CBA Record September-October 2023

likely not worth the risk. Smart devices generally have knock-off versions that are abundantly available on online retailers such as Amazon, so make sure you know what you’re buying and what company you are buying it from; it’s not always as obvious as you might expect. Another option to add some security is to create a separate home Wi-Fi network that you use exclusively for IoT devices and, for example, guests in your home. This prevents the partitioned devices from communicating, which decreases the risk that a hacked device could be used as a gateway to access other devices in the net work, such as your computers or phones. These devices contain the most valuable data, so protecting them by separating them from your IoT devices adds a layer of security to your setup. Likewise, keep ing guests from accessing your main net work means any vulnerabilities on their devices (a variable you’re not able to con trol) are less likely to impact yours. This is a particularly good idea for any lawyers who work from home. Separating sensi tive work information from your home devices as much as possible is a beneficial step to take. All devices carry with them security risk sets, but not all risk sets are equal. Furthermore, individuals weigh pros and cons differently. For example, perhaps you have health issues and find that the data collected, and the feedback provided from your Apple Watch is well worth any risk that comes along with collecting that data digitally, but you draw the line at a smart refrigerator. Everyone’s line will be different, but you need to make sure you know where yours is and that you are well-informed about the risk sets related to all your devices.

LPMT BITS & BYTES BY ANNE HAAG What Do Your Devices Say About You? W e entrust our devices with a remarkable amount of infor mation about our lives. You

phone. Peloton quickly released a security update to fix the issue, but this is a good reminder that IoT devices can be hacked (and of how important it is to install soft ware updates when they become avail able). More recently, other security experts have called attention to vulnerabilities in Peloton’s treadmill that could expose sen sitive user information if hacked. Many smart devices undeniably make our lives easier. A Roomba will vacuum your house, removing one time-consum ing and widely disliked chore from your to-do list. But what else does it do? All robot vacuums have powerful sensors in their hardware, but more advanced models can contain advanced cameras and operate using AI. There have been reports of prototype models taking pic tures of individuals in the bathroom. The company behind the model argued that the individuals had consented to be part of a test group for the prototype and to have data collected, but it still seems a touch invasive for most people’s taste. IoT devices aren’t going anywhere, so how can you make them more secure? First and foremost, read a device’s privacy policy and terms of service before buying it to make sure you’re comfortable with the information being collected and how it is being used. Make sure that customer information is protected by encryption. Enable two-factor authentication, auto matic software updates, and make sure you get a notification when a new user logs in from a new device or IP address. Devices that don’t offer these options are

probably understand how much infor mation a hacker could obtain by gaining access to your computer, phone, Google account, or something as sensitive as a password manager. Protecting these com ponents is essential, and I hope you are taking steps to do so and keep abreast of changes to the security landscape. But what about more insidious internet connected devices? In an era where your refrigerator might be connected to the internet, you need to think about what information is collected by the devices, how you can protect the information they contain, and whether they’re worth the associated risks in the first place. The internet of things (IoT) is the term used to refer to the collection of household devices that are connected to your Wi-Fi network, such as your smart thermostat, digital assistant, smart door bell, home security cameras, etc. The list is long and is continually expanding as companies develop the means of making everyday devices “smart.” A recent warn ing to Peloton users about potential secu rity issues related to the touchscreens on Peloton’s Bike+ model offered a valuable reminder of the potential risk of these devices. In June, cybersecurity company McAfee warned Peloton users of a security vulnerability that left the touchscreens on their bikes at risk of being hacked, allow ing the hacker to potentially spy on riders using the device’s camera and micro

Anne Haag is the CBA’s Law Practice Management Advisor, a certified crisis intervention counselor, and a volunteer with Resilience as a trauma-informed ER advocate for sexual assault survivors.

THE BASICS OF STARTING A SOLO PRACTICE October 11, 2023 | 2:00-3:00 p.m. | 1 IL MCLE Credit | Live Webcast at Learn.Chicagobar.org

38 September/October 2023

Made with FlippingBook flipbook maker