{"id":2783,"date":"2018-09-13T10:00:56","date_gmt":"2018-09-13T09:00:56","guid":{"rendered":"https:\/\/www.alvantia.com\/?p=2783"},"modified":"2018-10-22T15:52:53","modified_gmt":"2018-10-22T14:52:53","slug":"data-protection-age-big-data","status":"publish","type":"post","link":"https:\/\/www.alvantia.com\/en\/data-protection-age-big-data\/","title":{"rendered":"Data protection in the age of Big Data: an important discussion"},"content":{"rendered":"\n<p class=\"has-regular-font-size\">In March 2018, an investigation by The Guardian and The New York Times revealed one of the most serious technological scandals of the decade: consultancy firm Cambridge Analytica had illegally obtained the personal data of up to 87 million users through Facebook. The data leak originated from an application called \u201cThis is your digital life\u201d, a seemingly harmless online personality test which the consultancy firm used to search for and establish socio-political profiles thanks to Big Data, therefore predicting and influencing election results.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p class=\"has-regular-font-size\">This scandal,\nwhich culminated in the closure of <strong>Cambridge\nAnalytica<\/strong> and the appearance of Mark Zuckerberg before the European\nParliament, thrust the importance of data protection into the spotlight in the\nage of Big Data and social networks. Although it was one of the most\nhigh-profile cases, it was not the first confidential data leak, nor the\nlargest in recent times.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"706\" height=\"710\" src=\"https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/10\/grafica-ciberseguridad-EN.jpg\" alt=\"data-protection\" class=\"wp-image-2784\" srcset=\"https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/10\/grafica-ciberseguridad-EN.jpg 706w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/10\/grafica-ciberseguridad-EN-150x150.jpg 150w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/10\/grafica-ciberseguridad-EN-298x300.jpg 298w\" sizes=\"auto, (max-width: 706px) 100vw, 706px\" \/><\/figure>\n\n\n\n<p class=\"has-regular-font-size\">As the graphic reveals, the largest leak in the last\ndecade came from Yahoo, and in the majority of cases users are not aware that\nthey have been affected because few companies inform their users when this\noccurs. How can we find out if we have been hacked? We have various online\ntools that enable us to check if we have been affected.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Tools against data leaks<\/strong><strong><\/strong><\/h1>\n\n\n\n<p class=\"has-regular-font-size\"><strong>Facebook<\/strong> has been\ninforming its clients affected by the Cambridge Analytica leak, but if we want\nto be completely sure that our data has not been revealed we need to verify\nthat from our own profile on the <a href=\"https:\/\/www.facebook.com\/help\/1873665312923476?helpref=search&amp;sr=1&amp;query=cambridge\">Facebook\nhelp page<\/a>. In this test, the red box reveals that neither the\nuser nor their friends logged in to the \u201cThis is your digital life\u201d\napplication, and therefore, no data was shared with Cambridge Analytica.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"479\" src=\"https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber1.png\" alt=\"\" class=\"wp-image-2727\" srcset=\"https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber1.png 1080w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber1-300x133.png 300w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber1-768x341.png 768w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber1-1024x454.png 1024w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber1-750x333.png 750w\" sizes=\"auto, (max-width: 1080px) 100vw, 1080px\" \/><\/figure>\n\n\n\n<p class=\"has-regular-font-size\">The website <a href=\"https:\/\/haveibeenpwned.com\/\">Have I Been Pwned?<\/a>, created by\nMicrosoft cybersecurity specialist <strong>Troy\nHunt<\/strong>, shows if your email has been exposed to cybersecurity violations. The\nwebsite has registered around 4 million affected accounts and is very popular\namong information security specialists. In this case, the email address we\nentered has been affected. As we can see, the tool even tells us when and\nthrough what platform the leak occurred. <strong><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1007\" height=\"437\" src=\"https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-2.png\" alt=\"\" class=\"wp-image-2728\" srcset=\"https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-2.png 1007w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-2-300x130.png 300w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-2-768x333.png 768w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-2-750x325.png 750w\" sizes=\"auto, (max-width: 1007px) 100vw, 1007px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"774\" height=\"579\" src=\"https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-3.png\" alt=\"\" class=\"wp-image-2729\" srcset=\"https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-3.png 