<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Essential Risk Management]]></title><description><![CDATA[Keeping individuals and organizations safe online by arming your with knowledge, processes, and tools for proactive self-defense.]]></description><link>https://essentialriskmgt.com</link><image><url>https://substackcdn.com/image/fetch/$s_!JYD3!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0be7d6f0-e325-4789-aa77-7b74aebdb47d_1280x1280.png</url><title>Essential Risk Management</title><link>https://essentialriskmgt.com</link></image><generator>Substack</generator><lastBuildDate>Tue, 28 Apr 2026 20:22:31 GMT</lastBuildDate><atom:link href="https://essentialriskmgt.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Paul Caloca]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[essentialriskmgt@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[essentialriskmgt@substack.com]]></itunes:email><itunes:name><![CDATA[Paul Caloca - EssentialRiskMgt]]></itunes:name></itunes:owner><itunes:author><![CDATA[Paul Caloca - EssentialRiskMgt]]></itunes:author><googleplay:owner><![CDATA[essentialriskmgt@substack.com]]></googleplay:owner><googleplay:email><![CDATA[essentialriskmgt@substack.com]]></googleplay:email><googleplay:author><![CDATA[Paul Caloca - EssentialRiskMgt]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[How to Stop Nine AI Tools From Collecting Your Creative Work]]></title><description><![CDATA[Verified Step-by-step Opt-Out Settings Guide for ChatGPT, Claude, Gemini, Adobe, Canva, Copilot, Notion, Midjourney, and Runway]]></description><link>https://essentialriskmgt.com/p/how-to-stop-nine-ai-tools-from-collecting</link><guid isPermaLink="false">https://essentialriskmgt.com/p/how-to-stop-nine-ai-tools-from-collecting</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Sun, 19 Apr 2026 20:45:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!M2-w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f58282-0e82-42aa-a914-1b7f0a4e7a4e_1920x1308.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>After the <a href="https://essentialriskmgt.com/p/your-ai-tools-are-watching-you-here?r=524i83">AI surveillance piece went out</a>, I sat with a <strong>problem</strong>.</p><p>The opt-out steps for ChatGPT, Claude, Gemini, and Adobe &#8212; I&#8217;d published those. Readers could action them. And based on the response, a lot of you did. <strong>Good</strong>.</p><p>But I had kept researching while I was writing, and I knew the published piece only covered the four tools with the cleanest story. I hadn&#8217;t yet worked through <strong>Canva. Or Copilot. Or Notion. Or Runway.</strong> And I couldn&#8217;t publish those sections without running through every setting myself, verifying every path, taking every screenshot.</p><p><strong>So I kept going.</strong> What I found turned the article into <strong>something bigger than an article.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!M2-w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f58282-0e82-42aa-a914-1b7f0a4e7a4e_1920x1308.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!M2-w!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f58282-0e82-42aa-a914-1b7f0a4e7a4e_1920x1308.jpeg 424w, https://substackcdn.com/image/fetch/$s_!M2-w!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f58282-0e82-42aa-a914-1b7f0a4e7a4e_1920x1308.jpeg 848w, https://substackcdn.com/image/fetch/$s_!M2-w!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f58282-0e82-42aa-a914-1b7f0a4e7a4e_1920x1308.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!M2-w!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f58282-0e82-42aa-a914-1b7f0a4e7a4e_1920x1308.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!M2-w!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f58282-0e82-42aa-a914-1b7f0a4e7a4e_1920x1308.jpeg" width="1456" height="992" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/32f58282-0e82-42aa-a914-1b7f0a4e7a4e_1920x1308.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:992,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:554431,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/194651099?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f58282-0e82-42aa-a914-1b7f0a4e7a4e_1920x1308.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!M2-w!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f58282-0e82-42aa-a914-1b7f0a4e7a4e_1920x1308.jpeg 424w, https://substackcdn.com/image/fetch/$s_!M2-w!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f58282-0e82-42aa-a914-1b7f0a4e7a4e_1920x1308.jpeg 848w, https://substackcdn.com/image/fetch/$s_!M2-w!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f58282-0e82-42aa-a914-1b7f0a4e7a4e_1920x1308.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!M2-w!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f58282-0e82-42aa-a914-1b7f0a4e7a4e_1920x1308.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image by Gerd Altmann from Pixabay</figcaption></figure></div><h1>Canva can record your screen.</h1><p>Not your uploaded images. <strong>Your screen.</strong> <strong>While you work.</strong></p><p>It&#8217;s buried in Settings under Privacy Controls. The toggle is called &#8220;Allow your sessions to be recorded.&#8221; The stated purpose is product discovery and improvement. The recordings are deleted after three months &#8212; which means they exist for three months.</p><p><strong>I want you to sit with what that means for a working photographer or videographer.</strong> </p><p>You&#8217;re in Canva building a client-facing proposal. You&#8217;ve got their brief open in another tab. You&#8217;ve got pricing information. A contract draft. And Canva has the option, if you&#8217;ve never been to that settings page, to record everything you&#8217;re doing on screen.</p><p>The toggle is opt-in &#8212; which means you&#8217;d have to have turned it on deliberately to be recorded. But how many people scroll to the bottom of every privacy settings page they&#8217;ve never heard of? The only way to know for certain you&#8217;re not being recorded is to go find the setting.</p><p>So <strong>I went and found it</strong>. And I put the <strong>exact path</strong> in the guide.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mzRH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe84a6d74-d6ec-4c16-841a-9f9a15c7bd9f_1920x1434.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mzRH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe84a6d74-d6ec-4c16-841a-9f9a15c7bd9f_1920x1434.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mzRH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe84a6d74-d6ec-4c16-841a-9f9a15c7bd9f_1920x1434.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mzRH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe84a6d74-d6ec-4c16-841a-9f9a15c7bd9f_1920x1434.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mzRH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe84a6d74-d6ec-4c16-841a-9f9a15c7bd9f_1920x1434.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mzRH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe84a6d74-d6ec-4c16-841a-9f9a15c7bd9f_1920x1434.jpeg" width="1456" height="1087" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e84a6d74-d6ec-4c16-841a-9f9a15c7bd9f_1920x1434.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1087,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1024851,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/194651099?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe84a6d74-d6ec-4c16-841a-9f9a15c7bd9f_1920x1434.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mzRH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe84a6d74-d6ec-4c16-841a-9f9a15c7bd9f_1920x1434.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mzRH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe84a6d74-d6ec-4c16-841a-9f9a15c7bd9f_1920x1434.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mzRH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe84a6d74-d6ec-4c16-841a-9f9a15c7bd9f_1920x1434.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mzRH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe84a6d74-d6ec-4c16-841a-9f9a15c7bd9f_1920x1434.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image by Sergio Stockfleth from Pixabay</figcaption></figure></div><h1>Copilot is designed to watch your screen and listen for its name.</h1><p>There&#8217;s a feature in Microsoft Copilot on Windows 11 called <strong>Copilot Vision</strong>. When it&#8217;s on, <strong>Copilot continuously views your screen</strong> &#8212; not a screenshot, a <strong>live feed</strong> &#8212; to provide contextual help. There&#8217;s also a <strong>Voice Mode</strong> setting that keeps <strong>Copilot listening for the phrase &#8220;Hey Copilot&#8221; at all times.</strong></p><p>Neither of these is on by default. But they&#8217;re also not where you&#8217;d think to look. <strong>Copilot on macOS</strong> has different menus than <strong>Copilot on Windows</strong>. <strong>Copilot running inside Edge</strong> has a third set of settings entirely. <strong>The guide covers all three</strong> &#8212; with screenshots &#8212; because the tool behaves differently depending on how you access it.</p><p>For artists who use Microsoft 365, Copilot is already threaded through your workflow whether you use it intentionally or not. <strong>Knowing where all the privacy controls are &#8212; not just the obvious ones &#8212; is the whole point.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4wls!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059a1ffe-1709-48e3-b783-81334ab04b8c_1708x1920.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4wls!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059a1ffe-1709-48e3-b783-81334ab04b8c_1708x1920.png 424w, https://substackcdn.com/image/fetch/$s_!4wls!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059a1ffe-1709-48e3-b783-81334ab04b8c_1708x1920.png 848w, https://substackcdn.com/image/fetch/$s_!4wls!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059a1ffe-1709-48e3-b783-81334ab04b8c_1708x1920.png 1272w, https://substackcdn.com/image/fetch/$s_!4wls!