Mike Chapple is academic director of Notre Dame’s Master of Science in Business Analytics program and teaching professor of IT, Analytics and Operations where he teaches undergraduate and graduate courses in business analytics and cybersecurity.
Your devices feed AI assistants and harvest personal data even if they’re asleep. Here's how to know what you're sharing.The constant surveillance of modern life could worsen our brain function in ways we don't fully understand, disturbing studies suggest'Foolhardy at best, and deceptive and dangerous at worst': Don't believe the hype — here's why artificial general intelligence isn't what the billionaires tell you it isThreaten an AI chatbot and it will lie, cheat and 'let you die' in an effort to stop you, study warns'Murder prediction' algorithms echo some of Stalin's most horrific policies — governments are treading a very dangerous line in pursuing themAnd yet, people are losing ground on data privacy.
. That's more than triple the notices sent out the year before. It's clear that despite growing efforts, personal data breaches are not only continuing, but accelerating. Your devices feed AI assistants and harvest personal data even if they’re asleep. Here's how to know what you're sharing. The constant surveillance of modern life could worsen our brain function in ways we don't fully understand, disturbing studies suggestWhat can you do about this situation? Many people think of the cybersecurity issue as a technical problem. They're right: Technical controls are an important part of protecting personal information, but they are not enough. As a professor of information technology, analytics and operations at the University of Notre Dame, I study ways to protect personal privacy. Solid personal privacy protection is made up of three pillars: accessible technical controls, public awareness of the need for privacy, and public policies that prioritize personal privacy. Each plays a crucial role in protecting personal privacy. A weakness in any one puts the entire system at risk.Technology is the first line of defense, guarding access to computers that store data and encrypting information as it travels between computers to keep intruders from gaining access. But even the best security tools can fail whenEncryption uses complex math to put sensitive data in an unreadable format that can only be unlocked with the right key. For example, your web browser uses HTTPS encryption to protect your information when you visit a secure webpage. This prevents anyone on your network — or any network between you and the website — from eavesdropping on your communications. Today, Quantum computers will be a dream come true for hackers, risking everything from military secrets to bank information. Can we stop them? But if we're so good at encrypting data on networks, why are we still suffering all of these data breaches? The reality is that encrypting data in transit is only part of the challenge.We also need to protect data wherever it's stored — on phones, laptops and the servers that make up cloud storage. Unfortunately, this is where security often falls short. Encrypting stored data, or data at rest, isn't as widespread as encrypting data that is moving from one place to another.that at least 80% of the information they have stored in the cloud is encrypted, according to a 2024 industry survey. This leaves a huge amount of unencrypted personal information potentially exposed if attackers manage to break in. Without encryption, breaking into a database is like opening an unlocked filing cabinet — everything inside is accessible to the attacker.Multifactor authentication is a security measure that requires you to provide more than one form of verification before accessing sensitive information. This type of authentication is more difficult to crack than a password alone because it requires a combination of different types of information. It often combines something you know, such as a password, with something you have, such as a smartphone app that can generate a verification code or with something that's part of what you are, like a fingerprint. Proper use of multifactor authenticationthat their employees use multifactor authentication, according to another industry survey, this still leaves millions of accounts protected by nothing more than a password. As attackers grow more sophisticated and credential theft remains rampant, closing that 17% gap isn't just a best practice — it's a necessity.Human error played a role in 68% of 2024 data breaches , according to a Verizon report. Organizations can mitigate this risk through employee training, data minimization — meaning collecting only the information necessary for a task, then deleting it when it's no longer needed — and strict access controls. Policies, audits and incident response plans can help organizations prepare for a possible data breach so they