774w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-3-300x224.png 300w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-3-768x575.png 768w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-3-750x561.png 750w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-3-160x120.png 160w\" sizes=\"auto, (max-width: 774px) 100vw, 774px\" \/><\/figure>\n\n\n\n<p class=\"has-regular-font-size\">The website <a href=\"https:\/\/hacked-emails.com\">Hacked-Emails<\/a> has additional\ndatabases to the website developed by Troy Hunt. Verifying your email address\nin the database is also highly recommended because it has a DNS in Spanish: <a href=\"https:\/\/hesidohackeado.com\">hesidohackeado.com<\/a>. As we can see\nin the image, after verifying the same account used previously, the website\nshows us other sites where our data has been leaked.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"814\" height=\"399\" src=\"https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-4.png\" alt=\"\" class=\"wp-image-2730\" srcset=\"https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-4.png 814w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-4-300x147.png 300w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-4-768x376.png 768w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-4-750x368.png 750w\" sizes=\"auto, (max-width: 814px) 100vw, 814px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"789\" height=\"528\" src=\"https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-5.png\" alt=\"\" class=\"wp-image-2731\" srcset=\"https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-5.png 789w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-5-300x201.png 300w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-5-768x514.png 768w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-5-750x502.png 750w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-5-120x80.png 120w\" sizes=\"auto, (max-width: 789px) 100vw, 789px\" \/><\/figure>\n\n\n\n<p class=\"has-regular-font-size\">In addition to\ninforming of cases of hacking that have already occurred, <a href=\"https:\/\/breachalarm.com\/\">Breach Alarm<\/a> offers\nsomething new: the possibility to receive an alert in real time if your email\nis involved in any type of attack.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1211\" height=\"608\" src=\"https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-6-e1536850337546.png\" alt=\"\" class=\"wp-image-2732\" srcset=\"https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-6-e1536850337546.png 1211w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-6-e1536850337546-300x151.png 300w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-6-e1536850337546-768x386.png 768w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-6-e1536850337546-1024x514.png 1024w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-6-e1536850337546-750x377.png 750w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-6-e1536850337546-1200x602.png 1200w\" sizes=\"auto, (max-width: 1211px) 100vw, 1211px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>What to do in the event of\nhacking?<\/strong><strong><\/strong><\/h1>\n\n\n\n<p class=\"has-regular-font-size\">We have just\nseen that we have been hacked. What should we do if our data has been\ncompromised. How big could the leak be?<\/p>\n\n\n\n<p class=\"has-regular-font-size\"><strong>\u2022 Change your passwords on the websites where you have been affected<\/strong>. The longer and more complex the password, the more secure it is. If you cannot think of one, you can use a secure password generator such as <a href=\"http:\/\/pwgen-win.sourceforge.net\/downloads.html\">pwgen<\/a>, which has versions for Windows and Linux. We do not recommend online generators, because they could store generated passwords and use them in the event of a cybersecurity attack.<\/p>\n\n\n\n<p class=\"has-regular-font-size\"><strong>\u2022 Do not re-use passwords<\/strong>, especially if you have been affected by a leak, because these will have been published on the \u201cDark web\u201d, a part of the internet that will not appear on search engines and that is often used for criminal activities. If they are difficult to remember, use a <a href=\"https:\/\/www.youtube.com\/watch?time_continue=25&amp;v=mcly2-b1W20\">Password Manager<\/a> to store your passwords securely. It works like an agenda for all your passwords, which can only be opened with a master password. This remains the method most recommended by specialists to avoid repeating passwords on different websites or using weak passwords, but if the hackers get hold of the master password they will have access to the other ones too.<\/p>\n\n\n\n<p class=\"has-regular-font-size\"><strong>\u2022 Be careful w<\/strong><strong>ith the security questions<\/strong>. If you use them, make sure only you know the answers to them.