Privacy under threat

Value-based technological advancement

If you are someone who was born in the era of the black and white TV, at least your succeeding generation has had the good fortune of being nurtured in an E-enabled environment with the internet, smartphones, etc at their immediate disposal. This has increased their level of efficiency and productivity.

But the recent flooding of the media with the news titled Cameras Hacked has both disheartened and enlightened all of us at the same time. Disheartened because Hacking, the illicit intrusion into the privacy of homes and offices, seems to have transformed walls of bricks into walls of glasses, as all the activities of the insiders can be seen through hacking of cameras. Enlightened because we have all realized what damage can technology without values cause to your personal life, work-life, and consequently social and economic life.

Privacy is the birthright of each and every individual and all the variety of groups that exist in society. Privacy is also the necessary precondition for ensuring sustainability in the functioning of individuals as they need a substantial degree of psycho-emotional security to stay focused in whatever pursuits they are engaged in.

‘Cameras Hacked’ News: A few samples’:

“A group of hackers claimed to have violated 50000 security cameras in a bid to steal personal information of people.”

“Companies sued over a series of hacked security cameras.”

“Security cameras hacked.”

“Family loses the sense of security after ring camera hacked.”

These are just a few news clips that act as reminders that placing cameras must be done while keeping security concerns in mind. Similar to other electronic devices internet-connected cameras are also vulnerable to hacking.

Causes and Remedies

Poor password management is at the root of all this. Users have a general tendency to stick to the default password that was set up by the manufacturer. This is not very difficult to be reclaimed by a mal intentioned person. A few more tips to prevent one from such privacy encroachments are as follows:

  1. Ensure that all the IoT devices function on the latest updated version. Also, any modification/change in the design is incorporated instantaneously.
  2. In case if one is planning to buy new device care must be taken to choose a vendor of good reputation and proven track record.
  3. Multi-Factor authentication should be used.

Remember: Always Think and Act Right to get The Right’.

Leave a Reply

Your email address will not be published. Required fields are marked *