can stem the damage, see who is responsible and learn from the experience. It's also important to guard against insider threats and physical intrusion using physical safeguards such as locking down server rooms.Legal protections help hold organizations accountable in keeping data protected and giving people control over their data. The European Union'sis one of the most comprehensive privacy laws in the world. It mandates strong data protection practices and gives people the right to access, correct and delete their personal data. And the General Data Protection Regulation has teeth: In 2023,, but none have made it across the finish line. In its place, a mix of state regulations and industry-specific rules — such as the Health Insurance Portability and Accountability Act'I'd never seen such an audacious attack on anonymity before': Clearview AI and the creepy tech that can identify you with a single pictureThe tools, policies and knowledge to protect personal data exist — but people's and institutions' use of them still falls short. Stronger encryption, more widespread use of multifactor authentication, better training and clearer legal standards could prevent many breaches. It's clear that these tools work. What's needed now is the collective will — and a unified federal mandate — to put those protections in place.that explores who collects your data, what and how they collect, who sells and buys your data, what they all do with it, and what you can do about it.Get the world’s most fascinating discoveries delivered straight to your inbox.Mike Chapple is academic director of Notre Dame’s Master of Science in Business Analytics program and teaching professor of IT, Analytics and Operations where he teaches undergraduate and graduate courses in business analytics and cybersecurity. Prior to joining the Mendoza faculty, Chapple served as Senior Director for IT Service Delivery at the University and Senior Advisor to the Executive Vice President at Notre Dame. Mike also previously served as Executive Vice President and Chief Information Officer of the Brand Institute, a Miami-based marketing consultancy. He spent four years in the information security research group at the National Security Agency and serving as an active duty intelligence officer in the U.S. Air Force.Your devices feed AI assistants and harvest personal data even if they’re asleep. Here's how to know what you're sharing. The constant surveillance of modern life could worsen our brain function in ways we don't fully understand, disturbing studies suggest'Foolhardy at best, and deceptive and dangerous at worst': Don't believe the hype — here's why artificial general intelligence isn't what the billionaires tell you it is Threaten an AI chatbot and it will lie, cheat and 'let you die' in an effort to stop you, study warns 'Murder prediction' algorithms echo some of Stalin's most horrific policies — governments are treading a very dangerous line in pursuing themNew 'microcomb' chip brings us closer to super accurate, fingertip-sized atomic clocks Google's 'moonshot factory' creates new internet with fingernail-sized chip that fires data around the world using light beamsIn disasters like the Texas floods, warning people of danger isn't so simpleRemote cave in Guam reveals ancient voyagers carried rice to Pacific islands 3,500 years ago, study finds Thimerosal carries no health risks and is almost never used anyway. So why are anti-vaxxers obsessed with it?
United States Latest News, United States Headlines
Similar News:You can also read news stories similar to this one that we have collected from other news sources.
Reddit adds analytics and drafts for commentsKarissa is a senior reporter at Engadget, covering Meta, Twitter, TikTok, Snap and all things social media. Her interests include tech policy, internet culture, and all the ways our online activities shape our IRL selves.
Read more »
Pro-Israel hackers destroy $90 million in Iran crypto exchange breach, analytics firm saysIran’s largest crypto exchange, Nobitex, was hacked for over $90 million in what Elliptic says was likely a politically motivated cyberattack.
Read more »
Pro-Israel hackers drain $90 million from Iran crypto exchange, analytics firm saysMacKenzie Sigalos is a technology reporter for CNBC with a focus on cryptocurrency and fintech.
Read more »
Crypto Analytics Service Bubblemaps Integrates With TONTON users and developers gain access to full Bubblemaps V2 feature suite
Read more »
BTC Struggling to Recover; Analytics Firm Flags Bearish Sentiment and Trader ImpatienceBitcoin dipped below $104,000 following a 4% drop, even as analysts say extreme bearish sentiment from retail may hint at a rebound.
Read more »
Analytics Reveal 2 Underutilized Atlanta Falcons Weapons in 2024The Atlanta Falcons are in a good position to take advantage of the strong-armed Michael Penix Jr. at quarterback in 2025.
Read more »