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059a1ffe-1709-48e3-b783-81334ab04b8c_1708x1920.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4wls!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059a1ffe-1709-48e3-b783-81334ab04b8c_1708x1920.png" width="430" height="483.4546703296703" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/059a1ffe-1709-48e3-b783-81334ab04b8c_1708x1920.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1637,&quot;width&quot;:1456,&quot;resizeWidth&quot;:430,&quot;bytes&quot;:540460,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/194651099?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059a1ffe-1709-48e3-b783-81334ab04b8c_1708x1920.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4wls!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059a1ffe-1709-48e3-b783-81334ab04b8c_1708x1920.png 424w, https://substackcdn.com/image/fetch/$s_!4wls!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059a1ffe-1709-48e3-b783-81334ab04b8c_1708x1920.png 848w, https://substackcdn.com/image/fetch/$s_!4wls!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059a1ffe-1709-48e3-b783-81334ab04b8c_1708x1920.png 1272w, https://substackcdn.com/image/fetch/$s_!4wls!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059a1ffe-1709-48e3-b783-81334ab04b8c_1708x1920.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image by Pete Linforth from Pixabay</figcaption></figure></div><h1>One tool is actually doing it right.</h1><p>Here&#8217;s something I didn&#8217;t expect to write: Notion AI&#8217;s training program &#8212; called AI Leap &#8212; is opt-in only. <strong>Verified April 2026</strong>. You have to actively sign up for Notion to use your content for training. If you haven&#8217;t done that, you&#8217;re not in it.</p><p>I want to give credit where it&#8217;s due. <strong>Opt-in should be the standard. It isn&#8217;t. </strong>Notion is one of the few tools in this space where the default protects you rather than exposes you. I documented it in the guide for that reason &#8212; both to show you what &#8220;good&#8221; looks like, and because it&#8217;s <strong>worth knowing your Notion content is actually protected</strong> without you having to find the off switch.</p><h1>And then there&#8217;s Runway.</h1><p>If you edit video and you use AI tools to do it, Runway is in your world. Video artists have a very specific exposure problem: <strong>the content you&#8217;re processing through Runway often belongs to clients.</strong> It&#8217;s not a brainstormed prompt. It&#8217;s finished footage.</p><blockquote><p><strong>WARNING: No Opt-Out on Consumer Plans On Runway&#8217;s Free, Standard, Pro, and Unlimited plans</strong>, your inputs and outputs &#8212; including the videos you generate &#8212; are used to train Runway&#8217;s models. <strong>Runway claims perpetual rights to use this content for training. </strong>There is no setting to change this. The only alternative is an Enterprise plan.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!l6IO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16b735fb-b201-4c2a-819b-b7e7ae8ffa91_1920x1408.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!l6IO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16b735fb-b201-4c2a-819b-b7e7ae8ffa91_1920x1408.jpeg 424w, https://substackcdn.com/image/fetch/$s_!l6IO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16b735fb-b201-4c2a-819b-b7e7ae8ffa91_1920x1408.jpeg 848w, https://substackcdn.com/image/fetch/$s_!l6IO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16b735fb-b201-4c2a-819b-b7e7ae8ffa91_1920x1408.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!l6IO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16b735fb-b201-4c2a-819b-b7e7ae8ffa91_1920x1408.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!l6IO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16b735fb-b201-4c2a-819b-b7e7ae8ffa91_1920x1408.jpeg" width="1456" height="1068" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/16b735fb-b201-4c2a-819b-b7e7ae8ffa91_1920x1408.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1068,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:701158,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/194651099?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16b735fb-b201-4c2a-819b-b7e7ae8ffa91_1920x1408.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!l6IO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16b735fb-b201-4c2a-819b-b7e7ae8ffa91_1920x1408.jpeg 424w, https://substackcdn.com/image/fetch/$s_!l6IO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16b735fb-b201-4c2a-819b-b7e7ae8ffa91_1920x1408.jpeg 848w, https://substackcdn.com/image/fetch/$s_!l6IO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16b735fb-b201-4c2a-819b-b7e7ae8ffa91_1920x1408.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!l6IO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16b735fb-b201-4c2a-819b-b7e7ae8ffa91_1920x1408.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image by Benjamin Balzas from Pixabay</figcaption></figure></div><h1>The part that changed how I think about this.</h1><p>By the time I had all nine tools documented, I realized the individual opt-outs were only <strong>part of what an artist actually needs.</strong> You could do the ChatGPT opt-out today and forget about it. You could miss the Canva session recording entirely because you never knew it existed. You could opt out of Gemini training and not realize you still haven&#8217;t touched the &#8220;Improve Services&#8221; toggle.</p><p>What you actually need is <strong>a way to</strong> <strong>see your full picture.</strong> Know which tools you&#8217;ve locked down, which ones you&#8217;ve left open, and which ones change their policies without announcement.</p><blockquote><p>So the guide includes an <strong>AI Privacy Scorecard</strong> &#8212; a pre-filled reference table comparing all nine tools on the same criteria &#8212; and a <strong>personal audit worksheet</strong> where you <strong>log your own settings.</strong> </p><p>Work through it once and you&#8217;re <strong>not guessing anymore.</strong> Set a reminder to re-audit in <strong>six months</strong>, because these <strong>companies update their policies quietly.</strong></p></blockquote><p>That&#8217;s why <strong>this became a guide instead of a second article</strong>. An article tells you about the problem. The guide gives you a <strong>completed audit of nine tools, a worksheet for your own settings, and a checklist</strong> that doesn&#8217;t let you miss Copilot Vision.</p><h2>PAID subscribers can immediately download the guide below. </h2><p>Not ready to become a PAID subscriber? You can check out the guide <a href="https://buymeacoffee.com/pcaloca/e/530396">here</a>.</p><div class="pullquote"><p><strong>How valuable is it to know exactly where your creative work is going?</strong></p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://essentialriskmgt.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://essentialriskmgt.com/subscribe?"><span>Subscribe now</span></a></p>
      <p>
          <a href="https://essentialriskmgt.com/p/how-to-stop-nine-ai-tools-from-collecting">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[96-Second macOS Security Check]]></title><description><![CDATA[Can you Invest a few seconds to keep you beloved Mac secure?]]></description><link>https://essentialriskmgt.com/p/96-second-macos-security-check</link><guid isPermaLink="false">https://essentialriskmgt.com/p/96-second-macos-security-check</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Fri, 10 Apr 2026 21:16:49 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/193836677/08dd86eaf62c7bda395343d469c1dbe1.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;bf0d5f20-045a-487f-9086-c5b3aa80f531&quot;,&quot;caption&quot;:&quot;Your Client Photos, Your Sample Library, Your PayPal ~ All Exposed&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;2026 MacOS Tahoe Security Guide&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:305900355,&quot;name&quot;:&quot;Paul Caloca - EssentialRiskMgt&quot;,&quot;bio&quot;:&quot;Keeping individuals and organizations safe online by arming you with knowledge, processes, and tools for proactive self-defense.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb30a931-df5f-4ca8-a308-447e98b52cba_320x320.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-04-09T19:38:11.740Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!z5Nw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eb0d19-4559-453d-9928-4893fd4bd60e_1920x1373.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://essentialriskmgt.com/p/2026-macos-tahoe-security-guide&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:193721714,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:3642186,&quot;publication_name&quot;:&quot;Essential Risk Management&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!KpnN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ba33a8c-be0b-436a-b31c-cf324cdd0640_256x256.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div>]]></content:encoded></item><item><title><![CDATA[2026 MacOS Tahoe Security Guide]]></title><description><![CDATA[They don't need your password. They just need one mistake.]]></description><link>https://essentialriskmgt.com/p/2026-macos-tahoe-security-guide</link><guid isPermaLink="false">https://essentialriskmgt.com/p/2026-macos-tahoe-security-guide</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Thu, 09 Apr 2026 19:38:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!z5Nw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eb0d19-4559-453d-9928-4893fd4bd60e_1920x1373.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Your Client Photos, Your Sample Library, Your PayPal ~ All Exposed</h1><h2>One reused password. One unencrypted hard drive. One bad download.</h2><h3><strong>That&#8217;s all it takes.</strong></h3><p>I&#8217;ve spent thirty years auditing cybersecurity for some of the largest companies in the country. I&#8217;ve seen exactly how the bad guys get in. And I&#8217;ve watched creative professionals ~ photographers, videographers, podcasters, musicians ~ run the same three mistakes over and over because nobody ever translated this into plain language for them.