receive on the Internet.” Ultimately, these blogs focus on putting power back in the hands of users.
For the latest news and opinions by one of the biggest security experts in the world, check out Bruce Schneier’s blog. As a security technologist Schneier has been described as a “security guru” by The Economist. Schneier has testified as a security expert before the U.S. Congress and has written for publications like Forbes, The New York Times, Wired, and The Washington Post. For those looking for the latest cloud news and market trends, the Cloud Security Alliance’s blog features updates that focus on promoting best security practices for businesses and enterprises of all sizes. Another great blog that highlights the latest cloud developments is InfoWorld’s Cloud Computing blog. This market-focused blog helps consumers make informed decision when choosing cloud services and other commercial web applications.
One of our favorite privacy blogs is the EFF’s Deeplinks. Since 1990, the Electronic Frontier Foundation has championed consumer rights, free speech, and online privacy. With contributions from digital activists, technology experts, and lawyers, Deeplinks has something for anyone interested in privacy law and the latest developments surrounding digital privacy rights. Another great privacy law blog is Proskauer’s Privacy Law. This blog takes a close look at the latest privacy legislation and legal news concerning online privacy for both enterprises and individual users. Past article titles include, “Protecting Privacy or Enabling Fraud? Employee Social Media Password Protection Laws May Clash with FINRA Rules” and “Shine the Light a Little Brighter – Changes Resulting in Increased Customer Access Proposed to California’s “Shine the Light” Act”. And at Abine’s blog, Internet users can learn how to secure their personal information and sensitive data from surveillance, hacking, and data mining. Past post titles at Abine include user-friendly topics like “7 tips to deal with Yahoo’s TOS update that lets them snoop in your emails and chats” and “13 steps to turn on Twitter’s 2-step authentication”.
The Privacy Post & SpiderOak’s Secure Cloud Solutions
At The Privacy Post, we always bring it back to taking ownership of your data and online privacy. One of the best ways to do that is by backing up any sensitive data to a secure cloud service. But choosing the right third party cloud service can be a challenge as many services on the market have security gaps that leave private data vulnerable to third party attacks. One cloud service provider that sets itself apart from the rest of the market is SpiderOak. This private cloud service offers all of the benefits of cloud storage along with 100% data anonymity.
SpiderOak protects sensitive data through two-factor password authentication and 256-bit AES encryption so that files and passwords stay private. Two-factor authentication is just like the process used by some financial services that require a PIN as an extra precaution along with a password in order to log in. With SpiderOak, users that choose to use two-factor authentication must submit a private code through text along with their unique encrypted password. Users store and sync sensitive data with complete privacy, because this cloud service has absolutely “zero-knowledge” of passwords or data. And all plaintext encryption keys are exclusively stored on approved devices (SpiderOak never hosts plaintext data). SpiderOak’s private cloud services are available for individuals and enterprises on Windows, Mac, and Linux platforms, along with Android and iOS mobile devices.