{"id":2374,"date":"2017-03-10T17:06:02","date_gmt":"2017-03-10T17:06:02","guid":{"rendered":"https:\/\/tsisupport.com\/?p=2374"},"modified":"2021-08-10T01:38:46","modified_gmt":"2021-08-10T05:38:46","slug":"experiencing-security-fatigue","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=2374","title":{"rendered":"IOT Cybersecurity: Experiencing Security Fatigue?"},"content":{"rendered":"<p style=\"text-align: justify;\">As the CEO of an IT company, I often find myself speaking to people about what my company offers and what services we provide. Inevitably, the discussion will segue from technology, to the topic of internet security and privacy.\u00a0 We all desire complete control over what information we share, but it often feels like it is being chipped away at every turn in the name of commoditizing our daily activities.\u00a0 Since 9\/11, our country has relied heavily on the notion of relinquishing a bit of privacy for the sake of national security.\u00a0 Most feel as though it is a small price to pay, after all, \u201c<em>If you don\u2019t have anything to hide\u2026<\/em>\u201d, good people should have nothing to fear from their government conducting a little snooping, what\u2019s the big deal?<\/p>\n<p style=\"text-align: justify;\">It\u2019s precisely that belief of giving a little that is eroding the very fabric of what we hold close.\u00a0 As I stare at my Samsung SmartTV, I start to wonder who may be listening to me, or who may be scoffing at my poor choice of words while I desperately attempt to pound my remote control to evade the latest Tweets of our President.<\/p>\n<p style=\"text-align: justify;\">Ok, perhaps that may seem like a bit of paranoia, but we are all aware of how the <a class=\"zem_slink\" title=\"Internet of things\" href=\"http:\/\/en.wikipedia.org\/wiki\/Internet_of_things\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Internet of Things (IOT)<\/a> have become a staple in our homes at this point.\u00a0 These devices are all interconnected and speak to one another, which begs the question; what personal data are we providing for these sophisticated algorithms to successfully anticipate our needs?<\/p>\n<p style=\"text-align: justify;\">I recall a scene in the movie Meet the Parents\u00a0where <a href=\"http:\/\/www.imdb.com\/name\/nm0000134\/\" target=\"_blank\" rel=\"noopener noreferrer\">Robert DeNiro<\/a> is interrogating <a class=\"zem_slink\" title=\"Ben Stiller\" href=\"http:\/\/twitter.com\/redhourben\" target=\"_blank\" rel=\"noopener twitter noreferrer\">Ben Stiller<\/a> about his willingness to enter \u201cThe Circle of Truth\u201d.\u00a0 It sounded funny at the time, but not so much anymore, because that circle of trust which has been imposed on us by the security agencies for the sake of protection seems to have gone to hell in a handbasket.<\/p>\n<p style=\"text-align: justify;\">Let me explain, first we had the NSA who cozied up with the Telco\u2019s, allowing surveillance of any U.S. citizen\u2019s communications, and with the most recent leak, there are allegations the CIA used a hack dubbed <a class=\"zem_slink\" title=\"Weeping Angel\" href=\"http:\/\/en.wikipedia.org\/wiki\/Weeping_Angel\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Weeping Angel<\/a>.\u00a0 This hack captures what you say in the privacy of your own home through any of your connected devices equipped with a camera or microphone, including your SmartTV. While this in and of itself is disturbing, think about how much deeper it could go if crooks or unscrupulous business people got their hands on these \u201ctools\u201d, imagine what they could capture if they gained access to listen in, or worse, see your every action.<\/p>\n<p style=\"text-align: justify;\">So what exactly can we do?\u00a0 Flight or Fight.\u00a0 The fact is, many of us are suffering from Security Fatigue.\u00a0 We are bombarded with a tirade of requests to change our passwords, protect our identities, reset codes, or new compliance requirements that demand greater effort to recollect.\u00a0 We are tired of being told that despite all of this, it still isn\u2019t enough.<\/p>\n<p style=\"text-align: justify;\">We could resign and admit defeat in the battle for anonymity, or we could choose to fight and stay in the game to protect our right to privacy. Samsung and Apple are two vendors affected by the recent information released on <a class=\"zem_slink\" title=\"Wikileaks\" href=\"http:\/\/wikileaks.org\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">WikiLeaks<\/a>, and both have indicated that the vulnerabilities were a result of older or not properly updated software.\u00a0 I hope this is true, until we are told otherwise, my recommendation will remain the same, ensure all your Televisions, Phones, Computers, and any other Connected Devices are protected by the latest security updates available.<\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>As the CEO of an IT company, I often find myself speaking to people about what my company offers and what services we provide. Inevitably, the discussion will segue from technology, to the topic of internet security and privacy.