</p><p><strong>I&#8217;m also an amateur photographer.</strong> I have a <a href="https://pcaloca.substack.com">photography Substack</a>. I have client files. I have <strong>years of work sitting on hard drives</strong> right now. So when I say <strong>this is personal</strong>, I mean it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!z5Nw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eb0d19-4559-453d-9928-4893fd4bd60e_1920x1373.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!z5Nw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eb0d19-4559-453d-9928-4893fd4bd60e_1920x1373.png 424w, https://substackcdn.com/image/fetch/$s_!z5Nw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eb0d19-4559-453d-9928-4893fd4bd60e_1920x1373.png 848w, https://substackcdn.com/image/fetch/$s_!z5Nw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eb0d19-4559-453d-9928-4893fd4bd60e_1920x1373.png 1272w, https://substackcdn.com/image/fetch/$s_!z5Nw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eb0d19-4559-453d-9928-4893fd4bd60e_1920x1373.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!z5Nw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eb0d19-4559-453d-9928-4893fd4bd60e_1920x1373.png" width="1456" height="1041" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/16eb0d19-4559-453d-9928-4893fd4bd60e_1920x1373.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1041,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!z5Nw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eb0d19-4559-453d-9928-4893fd4bd60e_1920x1373.png 424w, https://substackcdn.com/image/fetch/$s_!z5Nw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eb0d19-4559-453d-9928-4893fd4bd60e_1920x1373.png 848w, https://substackcdn.com/image/fetch/$s_!z5Nw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eb0d19-4559-453d-9928-4893fd4bd60e_1920x1373.png 1272w, https://substackcdn.com/image/fetch/$s_!z5Nw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eb0d19-4559-453d-9928-4893fd4bd60e_1920x1373.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p style="text-align: center;">Image by Lucas Bieri from Pixabay</p><p>Here&#8217;s what I know from thirty years of doing this professionally: <strong>most of the harm that lands on a creative&#8217;s machine is preventable.</strong> Not with expensive software. Not with an IT department. With <strong>the right ten steps</strong>, in <strong>the right order.</strong></p><p>The bad guys are not sophisticated. <strong>They are patient.</strong> They look for <strong>easy, soft targets</strong>. They are <a href="https://www.newstrail.com/who-buys-identities-on-the-dark-web-and-what-happens-after/">buying lists of stolen email-and-password pairs</a> for <strong>pennies</strong> and <strong>feeding them into automated tools</strong> that <strong>try your credentials on every major service</strong> ~ your cloud storage, your email, your bank ~ <strong>until something opens.</strong></p><p>Your Lightroom catalog won&#8217;t get them excited. <strong>Your PayPal or Stripe account will.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qJhJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabd959cf-3a48-44ca-9e64-7a8ed3d9a43f_1920x1280.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qJhJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabd959cf-3a48-44ca-9e64-7a8ed3d9a43f_1920x1280.png 424w, https://substackcdn.com/image/fetch/$s_!qJhJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabd959cf-3a48-44ca-9e64-7a8ed3d9a43f_1920x1280.png 848w, https://substackcdn.com/image/fetch/$s_!qJhJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabd959cf-3a48-44ca-9e64-7a8ed3d9a43f_1920x1280.png 1272w, https://substackcdn.com/image/fetch/$s_!qJhJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabd959cf-3a48-44ca-9e64-7a8ed3d9a43f_1920x1280.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qJhJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabd959cf-3a48-44ca-9e64-7a8ed3d9a43f_1920x1280.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/abd959cf-3a48-44ca-9e64-7a8ed3d9a43f_1920x1280.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qJhJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabd959cf-3a48-44ca-9e64-7a8ed3d9a43f_1920x1280.png 424w, https://substackcdn.com/image/fetch/$s_!qJhJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabd959cf-3a48-44ca-9e64-7a8ed3d9a43f_1920x1280.png 848w, https://substackcdn.com/image/fetch/$s_!qJhJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabd959cf-3a48-44ca-9e64-7a8ed3d9a43f_1920x1280.png 1272w, https://substackcdn.com/image/fetch/$s_!qJhJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabd959cf-3a48-44ca-9e64-7a8ed3d9a43f_1920x1280.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I built this guide because I got tired of watching artists get hurt by things that are <strong>entirely preventable.</strong> It covers every layer of <strong>macOS Tahoe security</strong> ~ passwords, hard drive encryption, two-factor authentication, antivirus, firewall, VPN, safe download habits ~ with the <strong>exact menu paths and the exact reasoning behind each step.</strong> I wrote it the way <strong>I&#8217;d explain it to a fellow photographer</strong>, not the way I&#8217;d write it for a corporate audit.</p><p>At the end is a <strong>printable master checklist.</strong> Work through it, check every box, and your Mac is hardened.</p><p>If you are not ready to choose a paid subscription yet, you can check out the guide <a href="https://buymeacoffee.com/pcaloca/e/527805">here</a>. It&#8217;s less than a shoot day&#8217;s worth of memory cards, and it protects everything on them.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://essentialriskmgt.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://essentialriskmgt.com/subscribe?"><span>Subscribe now</span></a></p><p>Have you ever had something go wrong on your Mac ~ a sketchy download, a suspicious email, anything that made you think &#8220;that could have been bad&#8221;? Tell me what happened. I read every response.</p><p><strong>PAID Subscribers can download the guide below and put it to work immediately.</strong></p>
      <p>
          <a href="https://essentialriskmgt.com/p/2026-macos-tahoe-security-guide">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Your AI Tools Are Watching You. Here Are the Settings To Change That.]]></title><description><![CDATA[The opt-outs exist. The companies just hope you won't go looking.]]></description><link>https://essentialriskmgt.com/p/your-ai-tools-are-watching-you-here</link><guid isPermaLink="false">https://essentialriskmgt.com/p/your-ai-tools-are-watching-you-here</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Sun, 22 Mar 2026 01:10:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!FAaw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9651b5a8-7713-4b6f-bfd4-247d55ce9f2f_1920x1153.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FAaw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9651b5a8-7713-4b6f-bfd4-247d55ce9f2f_1920x1153.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FAaw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9651b5a8-7713-4b6f-bfd4-247d55ce9f2f_1920x1153.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FAaw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9651b5a8-7713-4b6f-bfd4-247d55ce9f2f_1920x1153.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FAaw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9651b5a8-7713-4b6f-bfd4-247d55ce9f2f_1920x1153.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FAaw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9651b5a8-7713-4b6f-bfd4-247d55ce9f2f_1920x1153.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FAaw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9651b5a8-7713-4b6f-bfd4-247d55ce9f2f_1920x1153.jpeg" width="1456" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9651b5a8-7713-4b6f-bfd4-247d55ce9f2f_1920x1153.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:419449,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/191721257?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9651b5a8-7713-4b6f-bfd4-247d55ce9f2f_1920x1153.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FAaw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9651b5a8-7713-4b6f-bfd4-247d55ce9f2f_1920x1153.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FAaw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9651b5a8-7713-4b6f-bfd4-247d55ce9f2f_1920x1153.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FAaw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9651b5a8-7713-4b6f-bfd4-247d55ce9f2f_1920x1153.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FAaw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9651b5a8-7713-4b6f-bfd4-247d55ce9f2f_1920x1153.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image by Alexandra Koch from Pixabay</figcaption></figure></div><p>Have you checked your AI tools&#8217; privacy settings lately?</p><p>Not the settings you chose when you signed up weeks or months ago. The settings that exist now, after the companies rewrote their policies, mostly without making headlines about it.</p><p>I went through them. What I found wasn&#8217;t surprising. It was worse than that -- it was boring. <strong>Routine corporate behavior dressed up in privacy-policy language designed to be skipped.</strong> The default in almost every tool is the same: <strong>your conversations, your prompts, your images go to the company and stay there. They improve their products with your work.</strong></p><p><strong>You can stop it</strong>. But you have to <strong>know where to look</strong>.</p><p>This is where to look &#8230;</p><h2>What These Tools Are Actually Doing</h2><p>Every major AI tool you use has a data collection policy. Most of them changed those policies in 2025. Most of the changes moved in the same direction: from &#8220;we don&#8217;t use your data for training&#8221; to &#8220;<em><strong>we do, unless you tell us not to</strong></em>.