Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

ISACA Offers Guidance for Geolocation Usage and Collection

Organization Warns that Poor Governance over Geolocation can be Disastrous

In a recently released white paper, the ISACA has offered a general overview of the issues surrounding corporate and consumer privacy when it comes to mobile geolocation services. In addition, the organization has offered a simple mnemonic to consumers and employees to address privacy and safety concerns – aptly named ROUTE.

Organization Warns that Poor Governance over Geolocation can be Disastrous

In a recently released white paper, the ISACA has offered a general overview of the issues surrounding corporate and consumer privacy when it comes to mobile geolocation services. In addition, the organization has offered a simple mnemonic to consumers and employees to address privacy and safety concerns – aptly named ROUTE.

ISACA According to ISACA, geolocation services offer a wealth of benefit to the business world, earning it a popular status within the enterprise. For example, location-based data can be used to offer direct marketing and context-sensitive content delivery, monitoring of criminals, enforcing location-based access restrictions on services, cloud balancing, and fraud detection and prevention.

On the other hand, such data collection raises questions when it comes to privacy, specifically, business practices around the collection and use of the PII (personally identifying information).

“This raises several questions of concern for the user, such as how their location data are being used, with whom the data will be shared, whether there will be onward transfer of the data, and the timeline for data retention and destruction,” the white paper comments.

“The amount and the nature of individual and corporate information available to potential hackers would allow targeted attacks that are difficult to prevent, detect and manage. In addition, each user’s personal information, including race, gender, occupation, and financial history, has significant financial value. Therefore, location information is particularly of high value. Information from a GPS and geolocation tags, in combination with other personal information, can be utilized by criminals to identify an individual’s present or future location…”

Again, while all of the geolocation data collected has tremendous value, the risk that comes with the storage and collection should be a topic of concern to business leaders. This is why the ISACA is encouraging organizations to think carefully about their geo-marketing practices, to the point of considering their current privacy policies, and if they accurately reflect the collection and use of geolocation data.

“There is a growing consensus that geolocation data should be classified as sensitive due to a number of concerns such as transparency about data collection practices, solicitations made based on geolocation data obtained without the user’s consent and physical safety stemming from the misuse of information that can identify a user’s current (or future) physical location,” the ISACA notes.

For example, consider the use of geolocation data in a Phishing attack. As the whitepaper points out, “attacks to an individual’s e-mail or mobile device are targeted and are, therefore, highly effective at soliciting a response acknowledgment from the victim.”

Advertisement. Scroll to continue reading.

In Phishing, all it takes is one person opening an attachment or accessing a link for the attack to work. The ISACA’s point is that geolocation data can help craft messages, which will allow an attacker to get a target’s attention with accurate and granular information.

Those with concerns, including consumers and employees within an organization, need only remember a single word to protect themselves: ROUTE

Translated, ROUTE covers the following practices:

Read mobile app agreements to see what information you are sharing.

Only enable geolocation when the benefits outweigh the risk.

Understand that others can track your current and past locations.

Think before posting tagged photos to social media sites.

Embrace the technology, and educate yourself and others.

“We live in a mobile world and geolocation is here to stay. It brings obvious benefits both to individuals and enterprises, but if not managed properly the associated risk will be substantial,” said Ramsés Gallego, a member of ISACA’s Guidance and Practices Committee.

“It directly impacts individuals’ and enterprises’ privacy and confidentiality, and the consequences of poor governance over geolocation can be disastrous.”

The white paper is available here.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Endpoint Security

Gigabyte has announced BIOS updates that remove a recently identified backdoor feature in hundreds of its motherboards.

Endpoint Security

Several major companies have published advisories in response to the Downfall vulnerability affecting Intel CPUs.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...