Podcast Summary: Digital Social Hour | Episode #874: The Hidden Danger of Deleting Apps: Your Data Stays
Host: Sean Kelly
Guest: Caitlin Sarian
Release Date: November 10, 2024
In the latest episode of Digital Social Hour, host Sean Kelly delves into the pervasive issue of data privacy with cybersecurity expert Caitlin Sarian. The discussion uncovers the hidden dangers lurking behind commonly used apps and provides listeners with actionable strategies to safeguard their personal information in the digital age.
1. Data Doesn't Disappear When You Delete an App (00:30)
Caitlin Sarian kicks off the conversation by addressing a prevalent misconception: deleting an app does not erase the userβs data. She explains:
"A lot of people think that they delete those accounts when they delete the app, but they don't. So unless you, like, request to delete your account from them, like, you actively email them or you put in a request, you... It's still sitting there on their servers."
β Caitlin Sarian [00:30]
This revelation underscores the importance of taking additional steps beyond merely uninstalling apps to ensure personal data is fully removed from company servers.
2. The Rising Importance of Cybersecurity for Families (01:08)
Sean and Caitlin discuss the heightened need for cybersecurity awareness, especially among parents:
"All these weird cases coming up. Kids are just freely getting iPads and iPhones in first grade now..."
β Sean Kelly [01:08]
Caitlin concurs, highlighting that children are exposed to advanced technology at increasingly younger ages without adequate guidance on safe usage.
3. Building Strong Passwords and Regular Software Updates (01:33)
Caitlin emphasizes foundational cybersecurity practices:
"You want to create, like, strong passwords... Once that password is leaked, there are a lot of ways for hackers to just use that password and try a bajillion different ways and get into all your different accounts."
β Caitlin Sarian [01:33]
She also advocates for regular software updates, addressing misconceptions about their necessity and clarifying their role in patching vulnerabilities.
4. The Risks of Open Wi-Fi and the Use of VPNs (02:36)
The conversation shifts to the dangers of using unsecured Wi-Fi networks:
"If there's not a password and you're like connected to a Starbucks and you're on banking apps, strongly suggest you do not do that."
β Caitlin Sarian [02:36]
Caitlin recommends employing Virtual Private Networks (VPNs) to encrypt data, thereby protecting users on public networks.
5. Misconceptions About Incognito Mode (03:25)
Sean inquires about the safety of using Incognito Mode, to which Caitlin responds:
"Incognito mode's mostly for yourself. It's not for other websites. They're still kind of collecting general information on you."
β Caitlin Sarian [03:25]
She clarifies that while Incognito Mode prevents the browser from storing history, it does not shield users from data collection by external websites.
6. The Pervasiveness of Data Brokers (04:29)
Caitlin delves into the extensive data collection practices of brokers:
"Data brokers in the US specifically have so much information... Theyβre collecting it from the DMV... All of that information gets sold to these data brokers and then the data brokers compile it and they can give you pretty much everything."
β Caitlin Sarian [04:29]
She highlights the extensive sources from which data brokers gather personal information, often without explicit user consent.
7. Protecting Yourself from Data Brokers (05:16)
The discussion turns to methods for removing personal data from brokers:
"Google actually now has like a free way of doing it, but it's only if personal information comes up on Google searches. I'm actually working on developing my own program that helps delete your data off of data brokers constantly."
β Caitlin Sarian [05:16]
Caitlin shares her initiative to create a service that continuously removes users' data from brokers, addressing the ongoing nature of data accumulation.
8. The Dark Web and Data Leaks (06:02)
Sean shares personal experiences with data breaches, prompting Caitlin to discuss the ease of accessing the dark web:
"It's all my social got leaked there. I get emails every week about data breaches..."
β Sean Kelly [06:02]
Caitlin explains how easily accessible the dark web is for obtaining stolen data, stressing the importance of proactive measures to protect personal information.
9. Scam Awareness During COVID (06:13)
The conversation shifts to the surge in scams during the COVID-19 pandemic:
"There was a lot of scams during the PPE days. I ran into it..."
β Sean Kelly [07:04]
Caitlin recounts a personal incident where a trusted friend was involved in a scam, illustrating the sophisticated tactics scammers employ.