&#8221;</p><p>Here&#8217;s what the tools artists are most likely using are actually doing right now.</p><h2>ChatGPT (OpenAI)</h2><p>By default, ChatGPT uses your conversations to train its models. OpenAI gives you a way out, a toggle in your account settings, <strong>but you have to find it</strong>. If you haven&#8217;t touched this setting, <strong>you are contributing your prompts, your questions, your project descriptions, and your image uploads to OpenAI&#8217;s next model whether you intended to or not</strong>.</p><p>There&#8217;s a catch even if you opt out: <strong>OpenAI retains your conversations for 30 days regardless</strong>, citing &#8220;safety and abuse monitoring.&#8221; Zero is not on the menu.</p><h2>Claude (Anthropic)</h2><p>In August 2025, Anthropic announced that Claude would begin using conversations for training. Before that, it didn&#8217;t. The new policy gave users a choice: opt in or opt out; but the framing mattered: if you didn&#8217;t respond to the policy change, <strong>your silence was treated as consent</strong>. Anthropic began collecting data in October 2025.</p><p><strong>Claude Free, Pro, Max consumer account plans:</strong></p><p>If you opt out: <strong>30-day retention</strong>, same as before.</p><p>If you stay opted in (or missed the window): <strong>five-year retention</strong>.</p><p>That&#8217;s not a typo. <em><strong>Five (5!!) years</strong></em>. Ugh!</p><h2>Gemini (Google)</h2><p>Gemini saves your conversations for <strong>18 months by default</strong>. That&#8217;s adjustable down to <strong>three months or up to three years,</strong> but the 18-month default is where you start if you&#8217;ve never changed it. Google also notes that <strong>human reviewers may examine conversations</strong> as part of product improvement. This is a major reason I don&#8217;t use Gemini. You must make your own decision here.</p><p>There&#8217;s a newer feature worth knowing about: <strong>Temporary Chats</strong>. These d<strong>isappear after 72 hours and are not used for training</strong>. If you&#8217;re working on something sensitive, a project pitch, client-facing creative work, anything you wouldn&#8217;t want Google to keep, Temporary Chat is the right mode.</p><h2>Adobe / Lightroom / Firefly</h2><p>This one matters most for photographers and visual artists, so it gets more space.</p><p>Adobe allows content analysis of files processed or stored through Creative Cloud and Document Cloud apps. The company says this analysis is used for product improvement, understanding how features are being used, what&#8217;s working, what isn&#8217;t. You can <strong>opt out at the account level.</strong></p><p>What Adobe doesn&#8217;t advertise loudly: Firefly, Adobe&#8217;s generative AI image tool marketed as &#8220;ethically trained&#8221; and &#8220;commercially safe,&#8221; <strong>was <a href="https://cyber.harvard.edu/story/2024-04/adobes-ethical-firefly-ai-was-trained-midjourney-images">partially trained</a> on AI-generated images from competitors <a href="https://www.creativebloq.com/news/adobe-firefly-trained-on-midjourney">including Midjourney</a></strong>. This came out in a Bloomberg investigation in 2024. <strong>Adobe acknowledged that approximately 5% of Firefly&#8217;s training data came from AI-generated images produced by rival platforms.</strong></p><p>For artists who chose Adobe precisely because of the ethical-training promise, that disclosure matters. It does appear Adobe&#8217;s exposure after the investigation may have influenced its emphasis on &#8220;commercially safe&#8221; model training and <a href="https://www.gradually.ai/en/ai-image-models/">tighter integration within its own ecosystem</a>. Looks like yet another giant company acting without permission and asking for forgiveness later.</p><h2>The Settings: Here&#8217;s the Off Switch</h2><p>This is the part that matters. The opt-outs are real. They work. They take less than five minutes per tool. Here&#8217;s exactly where to find them.</p><h3><a href="https://help.openai.com/en/articles/7730893-data-controls-faq">ChatGPT</a></h3><ol><li><p>Log in at chat.openai.com</p></li><li><p>Click your profile icon (top right corner)</p></li><li><p>Select <strong>Settings</strong></p></li><li><p>Click <strong>Data Controls</strong></p></li><li><p>Find &#8220;Improve the model for everyone&#8221;</p></li><li><p>Toggle it <strong>off</strong></p></li></ol><p>Done. New conversations from that point forward are not used for training. The setting applies to your entire account, on every device.</p><blockquote><p><strong>Note:</strong> This <strong>does not delete past conversations</strong>. If you want those gone, you&#8217;ll need to delete your chat history separately through the same Data Controls menu.</p></blockquote><h3><a href="https://privacy.claude.com/en/articles/12109829-how-do-i-change-my-model-improvement-privacy-settings">Claude</a></h3><p><strong>Desktop / Browser:</strong></p><ol><li><p>Click your name or profile icon</p></li><li><p>Select <strong>Settings</strong></p></li><li><p>Click <strong>Privacy</strong></p></li><li><p>Find &#8220;<strong>Help Improve Claude</strong>&#8220;</p></li><li><p>Toggle it <strong>off</strong></p></li></ol><blockquote><p><strong>Mobile:</strong></p><p>Same path &#8218; your name&#8218; Settings&#8218; Privacy &#8218; Help Improve Claude &#8218; <strong>off</strong>.</p></blockquote><p>Once the toggle is off, new conversations are not used for future model training. Already-stored conversations and anything already in training pipelines may still be used, Anthropic&#8217;s policy is explicit about that. <strong>You&#8217;re changing what happens going forward, not erasing the past.</strong></p><h3><a href="https://www.tomsguide.com/ai/google-gemini/how-to-stop-gemini-from-training-on-your-data">Gemini</a></h3><p><strong>To stop data collection going forward:</strong></p><ol><li><p>Go to gemini.google.com and sign in</p></li><li><p>Click the <strong>Activity</strong> icon (clock with arrow, top of left sidebar)</p></li><li><p>Find <strong>Gemini Apps Activity</strong></p></li><li><p>Toggle it <strong>off</strong></p></li></ol><blockquote><p><strong>To use conversations that disappear automatically:</strong></p><p>Look for the dotted chat icon next to the New Chat button. This starts a <strong>Temporary Chat, </strong>conversations in this mode expire after 72 hours and are excluded from training data by default.</p></blockquote><p><strong>For sensitive creative work, Temporary Chat is worth making a habit.</strong></p><h3><a href="https://helpx.adobe.com/account/individual/terms-policies-and-regulations/content-analysis-faq.html">Adobe Creative Cloud - Personal Account</a></h3><p><strong>To opt out of content analysis:</strong></p><ol><li><p>Go to <a href="https://account.adobe.com/privacy">account.adobe.com/privacy</a> and sign in</p></li><li><p>Find the <strong>content analysis option</strong> (listed under machine learning / product improvement)</p></li><li><p><strong>Deselect or toggle off</strong> the permission</p></li></ol><p><strong>Adobe&#8217;s opt-out does not affect:</strong></p><ul><li><p>Content you&#8217;ve submitted to Adobe Stock</p></li><li><p>Any content analysis you&#8217;ve already consented to</p></li></ul><h2>The Honest Part</h2><p>I want to be straight with you, because there&#8217;s a version of this piece that isn&#8217;t.</p><p><strong>Opting out of training is not the same as opting out of data collection</strong>. These companies still retain your conversations after you opt out, for 30 days (OpenAI and Anthropic) or up to 72 hours for Temporary Chats (Google). The data passes through their servers regardless. The opt-outs tell them not to use your conversations to build future models. <strong>They don&#8217;t promise your data never touches their infrastructure.</strong></p><p>If you want zero data collection, there&#8217;s only one answer: <strong>don&#8217;t send your data to their servers at all.</strong> Tools like <strong><a href="https://ollama.com">Ollama</a>, <a href="https://lmstudio.ai/">LM Studio</a>, and <a href="https://jan.ai%20">Jan.ai</a> run AI models locally on your machine,</strong> with no external connection unless you configure one. Nothing leaves your computer. No retention policy matters because there&#8217;s nothing to retain.</p><p><strong>The trade-off is real.</strong> Local models are improving fast, but they are not ChatGPT. <strong>They require more setup</strong>. <strong>They require a machine with enough processing power to run them</strong>. <strong>For most artists, a local model is the wrong tool for everyday work</strong>, it&#8217;s a specialist choice for specific situations.</p><p>But for sensitive work, contract negotiations, client communications, business strategy, <strong>knowing the local option exists is worth something.</strong></p><h2>Midjourney, the exception worth naming</h2><p>One tool I haven&#8217;t given you opt-out steps for: Midjourney. That&#8217;s not an oversight.</p><p><strong><a href="Midjourney%20has%20no%20opt-out%20for%20prompt%20training">Midjourney has no opt-out for prompt training</a></strong>. When you type a prompt into Midjourney, that prompt goes into their training pipeline. There is no setting to change that. If you use Midjourney, your prompts train their model. That&#8217;s the product&#8217;s terms of service.</p><p>Midjourney earned a <strong><a href="https://privacy.commonsense.org/evaluation/Midjourney">privacy rating of D+</a> (38 out of 100) from Common Sense Privacy Watchdog</strong>. I&#8217;m citing that number so you know it came from somewhere, not because I think grades tell the whole story. The story is: <strong>if prompt privacy matters to you, Midjourney is the wrong tool.</strong></p><h2>Where I Landed</h2><p>I use AI tools every day: Claude, CoPilot, Brave Leo, NotebookLM. I&#8217;ve been a Google Gmail subscriber for over 20 years. I have written about <a href="https://essentialriskmgt.com/p/slamming-the-door-on-google-account">reducing Google surveillance</a> before and have locked down my personal account as tight as a snare drum. I am fully aware that using Google&#8217;s AI tools (and others) exposes me to their surveillance. My personal process is to minimize my footprint when using online tools as much as possible.