\u00a0 We all desire complete control over what information we share, but it often feels like it&hellip;<\/p>\n","protected":false},"author":3,"featured_media":8533,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[314,331,176,21],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Experiencing Security Fatigue? | IOT Cybersecurity | TSI<\/title>\n<meta name=\"description\" content=\"Combat your Security Fatigue and learn how modern IOT security standards have added pressure and anxiety to our already hectic online lives.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Experiencing Security Fatigue? | IOT Cybersecurity | TSI\" \/>\n<meta property=\"og:description\" content=\"Combat your Security Fatigue and learn how modern IOT security standards have added pressure and anxiety to our already hectic online lives.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=2374\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-10T17:06:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-10T05:38:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/03\/Security-Fatigue-2.fw_-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gerard Louise\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gerard Louise\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2374\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2374\",\"name\":\"Experiencing Security Fatigue? | IOT Cybersecurity | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2374#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2374#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/03\/Security-Fatigue-2.fw_-1140x380-1.png\",\"datePublished\":\"2017-03-10T17:06:02+00:00\",\"dateModified\":\"2021-08-10T05:38:46+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/1a605be66a2a332fe9bc01a23fb079dc\"},\"description\":\"Combat your Security Fatigue and learn how modern IOT security standards have added pressure and anxiety to our already hectic online lives.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2374#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=2374\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2374#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/03\/Security-Fatigue-2.fw_-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/03\/Security-Fatigue-2.fw_-1140x380-1.png\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2374#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IOT Cybersecurity: Experiencing Security Fatigue?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/1a605be66a2a332fe9bc01a23fb079dc\",\"name\":\"Gerard Louise\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/651cabbca6d70d38071fec1011b009c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/651cabbca6d70d38071fec1011b009c2?s=96&d=mm&r=g\",\"caption\":\"Gerard Louise\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=3\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Experiencing Security Fatigue? | IOT Cybersecurity | TSI","description":"Combat your Security Fatigue and learn how modern IOT security standards have added pressure and anxiety to our already hectic online lives.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Experiencing Security Fatigue? | IOT Cybersecurity | TSI","og_description":"Combat your Security Fatigue and learn how modern IOT security standards have added pressure and anxiety to our already hectic online lives.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=2374","og_site_name":"TSI Support","article_published_time":"2017-03-10T17:06:02+00:00","article_modified_time":"2021-08-10T05:38:46+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/03\/Security-Fatigue-2.fw_-1140x380-1.png","type":"image\/png"}],"author":"Gerard Louise","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Gerard Louise","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2374","url":"https:\/\/tsisupport.com\/tsistaging\/?p=2374","name":"Experiencing Security Fatigue? | IOT Cybersecurity | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2374#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2374#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/03\/Security-Fatigue-2.fw_-1140x380-1.png","datePublished":"2017-03-10T17:06:02+00:00","dateModified":"2021-08-10T05:38:46+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/1a605be66a2a332fe9bc01a23fb079dc"},"description":"Combat your Security Fatigue and learn how modern IOT security standards have added pressure and anxiety to our already hectic online lives.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2374#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=2374"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2374#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/03\/Security-Fatigue-2.fw_-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/03\/Security-Fatigue-2.fw_-1140x380-1.png","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2374#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"IOT Cybersecurity: Experiencing Security Fatigue?"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/1a605be66a2a332fe9bc01a23fb079dc","name":"Gerard Louise","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/651cabbca6d70d38071fec1011b009c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/651cabbca6d70d38071fec1011b009c2?s=96&d=mm&r=g","caption":"Gerard Louise"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=3"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2374"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2374"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2374\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8533"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}