Gaming apps create serious security issues.

Pokémon Go is an online fantasy game that transports the player between the virtual world and the real world through their smartphones.  Players search far and wide in the real world to capture as many Pokémon as they can. Upon encountering a Pokémon, your smartphone will vibrate to let you know you're near a Pokémon. Hurl a Poké Ball to catch more than a hundred species of Pokémon. The game takes you to real-world locations such as historical markers in the Hokkaido and Kanto regions of Japan, and public art installations in New York, and Paris.


Access to personal data

In order to play you need to log in with your Gmail account. Pokémon Go is location-based, so data about you is crucial to the gaming experience. The Pokémon Go app grants full access to all of your personal data. How much access and risk are we exposing ourselves and our children to? What personal information is Pokémon Go collecting?

Full access to your personal data is problematic. No one should ever have "Full account access" privilege to any of your data. Never expose yourself or your family to unnecessary risk. Most smartphone users fail to understand the consequences of granting third-party access to their personal data.  


Mobile Keys

Clicking accept on an app frequently grants the developer access to a wide range of information on your mobile device and the contacts in your address book. 

Don’t turn over the keys!

Identity theft is now one of life’s certainties, right behind death and taxes. Your personal data is the key to accessing finances and your health care information — and the damage can be devastating. Well over one billion records containing personally identifiable information is exposed annually according to IBM.  Breaches are now commonplace, and it’s not going to get any better. An identity thief only needs a few data points to seize your data, we all need to stop carelessly permitting third-party apps to have full access to our data.  
The Ponemon Institute, a leading research firm on privacy, data protection and information security policy reports that 43 percent of companies have experienced a data breach in the past year. Most people don’t know how to qualify or quantify the impact a breach can have. The financial burden could cripple an individual or business, if not shut it down all together.

 According to the FBI, hackers employ email phishing campaigns targeting 50,000,000 people at a time. The odds are good that a few individuals will click through a link that acquires an online password, triggering a malware virus that instantly begins collecting names, dates of birth, social security numbers, bank accounts, credit cards and health-related information.

 A security breach may result in harm to a person or company. Businesses have a legal obligation to notify state and federal agencies of a data breach. Every state has mandated time guidelines as to how soon individuals must be notified that their personally identifiable information has been compromised. There are costly penalties for any business that does not comply with the regulations.

 The likelihood of being breached is more likely than ever, so it is wise to take steps to ensure you are covered. Comprehensive cyber security insurance offsets most of the risk from a breach. Currently, there is $2 billion in written cyber security insurance premiums and it is estimated that by 2020, the cyber security insurance industry will total over $4 billion dollars.


Pokemon Go Application



Take sensible precautions

When playing Pokémon GO or downloading any mobile application, verify the authenticity of downloaded applications. Also:

  • Enable two-factor authentication for sensitive transactions such as mobile banking or conducting financial transactions to provide a higher level of security than traditional passwords. Your mobile device can generate pass codes sent via a text message to the phone.
  • Install antimalware to protect against malicious applications, viruses, spyware and malware-based attacks. Protect against unwanted (spam) voice messages, text messages and e-mail attachments.
  • Install a firewall and security updates to protect against unauthorized connections by intercepting both incoming and outgoing connection attempts and blocking or permitting them based on a list of rules.
  • And remotely disable lost or stolen devices so that your personal data remains secure.

Gaming is fun, let’s make sure it is safe for our kids. Don’t permit access to your personal data and privacy. Grant third-party applications limited access to your data and take precautions to protect your family from the possibility of being hacked.  

Share |

No Comments

Post a Comment
Required (Not Displayed)

All comments are moderated and stripped of HTML.
Submission Validation
Change the CAPTCHA codeSpeak the CAPTCHA code
Enter the Validation Code from above.
NOTICE: This blog and website are made available by the publisher for educational and informational purposes only. It is not be used as a substitute for competent insurance, legal, or tax advice from a licensed professional in your state. By using this blog site you understand that there is no broker client relationship between you and the blog and website publisher.
Blog Archive
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013

View Mobile Version