</p><p>The only way we can eliminate surveillance of our activity online is to reduce our own online activity. Therefore, when I need an AI tool, my first choice is to find one that runs locally on my Mac or Windows 11 PC. I have sufficient expertise and time to tinker under the hood of my systems to make sure things work safely and securely. If you have similar expertise, this is the path forward. If not, stay tuned for more guides like this to help you in the future.</p><p>Which of these tools surprised you most and have you found a setting I missed? Tell me in the comments.</p><p>And if you want this kind of analysis in your inbox every two weeks &#8212; cybersecurity, AI tools, privacy, and the tech industry&#8217;s fine print translated into plain English for creative professionals &#8212; <strong>hit the Subscribe button</strong>. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://essentialriskmgt.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://essentialriskmgt.com/subscribe?"><span>Subscribe now</span></a></p><p>Keep those online Nosey Neighbors guessing about what we are doing, because it&#8217;s none of their bee&#8217;s wax!</p>]]></content:encoded></item><item><title><![CDATA[Five Powerful Tools That Slash Your Audio Production Time — Without Handing Your Unreleased Work to a Tech Company.]]></title><description><![CDATA[Not all AI audio tools are created equal. Some run locally and never touch the internet.]]></description><link>https://essentialriskmgt.com/p/five-powerful-tools-that-slash-your</link><guid isPermaLink="false">https://essentialriskmgt.com/p/five-powerful-tools-that-slash-your</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Sat, 28 Feb 2026 20:38:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Hd8V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3dd33e07-880e-4f03-9239-fb82ae15eed0_5616x3744.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Hd8V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3dd33e07-880e-4f03-9239-fb82ae15eed0_5616x3744.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Hd8V!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3dd33e07-880e-4f03-9239-fb82ae15eed0_5616x3744.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Hd8V!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3dd33e07-880e-4f03-9239-fb82ae15eed0_5616x3744.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Hd8V!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3dd33e07-880e-4f03-9239-fb82ae15eed0_5616x3744.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Hd8V!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3dd33e07-880e-4f03-9239-fb82ae15eed0_5616x3744.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Hd8V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3dd33e07-880e-4f03-9239-fb82ae15eed0_5616x3744.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3dd33e07-880e-4f03-9239-fb82ae15eed0_5616x3744.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3968451,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/188554501?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3dd33e07-880e-4f03-9239-fb82ae15eed0_5616x3744.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Hd8V!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3dd33e07-880e-4f03-9239-fb82ae15eed0_5616x3744.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Hd8V!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3dd33e07-880e-4f03-9239-fb82ae15eed0_5616x3744.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Hd8V!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3dd33e07-880e-4f03-9239-fb82ae15eed0_5616x3744.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Hd8V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3dd33e07-880e-4f03-9239-fb82ae15eed0_5616x3744.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">image courtesy of Dimhou from Pixabay</figcaption></figure></div><p>You spent six hours last Tuesday editing a 45-minute podcast episode. Four of those hours were you staring at a waveform, hunting for the exact moment your guest said &#8220;um&#8221; for the forty-seventh time. One hour was actually creative work. <strong>The other hour was you questioning your life choices</strong>. Meanwhile, AI tools exist right now that could have handled the um-hunting, the noise reduction, the level balancing, and the transcript &#8212; all before your coffee got cold.</p><p>Every tech company with a microphone icon in their logo wants your recordings. They want them to train their AI +models, improve their products, and quietly turn your unreleased works into someone else&#8217;s competitive advantage &#8212; all buried in page 47 of an obfuscated terms-of-service document written by lawyers who were paid to make it not readable by mere mortals.</p><p>Here&#8217;s the thing they don&#8217;t want you to know:</p><blockquote><p>The most powerful AI audio tools available today don&#8217;t need to keep your files. They run on your machine, offline, and they&#8217;re free.</p><p><em><strong>This is the guide the SaaS industry hoped you&#8217;d never find.</strong></em></p></blockquote><p>The best privacy protection for your recordings is for them and your audio processing to never leave your machine. That&#8217;s what &#8220;runs locally&#8221; means: recordings, edits, special effects, stay put on your device. Period. An added benefit is improved tool performance due to reduced wait time for network activity (latency) when using a cloud service.</p><p>This is not to say that online cloud services can&#8217;t do the job. There are many quite capable services out there that protect your recordings to various degrees, two of which I&#8217;ll cover after local tools are discussed. Before using the cloud for your audio processing, you must make an informed decision about specific <strong>cloud service trustworthiness.</strong></p><p><em><strong>Key question to answer:</strong></em></p><blockquote><p>Will the cloud service respect your data &amp; intellectual property (IP) rights and not convert your recordings into their AI training materials or other unauthorized use?</p></blockquote><p>There may be a case where a cloud service offers a feature or function that is vital to your operation. In that situation, you should invest some time to read their terms of service to determine what intellectual property rights and data you relinquish, if any, when agreeing to use the service.</p><div class="pullquote"><p>Bottom line: <strong>never assume a cloud service will protect your recordings</strong>.</p><p>Assume your recordings will be used to train their AI systems unless the terms of service clearly states otherwise.</p></div><h1>IP and Data Safety: 3 tools that run locally on your machine</h1><h2>Ultimate Vocal Remover (UVR) with Demucs</h2><h3>Best for: Musicians, audio engineers, music producers</h3><p><a href="https://ultimatevocalremover.com/">UVR is a free, open-source desktop app</a> that wraps <a href="https://dev.to/stevecase430/complete-guide-to-setting-up-demucs-locally-for-ai-stem-separation-580h">Meta&#8217;s Demucs AI model</a> in a point-and-click interface &#8212; <em>no command line required</em>. It separates any mixed audio into individual stems: vocals, drums, bass, guitar, piano, and other instruments. Once the models are downloaded, it works entirely offline. Your source recordings never go anywhere.</p><p><strong>Use cases:</strong> isolating a guitar part to learn a riff, creating instrumental tracks for practice, remixing, or studying how a favorite record was produced.</p><p><strong>Honest caveat:</strong> The original Demucs GitHub repo is no longer actively maintained (the lead researcher left Meta). <a href="https://github.com/Anjok07/ultimatevocalremovergui/discussions">UVR&#8217;s maintained community</a> wraps the last stable version and keeps it working. It&#8217;s not a concern for normal use, but worth knowing.</p><p><strong>Tutorial: </strong><a href="https://www.aleksandrhovhannisyan.com/">Aleksandr Hovhannisyan</a>, a developer and musician, wrote a step-by-step guide with screenshots specifically for setting up UVR with Demucs models. It&#8217;s practical, no-fluff, and written for people who aren&#8217;t programmers. Check it out at <a href="https://www.aleksandrhovhannisyan.com/notes/stem-separation/">https://www.aleksandrhovhannisyan.com/notes/stem-separation/</a></p><h2>MacWhisper (Mac) / Whisper via Audacity (Windows/Linux)</h2><h3>Best for: Podcasters, audio recordists, interviewers</h3><p><a href="https://apps.apple.com/us/app/whisper-transcription/id1668083311">MacWhisper is a native macOS app</a> built on <a href="https://github.com/openai/whisper">OpenAI&#8217;s open-source Whisper model</a>. It runs fully offline on <strong>Apple Silicon</strong> and <strong>transcribes audio to text</strong> with over 100 languages supported, batch processing, and speaker identification. One-time purchase is available along with standard Apple AppStore subscription options. The developer is <a href="https://www.youtube.com/@jordibruin/videos">Jordi Bruin</a>, a well-regarded indie Mac developer with a track record of privacy-respecting apps.</p><p>For Windows/Linux users, Whisper can be integrated into <a href="https://www.audacityteam.org/">Audacity</a> (free, open-source), giving them the same local transcription capability in a familiar audio editing environment. Please be aware that Audacity itself has some controversy: it was acquired by Muse Group in 2021; there was some <a href="https://www.techradar.com/news/audacity-fans-are-absolutely-furious-right-now-heres-why">embroilment after the acquisition regarding data privacy</a>&#8212;particularly a privacy policy clause mentioning that personal data might occasionally be shared with &#8220;<a href="https://musictech.com/news/industry/audacity-labelled-spyware-controversial-data-collection-privacy-policy-changes/">our main office in Russia</a>&#8220;. Also, its terms of service and data protection became murkier.