• Nosy Eye
  • Posts
  • Nosy Eyes and Corporate Spies

Nosy Eyes and Corporate Spies

Welcome to Nosy Eye. We mean business today. Privacy business.

Here’s what we got for you today:

  • Corporate espionage and how to stay out of the crosshairs

  • Action Tip of the Day

The Privacy Challenges of Using Your Employer's Infrastructure

You’ve got to be aware of the privacy risks using your employer’s tech stack brings.

While they might have legitimate reasons for monitoring your actions, it's still important to look out for number 1 and take steps to protect your privacy.

Corporate espionage has many faces including:

  • Hacking

  • Social engineering

  • Physical surveillance

While your company will do what it can to protect itself from external threats. It’s best to assume they’ll also do what they can to prevent insider threats. 

That means watching you and your colleagues to monitor productivity and enforce security policies.

Great if you’re a company man, but unsettling if you’re just trying to get your work done and live a life outside.

Here’s What You Can Do

1. Keep company work on company technology

Do not use work-supplied software and devices for personal use. Tempting, we know, but don’t do it. This minimizes your digital footprint and reduces the risk of surveillance.

If you really need to use personal software or apps, consider using an application sandbox to prevent cross-app data sharing.

2. Know your technology stack

Get, at least, a high level understanding of the hardware and software your employer requires you to use.

You should be aware of the possibility that any tech that is managed by your company has the ability to surveil your actions.

This means they could potentially see everything you do on their systems, including your internet activity and keystrokes.

3. Segregate your networks

Avoid using employer hardware on you personal networks. If you can't avoid it, give the device its own network, away from all of your other devices.

The company won’t be able to access your personal data or monitor your internet activity.

4. Be mindful of your actions

When logged into employer software, be mindful that everything is monitored and logged.

Only type, search, and perform actions that are necessary to complete your tasks.

Although your company is not malicious (we hope not at least), you are creating more digital data points about yourself.

5. Ask for company-supplied hardware

If you must use software for your role, a good tip is to ask the company if they'll supply you with hardware to run it on.

You may be surprised at the response you receive. So it’s an opportunity to educate them about the security importance of preventing work and personal applications from commingling.

Action Tip of The Day

You can use a virtual machine (VM) to do work-related tasks while isolating your personal apps, files, and data.

A VM is like a separate computer, but within your computer.

It does require some extra work, but it’s a helpful tool for keeping work at work and preventing others from nosying about your business.

We’re comfortable recommending VirtualBox as potential solution.

Well, that’s all we have for you today. Ciao, for now.

DISCLAIMER: This newsletter is strictly educational. Please do not use easily identifiable data online, as you do not know who is going to give it away