IT Spotlight: In Conversation with Teresa Banks

Jan. 25, 2023

A conversation with the Manager for Information Security & Compliance Programs in the Information Security Office about securing yourself online, your smart appliances, and good privacy habits

Image
Teresa Banks

 

Data Privacy Day, an international effort to create awareness about the importance of respecting privacy, safeguarding data, and enabling trust, is coming up on Saturday, January 28. Getting yourself secure and private online, at work, and at home is no easy task. We sat down to talk with Teresa Banks, Manager for Information Security and Compliance Programs in the Information Security Office (ISO), to talk about the importance of these issues and how to safeguard yourself and your devices.

• • •

IT Spotlight: The growth and ubiquity of social media over the past decade has led to a lot of challenges when it comes to personal privacy, whether it be what you share, what content you’re looking at, or which of these platforms are selling your data to third parties. There’s certainly a lot of information about us floating around that can be used to sell us something or used against us.

Banks: There is! You can see how it happens, because you go to search for something online and suddenly you see targeted ads that come up in your feed or on your browser. With any kind of social media, it’s important to check your privacy settings on a regular basis. I always opt out of everything, and yet, I will still find a new setting that surprises me because of new functionality brought into the platform. I’m not saying that companies are trying to be nefarious—maybe they are—but the truth is, we are responsible for what we share online. There’s always a possibility that we’ve been opted into something without our knowledge. On Facebook, there are  privacy checkups that you can go through to view your privacy settings. It’s a good thing to do occasionally—I know I do.

Another good thing to do is Ego surf a little. Google yourself and see what you find. If there’s not much beyond your work profile or public facing information you want to share, then you’re going down the right road. If, on the other hand, you find that you’ve been tagged in all kinds of images by friends, then you know you want to shut down tagging on your social media accounts. Basically, if you can’t find a lot, give yourself a pat on the back!

 

IT Spotlight: Social media gets a lot of attention when it comes to data privacy and security. However, the Internet of Things—our connected, smart devices in our home is also a concern as well. When did you first hear about the IoT and how can we protect ourselves at home?

Banks: I remember when I first heard the term, and it had to have been ten years ago! When it was first used, I had to go look it up — I had no idea what it meant. Yet, over time, you start realizing that it has become part of your daily life. The fact that your televisions, car, doorbells, speakers, and smart appliances can be controlled from your phone is a wonderful convenience. However, every smart device adds risk. So, it's a matter of being very mindful when you are connecting anything. Do I really need to be able to control my dishwasher with my phone?

 

IT Spotlight: It's funny that — I'm thinking about the doorbell or security cameras — how something that gives you comfort that your physical location is secure is also a device that is also a security risk itself and vulnerable to hacking.

Banks: Well, they are. They can add a layer of security that can be very comforting. But there is also vulnerability that comes along with these devices. It's a matter of being mindful of ensuring that your wireless connections are secured with encryption and that you patch your routers and modems with security updates as they need to be done. I would compare it changing your batteries in your smoke detectors on Super Bowl Sunday. Schedule some time to make sure everything's updated and patched.

The Internet of Things, social media, how we interact with different applications when we are shopping, searching for instructions, looking up directions, or turning on our lights all have to do with one another, don’t they? It all comes back to privacy. Security is the way you get to privacy. So, it’s a matter of being very intentional in the way you approach your identity and your information online. Consider that for every convenience there will be another vulnerability brought in. You must weigh one against the other.

 

IT Spotlight: What sort of things do you do to keep yourself private and secure? Are there any good habits we can adopt?

Banks: I would recommend checking your privacy settings on a regular basis and going into your location settings on your mobile devices to see if there’s anything opened that shouldn’t be. Also, always make sure that you’re signed up for automatic updates on all your software and devices. Most of the patches we receive when updating our software are combinations of functionality and security.

It’s also important to be thinking about a strong password. I always opt for a passphrase because I can use something that’s memorable. I’m a big fan of having something that makes me laugh or smile—those are easy for me to remember.

We learned good habits early on in our lives, such as putting on your seatbelt and looking both ways when we cross the street. It’s the same kind of thing when we approach technology. You should be putting your brain ahead of the technology, because the truth is, you are smarter than the tech. It’s just a matter of stopping and realizing that while all these things are wonderful conveniences, they’re not a friend. There are many people on the other side that mean you harm. That’s the way I approach it.

If you can approach things that way, such opting out of location services on your personal devices and being thoughtful of sharing, you will be far ahead of the game.

I am so fortunate I've gotten to do this kind of work for almost 15 years now, and I absolutely love it. I am the person who approaches information security from the human side. I think that humans can be our strongest link if we take the time to educate them and show them how to secure themselves. Because, if you're safeguarding yourself and you have good security habits ingrained, you'll be able to secure your information and the University’s information. That's where my focus always is—what can we do to help people not fall for the phish and protect their own devices so that they're not dealing with any future nightmares.

Chat now