</p><p><strong>Honest caveat:</strong> MacWhisper Pro features (batch transcription, global dictation mode) require a paid upgrade. The free tier handles single-file transcription, which is enough to <strong>evaluate it</strong> then you can make an informed decision.</p><p><strong>Tutorial:</strong> MacWhisper has official documentation at <a href="https://macwhisper.com">https://macwhisper.com</a>. For the Audacity + Whisper integration on Windows, have a look at <a href="https://businessoddcast.com/free-audio-to-text-transcription-guide-using-audacity/">https://businessoddcast.com/free-audio-to-text-transcription-guide-using-audacity/</a> for a step-by-step guide. Check the MacWhisper Community on Reddit - <a href="https://www.reddit.com/r/MacWhisper/">https://www.reddit.com/r/MacWhisper/</a> for current issues and use cases.</p><h3>FYI:</h3><ul><li><p>If you want to open <strong>m4a</strong> files (macOS/iPhone audio) you will need to install the <a href="https://lame.buanzo.org/ffmpeg.php">ffmpeg for Audacity</a> library from <a href="https://lame.buanzo.org/FFmpeg_5.0.0_for_Audacity_on_Windows_x86_64.exe">https://lame.buanzo.org/FFmpeg_5.0.0_for_Audacity_on_Windows_x86_64.exe</a></p></li><li><p>In the Windows instructions above ~ <strong>OpenVINO AI Effects</strong> are found under the Audacity <em><strong>Effect</strong></em> menu item</p></li></ul><h2>Magenta Studio (Google) &#8212; Ableton Live Plugin</h2><h3>Best for: Musicians using Ableton Live</h3><p><a href="https://magenta.withgoogle.com/">Google&#8217;s open-source Magenta project</a> ships a set of <a href="https://www.ableton.com/en/blog/magenta-studio-free-ai-tools-ableton-live/">AI plugins</a> that run inside <a href="https://www.ableton.com/en/live/">Ableton Live</a>. The tools assist with melody continuation, drum pattern generation, and harmonic interpolation. Once installed, they run locally against downloaded models. No cloud calls during use.</p><p><strong>Honest caveat #1: </strong><em>This one has a steeper learning curve</em> &#8212; it requires <a href="https://www.ableton.com/en/live/">Ableton Live</a> (not free: $99, $439, $749) and some setup. It&#8217;s for the <em>serious musician audience</em>, not podcasters or recordists. Worth including because it&#8217;s the <em>most musically sophisticated local tool available</em>, and it&#8217;s <em>developed by Google Brain researchers</em>, not a SaaS startup with a training-data business model.</p><p><strong>Honest caveat #2</strong>: Magenta Studio is viewed more as a research/experimental instrument than a polished production tool, since it was developed by a Google Brain research group rather than a product team. This likely explains the lack of serious critical reviews &#8212; it&#8217;s positioned as an academic/creative experiment rather than a commercial plugin. For more hands-on opinions, browsing the <a href="https://www.reddit.com/r/ableton">r/ableton</a> or <a href="https://www.reddit.com/r/WeAreTheMusicMakers">r/WeAreTheMusicMakers</a> subreddits would yield the most honest user feedback.</p><p><strong>Tutorial:</strong> The Magenta team maintains official tutorials and demo videos at <a href="https://magenta.tensorflow.org/studio">https://magenta.tensorflow.org/studio</a>.</p><h1>CLOUD TOOLS</h1><h2>Upload required, but contractually protected (or not)</h2><p>When considering using a cloud service, remember that <strong>you are uploading your recordings to someone else&#8217;s server over which you have no control.</strong> The question: <strong>do the service&#8217;s contractual protections and data practices give you reasonable confidence that your recordings are protected</strong>. That&#8217;s where I actually found meaningful differences. A well written law mandating data protection (<strong><a href="https://gdpr.eu/">EU GDPR</a></strong>) is preferable to <em>impenetrable corporate Terms of Service agreements</em> that can radically change on a whim.</p><p>You must make a decision weighing that the features, functions, and outcome of the service sufficiently justifies you relinquishing some, most, or all of your data protection. </p><div class="pullquote"><p>As, the <a href="https://indianajones.fandom.com/wiki/Grail_Knight">Grail Night</a> in the movie <a href="https://en.wikipedia.org/wiki/Indiana_Jones_and_the_Last_Crusade">Indiana Jones and the Last Crusade</a> stated:</p><p><strong>&#8220;Choose wisely.&#8221;</strong></p></div><h2>Auphonic</h2><h3>Best for: Podcasters, broadcast audio producers</h3><p><a href="https://auphonic.com/">Auphonic</a> is an <strong>Austrian company</strong> operating under <strong><a href="https://gdpr.eu/">EU GDPR</a></strong>. It automates the most tedious post-production tasks: noise reduction, adaptive level balancing, loudness normalization to platform standards (Spotify, Apple Podcasts, YouTube), silence trimming, and transcript generation. Two hours of processing free per month.</p><p><strong>Why this cloud service earns some trust:</strong> A third-party service called <a href="https://cleancutvo.com/">CleanCut VO</a><strong> </strong><a href="https://cleancutvo.com/privacy-policy">explicitly documents in their terms</a> about Auphonic (Audio Processing Partner) &#8220;<em><strong>No data is used for AI training or external analysis.</strong></em>&#8220; <em>Auphonic deletes processed files on a roughly 21-day cycle</em>. The company is GDPR-bound &#8212; meaning <strong>EU data protection law</strong>, not just a self-written privacy policy that can be summarily modified on impulse. They also added two-factor authentication in September 2025.</p><p><strong>Honest caveat:</strong> You are still uploading your recordings to someone else&#8217;s server that you do not control. If your recording contains something you&#8217;d never want on a server in Austria, use a local tool instead. The privacy protection here is contractual and legal, with <strong>sharp teeth</strong>, not architectural.</p><p><strong>Tutorial:</strong> The Auphonic blog and documentation is written by founder <a href="https://x.com/gholzmann">Georg Holzmann</a>, an audio researcher who built the algorithms. The official tutorial library is at <a href="https://auphonic.com/blog">https://auphonic.com/blog</a> and covers every feature with technical depth.</p><h2>Descript</h2><h3>Best for: Podcasters who want text-based audio editing</h3><p><a href="https://www.descript.com/">Descript</a> lets you edit audio by <strong>editing a transcript</strong> &#8212; delete a word in the text and the audio cut happens automatically. <em>It&#8217;s genuinely one of the most effective time-saving tools in podcasting</em>. <a href="https://www.descript.com/studio-sound">Studio Sound</a> cleans up room noise and phone-recorded audio automatically.</p><p><strong>The honest privacy picture:</strong> Descript is a US-based cloud service. The <a href="https://freedom.press/">Freedom of the Press Foundation</a> studied Descript and <a href="https://freedom.press/digisec/blog/how-secure-are-journalists-favorite-transcription-tools/">noted</a> the company has the technical <strong>ability to</strong> <strong>access uploaded audio</strong>.</p><p><strong>From Freedom of the Press article:</strong></p><blockquote><p>Behind the scenes, Descript is using a small handful of services to process transcripts. Descript uses <em><a href="https://cloud.google.com/speech-to-text">Google Cloud Speech-to-Text</a></em><a href="https://cloud.google.com/speech-to-text"> </a>to provide automatic transcription. Google says it deletes your data from its servers after the transcription is completed. According to its documentation, Descript also uses <a href="https://www.trustpilot.com/review/www.rev.com">Rev</a> to provide automatic or human transcription. Descript says, &#8220;If you request a <strong>White Glove transcription</strong>, <strong>we will share your audio files with Rev,</strong> which has strict confidentiality agreements with all of its employees.&#8221;</p></blockquote><p><strong>The &#8220;Overdub&#8221; feature explicitly uses your recordings train AI:</strong></p><blockquote><p>Descript offers a powerful feature called <a href="https://www.descript.com/blog/article/overdub-on-all-plans">Overdub</a>, which allows users to insert realistic computer-generated voices into the transcript. To accomplish this, Descript uses <em><a href="https://cloud.google.com/text-to-speech">Google Cloud</a></em><a href="https://cloud.google.com/text-to-speech"> </a>to process and reproduce your voice. Descript will generate &#8220;nondefamatory&#8221; samples of your voice, and <strong>human reviewers</strong> on <a href="https://www.mturk.com/">Amazon&#8217;s Mechanical Turk</a> will listen to this sample audio to confirm the resulting voice sounds accurate. The company is clear that if you use Overdub, &#8220;<strong>We train and host your artificial voice using Google Cloud. Also, we use the audio that you shared as &#8216;Training Audio&#8217; to improve our service.&#8221;</strong> Descript says its <strong>employees may also review the uploaded audio</strong>, as well as computer-generated output audio for quality assurance.</p></blockquote><p>Descript does not offer two-factor authentication for standard accounts (only enterprise accounts with <a href="https://en.wikipedia.org/wiki/Single_sign-on">SSO</a>). <em>This is a concern</em> for <strong>independent reporters, podcasters, and activists who publish controversial or political topics</strong>. Your only source of protection here is by using an <a href="https://proton.me/blog/how-to-send-an-anonymous-email">anonymous email address</a> and a very long and complex password created by your <a href="https://www.gartner.com/reviews/market/password-management-tools">local password manager</a>. Not ideal, but usable.</p><p><strong>Tutorial:</strong> Descript maintains an <a href="https://www.youtube.com/@Descript/playlists">official YouTube channel</a> with professional tutorial videos. Podcasting educator <strong>Pat Flynn</strong> (Smart Passive Income, 5+ million podcast downloads) has published <a href="https://www.youtube.com/watch?v=-7x3CbbR-ns">workflow guides using Descript</a> that are practical and beginner-accessible.