<\/p>\n\n\n\n<p class=\"has-regular-font-size\"><strong>\u2022 Add a 2nd Factor Authentication (2FA)<\/strong> to your email account if possible to strengthen your credentials. The main email services (<a href=\"https:\/\/support.google.com\/accounts\/answer\/185839?hl=es&amp;co=GENIE.Platform=Desktop\">Gmail<\/a>, <a href=\"https:\/\/support.microsoft.com\/es-es\/help\/12408\/microsoft-account-about-two-step-verification\">Hotmail<\/a> y <a href=\"https:\/\/es.ayuda.yahoo.com\/kb\/SLN5013.html\">Yahoo<\/a>) allow this.<\/p>\n\n\n\n<p class=\"has-regular-font-size\"><strong>\u2022 Delete the affected email account<\/strong> to avoid future leaks from the same account.<br\/><\/p>\n\n\n\n<p class=\"has-regular-font-size\"><strong>\u2022 Do not accept third-party applications on social networks\u00a0<\/strong>that have access to your data. To review the permissions for these applications on Facebook, go to the page \u201c<a href=\"https:\/\/www.facebook.com\/settings?tab=applications\">Applications and websites<\/a>\u201d once you have logged in.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1112\" height=\"621\" src=\"https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-7-e1536850509299.png\" alt=\"\" class=\"wp-image-2733\" srcset=\"https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-7-e1536850509299.png 1112w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-7-e1536850509299-300x168.png 300w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-7-e1536850509299-768x429.png 768w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-7-e1536850509299-1024x572.png 1024w, https:\/\/www.alvantia.com\/wp-content\/uploads\/2018\/09\/ciber-7-e1536850509299-750x419.png 750w\" sizes=\"auto, (max-width: 1112px) 100vw, 1112px\" \/><\/figure>\n\n\n\n<p class=\"has-regular-font-size\">Bear in mind that data transferred to third parties\nnot only includes your list of friends and personal data, but also photographs\nand \u201clikes\u201d which can reveal sensitive data such as your political leanings,\nbeliefs, etc. <\/p>\n\n\n\n<p class=\"has-regular-font-size\">In conclusion, in the age of Big Data, both the data\nwe reveal and the way third parties use this data is important. By entering our\ndata under the philosophy \u201cI have nothing to hide,\u201d we are conceding our right\nto privacy without knowledge of the true scope of this concession. In the cases\nof Cambridge Analytica and the surveillance program revealed by Edward Snowden,\nthe consequences are sometimes not clear, and do not solely affect the person\nwhose data was disclosed.<\/p>\n\n\n\n<p class=\"has-regular-font-size\">The users who authorised \u201cThis is you digital life\u201d\ndid not imagine that a personality test could use their sexual orientation or\nunion affiliations to influence electoral results, neither were they aware that\nthey were effectively selling access to the profiles of friends and families. <strong>When a product or service is free, we are\nthe product <\/strong>(or the equivalent to us, our data).<\/p>\n<div class=\"clearfix\"><\/div>","protected":false},"excerpt":{"rendered":"<p>In March 2018, an investigation by The Guardian and The New York Times revealed one of the most serious technological scandals of the decade: consultancy firm Cambridge Analytica had illegally obtained the personal data of up to 87 million users through Facebook. The data leak originated from an application called \u201cThis is your digital life\u201d,<\/p>\n<p class=\"cv-read-more-button\"><a class=\"cv-button button is-standard color-accent has-icon icon-after\" href=\"https:\/\/www.alvantia.com\/en\/data-protection-age-big-data\/\">Continue Reading<i class=\"button-icon icon-right-open-big\"><\/i><\/a><\/p>\n","protected":false},"author":2,"featured_media":2734,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[279,280],"tags":[251,236],"class_list":["post-2783","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alvantia-en-2","category-technology-2","tag-data-protection","tag-technology","not-single"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.alvantia.com\/en\/wp-json\/wp\/v2\/posts\/2783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.alvantia.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.alvantia.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.alvantia.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.alvantia.com\/en\/wp-json\/wp\/v2\/comments?post=2783"}],"version-history":[{"count":2,"href":"https:\/\/www.alvantia.com\/en\/wp-json\/wp\/v2\/posts\/2783\/revisions"}],"predecessor-version":[{"id":2787,"href":"https:\/\/www.alvantia.com\/en\/wp-json\/wp\/v2\/posts\/2783\/revisions\/2787"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.alvantia.com\/en\/wp-json\/wp\/v2\/media\/2734"}],"wp:attachment":[{"href":"https:\/\/www.alvantia.com\/en\/wp-json\/wp\/v2\/media?parent=2783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.alvantia.com\/en\/wp-json\/wp\/v2\/categories?post=2783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.alvantia.com\/en\/wp-json\/wp\/v2\/tags?post=2783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}