10. Multi-Factor Authentication and SIM Swapping (07:44)
Caitlin elaborates on advanced security measures:
"Using multi-factor authentication... it's actually better to have an authenticator app because a lot of people can get into emails and a lot of people now can get into people's phones."
β Caitlin Sarian [07:44]
She warns against relying solely on SMS-based verification due to vulnerabilities like SIM swapping and advocates for authenticator apps as a more secure alternative.
11. Risks Associated with Phone Numbers (08:44)
The discussion highlights the dangers of sharing phone numbers:
"You can reverse like phone look up someone and then from there all you get their first and last name and you can just go to any of the data brokers and like find this person and exactly where they live."
β Caitlin Sarian [08:44]
Caitlin advises limiting the distribution of personal phone numbers to reduce the risk of targeted attacks and privacy breaches.
12. Vulnerabilities in Home Security Systems (10:35)
Caitlin warns about the cybersecurity risks inherent in modern home security systems:
"Home security systems are connected to your Wi-Fi... people can tap in. There's literally a website where you can tap into any... home cameras."
β Caitlin Sarian [10:35]
She recommends securing home networks and being cautious about the placement and accessibility of security cameras to prevent unauthorized access.
13. Detecting and Responding to Account Hacks (16:45)
Caitlin provides insights into identifying compromised accounts:
"For Instagram, you can see if, like, you can usually see who's logged in and where it's logged in and if there's like a weird location, like, that's obviously someone on there."
β Caitlin Sarian [16:45]
She advises regularly monitoring account activity and disconnecting unfamiliar devices or sessions to maintain account integrity.
14. The CrowdStrike Outage and Its Implications (19:59)
Caitlin discusses a recent major cybersecurity incident involving CrowdStrike:
"This new thing that they pushed out... somehow crashed the Microsoft system... It's obviously total speculation, but I think CrowdStrike took majority of the blame."
β Caitlin Sarian [20:02]
She analyzes the incidentβs impact on global systems, emphasizing the fragility of interconnected tech infrastructures.
15. The Ongoing Cyber Warfare Landscape (27:00)
Sean and Caitlin explore the hidden battles of cyber warfare:
"Cyber warfare has been around forever... we're already, in my opinion, already in a war with cyber warfare."
β Caitlin Sarian [27:00]
Caitlin sheds light on the covert nature of cyber conflicts between nations, highlighting the continuous and often invisible battles fought in the digital realm.
16. Scam Prevention Tips: The SCAM Acronym (31:20)
Concluding the episode, Caitlin introduces a mnemonic to help listeners identify and avoid scams:
"S stands for take a step back. C is to confirm the contact. A is to avoid clicking on any links. M is does this make sense?"
β Caitlin Sarian [31:20]
She breaks down each component of the acronym, providing practical steps to evaluate the legitimacy of suspicious messages and prevent falling victim to fraudulent schemes.
Key Takeaways:
-
Data Persistence: Deleting apps does not erase user data from company servers. Active requests are necessary for complete deletion.
-
Cybersecurity for Families: Early exposure to technology among children necessitates robust cybersecurity education for parents.
-
Strong Passwords & Updates: Implementing complex passwords and ensuring regular software updates are fundamental to safeguarding personal information.
-
Public Wi-Fi Risks: Utilizing secure, password-protected networks and VPNs can mitigate the dangers of open Wi-Fi connections.
-
Understanding Incognito Mode: While useful for local privacy, Incognito Mode does not prevent websites from tracking user data.
-
Data Brokers: Personal information is extensively collected and sold by data brokers, necessitating proactive removal strategies.
-
Scam Awareness: The rise of sophisticated scams, especially during crises like the COVID-19 pandemic, underscores the need for heightened vigilance.
-
Advanced Security Measures: Multi-factor authentication and cautious sharing of phone numbers are critical in preventing unauthorized access.
-
Home Security: Securing home networks and monitoring security cameras can prevent cyber intrusions.
-
Cyber Warfare: The hidden nature of cyber warfare highlights the ongoing digital conflicts that impact global security.
-
Scam Prevention: The SCAM acronym provides a straightforward framework for identifying and avoiding scams.
This episode serves as an essential guide for listeners seeking to enhance their cybersecurity practices and understand the intricate landscape of digital privacy and protection.