</p><div class="pullquote"><p>Descript is a genuinely useful tool &#8212; <strong>BUT</strong> artists, podcasters, and reporters with sensitive or controversial unreleased recordings should know what &#8220;cloud-based&#8221; actually means, who has access to your uploads, and under what circumstances your data will be used by cloud-based third party services.</p></div><h1><strong>Your Path Forward</strong></h1><p>You got into music, podcasting, or audio recording because you love music, lively conversations, and strive to make the world a better place. You did not sign up to become an unpaid data laborer for a Silicon Valley company&#8217;s AI training pipeline. And yet &#8212; here we are.</p><p>The good news: you don&#8217;t have to choose between powerful AI tools and keeping your recordings off someone else&#8217;s server. <strong>Ultimate Vocal Remover, MacWhisper, and Magenta Studio run entirely on your machine</strong>. No uploads. No terms-of-service gymnastics. No lawyer-written surprises on page 47.</p><p>If you need cloud features, Auphonic earns a cautious green light under EU GDPR. Descript is genuinely powerful &#8212; <strong>just go in with your eyes open</strong> about what it does with your voice if you use Overdub.</p><p><strong>Five</strong> tools. <strong>One</strong> decision framework. <strong>Zero excuses</strong> to spend another Sunday afternoon hunting for the forty-seventh &#8220;um.&#8221;</p><p>If this breakdown saved you time, spared you a bad decision, or just made you feel slightly less alone in your production suffering &#8212; share it with a musician, podcaster, reporter, or audio recordist who needs it. They&#8217;re out there right now, staring at a waveform, <strong>questioning their life choices</strong>.</p><p>And if you want this kind of analysis in your inbox every two weeks &#8212; cybersecurity, AI tools, privacy, and the tech industry&#8217;s fine print translated into plain English for creative professionals &#8212; hit the Subscribe button. Your recordings will thank you.</p><p>Let&#8217;s make something worth protecting.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://essentialriskmgt.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://essentialriskmgt.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://buymeacoffee.com/pcaloca" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GEyq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2630037c-c569-4c01-8e36-c1a46a93e98a_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!GEyq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2630037c-c569-4c01-8e36-c1a46a93e98a_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!GEyq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2630037c-c569-4c01-8e36-c1a46a93e98a_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!GEyq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2630037c-c569-4c01-8e36-c1a46a93e98a_1600x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GEyq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2630037c-c569-4c01-8e36-c1a46a93e98a_1600x400.jpeg" width="244" height="61" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2630037c-c569-4c01-8e36-c1a46a93e98a_1600x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:244,&quot;bytes&quot;:294373,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://buymeacoffee.com/pcaloca&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/188554501?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2630037c-c569-4c01-8e36-c1a46a93e98a_1600x400.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GEyq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2630037c-c569-4c01-8e36-c1a46a93e98a_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!GEyq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2630037c-c569-4c01-8e36-c1a46a93e98a_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!GEyq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2630037c-c569-4c01-8e36-c1a46a93e98a_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!GEyq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2630037c-c569-4c01-8e36-c1a46a93e98a_1600x400.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div>]]></content:encoded></item><item><title><![CDATA[AI Won't Replace Your Eye]]></title><description><![CDATA[But It Might Save Your Weekend]]></description><link>https://essentialriskmgt.com/p/ai-wont-replace-your-eye</link><guid isPermaLink="false">https://essentialriskmgt.com/p/ai-wont-replace-your-eye</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Mon, 16 Feb 2026 23:42:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!RYvv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec54c224-abe5-492e-a0ef-53d74e417f37_2276x1157.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RYvv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec54c224-abe5-492e-a0ef-53d74e417f37_2276x1157.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RYvv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec54c224-abe5-492e-a0ef-53d74e417f37_2276x1157.jpeg 424w, https://substackcdn.com/image/fetch/$s_!RYvv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec54c224-abe5-492e-a0ef-53d74e417f37_2276x1157.jpeg 848w, https://substackcdn.com/image/fetch/$s_!RYvv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec54c224-abe5-492e-a0ef-53d74e417f37_2276x1157.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!RYvv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec54c224-abe5-492e-a0ef-53d74e417f37_2276x1157.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RYvv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec54c224-abe5-492e-a0ef-53d74e417f37_2276x1157.jpeg" width="1456" height="740" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ec54c224-abe5-492e-a0ef-53d74e417f37_2276x1157.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:740,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2604790,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/188198604?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec54c224-abe5-492e-a0ef-53d74e417f37_2276x1157.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RYvv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec54c224-abe5-492e-a0ef-53d74e417f37_2276x1157.jpeg 424w, https://substackcdn.com/image/fetch/$s_!RYvv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec54c224-abe5-492e-a0ef-53d74e417f37_2276x1157.jpeg 848w, https://substackcdn.com/image/fetch/$s_!RYvv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec54c224-abe5-492e-a0ef-53d74e417f37_2276x1157.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!RYvv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec54c224-abe5-492e-a0ef-53d74e417f37_2276x1157.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>You&#8217;ve heard the arguments. AI is coming for artists. It&#8217;s going to replace photographers, devalue videographers, and turn every person with a phone into a creative professional. If you&#8217;ve been skeptical, I don&#8217;t blame you. Some of that skepticism is well earned.</p><p>But here&#8217;s what most of the breathless AI coverage gets wrong: the most useful AI tools for visual artists aren&#8217;t the ones generating images from text prompts. They&#8217;re the ones that handle the tedious, repetitive production work you&#8217;ve been doing manually for years &#8212; the hours of noise cleanup, masking, color matching, and reformatting that eat your weekends while contributing nothing to your creative vision.</p><p>The eye is yours. The composition is yours. The story you&#8217;re telling is yours. AI can&#8217;t replace any of that. What it <em>can</em> do is carry the grunt work so you can spend more time behind the camera and less time hunched over a screen pushing sliders.</p><p>Let me show you what I mean.</p><h2>The Craft vs. The Grind</h2><p>Every visual artist knows there are two sides to the work. There&#8217;s the craft &#8212; choosing the angle, reading the light, timing the shot, framing the story. That&#8217;s the part you trained for. That&#8217;s the part that makes your work <em>yours</em>.</p><p>Then there&#8217;s the grind &#8212; batch editing noise out of two hundred event photos, manually masking a sky in every landscape shot, color matching clips from three different cameras, reformatting a horizontal video into six different aspect ratios for six different platforms. That&#8217;s not creative work. That&#8217;s production labor. And it&#8217;s exactly where AI earns its keep.</p><p>The distinction matters because the AI tools worth your attention aren&#8217;t trying to <em>be</em> the artist. They&#8217;re trying to be a really good assistant &#8212; one that handles the mechanical tasks so you can focus on the decisions that actually require a human eye.</p><h2>Practical Example: Photography</h2><p><strong>The scenario:</strong> You shot an outdoor portrait session at golden hour, but the light faded faster than expected. Your last thirty frames were captured at ISO 3200 and above. The shots are beautifully composed &#8212; great expressions, perfect timing &#8212; but they&#8217;re noisy, and the sky behind your subject has gone flat.</p><p><strong>The old way:</strong> You&#8217;d spend an hour or more in Lightroom manually brushing masks around your subject&#8217;s hair, adjusting noise reduction frame by frame, then separately selecting and enhancing the sky in each image. For thirty photos, that&#8217;s an entire evening.</p><p><strong>The AI way:</strong> Two tools can cut that time dramatically.</p><p>First, <strong>Adobe Lightroom&#8217;s AI Masking</strong> can automatically detect and select your subject, sky, and background with a single click. Select Subject isolates the person. Select Sky grabs just the sky. You make your adjustments &#8212; boost the sky&#8217;s warmth and saturation, brighten the subject&#8217;s exposure &#8212; and the AI-generated mask handles the edges, including flyaway hair and complex silhouettes that would take fifteen minutes to brush by hand. Apply those masks across all thirty images, and you&#8217;ve just saved hours.