fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Limiting Location Data Exposure: 8 Best Practices

Limiting Location Data Exposure: 8 Best Practices

limiting location data exposure
Limiting location data exposure can be a huge challenge in a generation that relies heavily on apps and mobile devices with built-in location trackers.

If you’re like me who grew up consuming spy movies, you would have already been familiar with the notion of geolocation trackers in all sorts of digital devices (which both heroes and villains can use to their advantage). On the flip side, you would also have gotten hold of some tips on limiting location data exposure whenever this need arises for our hero.

Action stunts aside, it’s true that the moment you acquire any type of mobile device, you already set yourself up for location exposure. Yes, including that fitness tracker you bought to complement your New Year’s resolution. By design default, all mobile devices share and store device geolocation.

For mobile devices to work, they inherently require cellular networks and providers, and these cellular providers receive real-time location information for a mobile device each time it connects to a network.

This important chunk of information was recently released by the National Security Agency in its Limiting Location Data Exposure Cybersecurity Information Sheet, to guide mobile device users from National Security System (NSS) and Department of Defense (DoD) on how they could reduce risk associated with sharing sensitive data. While this guide is geared more toward those working on high risk missions involving covert operations, ordinary civilians like you and I can still pick up best practices from this guide.

Also Read: How PII Data Works In Businesses and Its Advantages

Before getting there though, here’s a rundown on some other hard truths we need to digest about locations, trackers, and whatnot:

  • Your mobile device provides geolocation data as a service to apps. Also known as location services, this is how your favourite delivery app knows where to deliver your milk tea and your grilled chicken.
  • Think you’re safe when you turn off your cellular service? Think again. Even Wi-Fi and BT can be used to know a user’s location.
  • The risk of getting tracked isn’t limited to mobile devices. Anything that sends and receives wireless signals has location risks pretty much similar to mobile devices. Trust me, you won’t look at a smart refrigerator the same way again.
  • Your apps and social media may collect, aggregate, and transmit information that exposes your location. How else could that Facebook ad on a nearby salon show up on your feed then, reminding you of how badly you need a haircut?
limiting location data exposure
Even if you’re no James Bond, you should still know how to work on limiting location data exposure to your advantage

8 Best Practices on Limiting Location Data Exposure

At Privacy Ninja, we always advocate for best practices on keeping your personal data safe and your cyber security healthy and in check. Hence, we’re also excited to share with you these practices on limiting location data exposure, even if you’re not dealing with any secret mission.

Whenever applicable and depending on your level of comfort and risk, here are 8 actions you can take with regard to location sensitivities as outlined by the NSA:

  1. Not ordering or swiping at the moment? Disable location services settings on the device.
  2. If not needed, disable radios when they are not actively in use.
  3. Apps should be given as few permissions as possible.
  4. Disable advertising permissions to the greatest extent possible.
  5. Turn off settings that allow a lost, stolen, or misplaced device to be tracked.
  6. Hold that convenient Google search! Minimise web-browsing on the device as much as possible, and set browser privacy/permission location settings to not allow location data storage.
  7. Use an anonymising VPN to help obscure location.
  8. No matter how convenient, minimise the amount of data with location information that is stored in the cloud, if possible.

Also Read: CCTV Law Singapore Edition: Know Your Rights and Responsibilities

Let’s admit it, mobile devices are as very much a part of our lives as our churned out data and identities. While we cannot put the brakes on this digital progress, we can limit its access to our personal lives, beginning with limiting location data exposure.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us