</p><p>Second, <strong>Topaz Photo AI</strong> can tackle the noise. Load your high-ISO raw files, and its Autopilot feature analyzes each image individually, selecting the right noise reduction model and strength. It distinguishes between noise and genuine detail &#8212; preserving texture in skin, fabric, and hair while smoothing the grain in shadow areas. Wildlife photographer Kate Scott, writing for Fstoppers, described how the tool changed her entire approach to low-light shooting because she no longer has to worry about pushing her ISO.</p><p><strong>Step-by-step tutorials to get started:</strong></p><ul><li><p><strong>Adobe&#8217;s</strong> official guide to <strong>AI Masking in Lightroom Classic</strong> (<a href="https://helpx.adobe.com/lightroom-classic/help/masking.html">https://helpx.adobe.com/lightroom-classic/help/masking.html</a>)</p></li><li><p><strong>Fstoppers&#8217; complete three-part guide to Lightroom Masking by Ryan Mense</strong> (Part 1) (<a href="https://fstoppers.com/lightroom/complete-guide-mastering-lightroom-masking-part-1-658761">https://fstoppers.com/lightroom/complete-guide-mastering-lightroom-masking-part-1-658761</a>)</p></li><li><p><strong>Michael Breitung&#8217;s </strong>walkthrough of T<strong>opaz Photo AI </strong>(Fstoppers) (<a href="https://fstoppers.com/post-production/how-unlock-full-potential-your-photos-topaz-photo-ai-626509">https://fstoppers.com/post-production/how-unlock-full-potential-your-photos-topaz-photo-ai-626509</a>)</p></li></ul><h2>Practical Example: Video</h2><p><strong>The scenario:</strong> You filmed a short promotional video for a local gallery using two different cameras &#8212; your main camera and a backup with a different color profile. Now the footage from Camera B looks warmer and slightly overexposed compared to Camera A. You also need vertical versions of the final cut for Instagram Reels and TikTok.</p><p><strong>The old way:</strong> You&#8217;d manually color grade each Camera B clip to match Camera A, adjusting white balance, exposure, and saturation shot by shot. Then you&#8217;d go back through the entire timeline and manually reposition every clip for a 9:16 crop, keyframing the position to keep your subject centered as they move.</p><p><strong>The AI way:</strong> <strong>DaVinci Resolve</strong> &#8212; the industry-standard color grading software that also happens to have a powerful free version &#8212; includes AI tools that handle both tasks.</p><p>For color matching, the Color page&#8217;s <strong>Shot Match</strong> feature lets you select a reference clip from Camera A, then automatically match Camera B&#8217;s color and exposure to it. The AI analyzes lighting conditions, skin tones, and scene context, then applies a grade that gets you 80&#8211;90% of the way there in seconds. You refine from there instead of starting from scratch.</p><p>For reformatting, <strong>Smart Reframe</strong> (available in the Studio version) uses AI to track your subject and automatically reframe your 16:9 footage for vertical or square output. It generates the position keyframes for you, keeping the subject centered as they move through the frame. What used to take an hour of manual keyframing now takes a few clicks.</p><p><strong>Step-by-step tutorials to get started:</strong></p><ul><li><p><strong>Larry Jordan&#8217;s</strong> walkthrough of automated color matching in <strong>DaVinci Resolve 20</strong> (<a href="https://larryjordan.com/articles/how-to-color-match-clips-in-davinci-resolve-20/">https://larryjordan.com/articles/how-to-color-match-clips-in-davinci-resolve-20/</a>)</p></li><li><p><strong>Salik Waquas</strong> (FilmmakingElements) on three practical <strong>color matching methods</strong> (<a href="https://filmmakingelements.com/color-match-in-davinci-resolve/">https://filmmakingelements.com/color-match-in-davinci-resolve/</a>)</p></li><li><p><strong>Envato Tuts+ AI-assisted DaVinci Resolve workflow </strong>(<a href="https://photography.tutsplus.com/articles/davinci-resolve-ai--cms-109186">https://photography.tutsplus.com/articles/davinci-resolve-ai--cms-109186</a>)</p></li><li><p><strong>Blackmagic Design&#8217;s Beginner&#8217;s Guide to DaVinci Resolve 20</strong> (PDF) (<a href="https://documents.blackmagicdesign.com/UserManuals/DaVinci-Resolve-20-Beginners-Guide.pdf">https://documents.blackmagicdesign.com/UserManuals/DaVinci-Resolve-20-Beginners-Guide.pdf</a>)</p></li></ul><h2>Before You Upload: The Security Sidebar</h2><p>Here&#8217;s where I put on my cybersecurity hat, because this part matters.</p><p>Before you feed your original images or footage into any AI tool, ask yourself three questions:</p><p><strong>Where do my files go?</strong> Some AI tools process everything <strong>locally</strong> on your computer. Others upload your work to <strong>cloud servers</strong>. Topaz Photo AI and DaVinci Resolve both process locally by default &#8212; <strong>your files stay on your machine</strong>. Cloud-based AI tools are convenient, but you should know whether <strong>your original files are being stored, used for training</strong>, or shared before you hand them over.</p><p><strong>What do the terms of service say about my work?</strong> Some platforms <em><strong>grant themselves broad licenses to use uploaded content</strong></em>. <em><strong>Read the fine print</strong></em>. If the terms say they can use your uploads <em>&#8220;to improve their services,&#8221;</em> that may mean your images end up in a training dataset.</p><p><strong>Am I uploading client work?</strong> If you&#8217;re processing images or video for a paying client, you may have <strong>contractual obligations</strong> about how that work is handled and stored. Uploading client work to a third-party cloud service without their knowledge c<strong>ould create liability issues</strong> you don&#8217;t want.</p><p>The tools I&#8217;ve described in this article were chosen partly because they respect your files. But the <em>landscape changes fast, and new tools appear every week</em> with flashy promises. A healthy habit: before you try any new AI service, <strong>spend two minutes checking whether it processes locally or in the cloud, and what rights you&#8217;re granting when you click &#8220;agree.&#8221;</strong></p><h2>You Don&#8217;t Have to Love AI</h2><p>You don&#8217;t have to be an AI enthusiast to benefit from these tools. You don&#8217;t have to change your artistic philosophy or embrace every new platform that launches. You just need to know what AI can carry so you can focus on what only you can see.</p><p>The composition, the timing, the emotion in the frame &#8212; that&#8217;s still entirely yours. AI can&#8217;t replace your eye. But it can give you your weekends back.</p><blockquote><p><em>P.S. If you found this useful, consider subscribing to <a href="https://essentialriskmgt.com/">Essential Risk Management</a>. I write about the places where creativity and cybersecurity collide &#8212; which, it turns out, is basically everywhere now. Free subscribers get the articles. Paid subscribers get the <strong>peace of mind</strong> that comes from knowing a p<strong>aranoid cybersecurity professional </strong>is watching the internet so they don&#8217;t have to. <strong>That&#8217;s cheaper than therapy.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://essentialriskmgt.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://essentialriskmgt.com/subscribe?"><span>Subscribe now</span></a></p></blockquote>]]></content:encoded></item><item><title><![CDATA[Funeral for Windows 10]]></title><description><![CDATA[The King is DEAD! Long live King Linux!]]></description><link>https://essentialriskmgt.com/p/funeral-for-windows-10</link><guid isPermaLink="false">https://essentialriskmgt.com/p/funeral-for-windows-10</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Sun, 26 Oct 2025 22:51:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QhNY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f610323-1b10-4167-8318-5cca45ef42c3_1536x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QhNY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f610323-1b10-4167-8318-5cca45ef42c3_1536x1024.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QhNY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f610323-1b10-4167-8318-5cca45ef42c3_1536x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!QhNY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f610323-1b10-4167-8318-5cca45ef42c3_1536x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!QhNY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f610323-1b10-4167-8318-5cca45ef42c3_1536x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!QhNY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f610323-1b10-4167-8318-5cca45ef42c3_1536x1024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QhNY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f610323-1b10-4167-8318-5cca45ef42c3_1536x1024.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3f610323-1b10-4167-8318-5cca45ef42c3_1536x1024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:91367,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/177216643?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f610323-1b10-4167-8318-5cca45ef42c3_1536x1024.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QhNY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f610323-1b10-4167-8318-5cca45ef42c3_1536x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!QhNY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f610323-1b10-4167-8318-5cca45ef42c3_1536x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!QhNY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f610323-1b10-4167-8318-5cca45ef42c3_1536x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!QhNY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f610323-1b10-4167-8318-5cca45ef42c3_1536x1024.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://essentialriskmgt.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://essentialriskmgt.com/subscribe?"><span>Subscribe now</span></a></p><h1>The King is DEAD! Long live the King! </h1><h3>Linux is the new King.</h3><p>Windows 10 support expired 10/14/25. Keeping Windows 10 after that date, with no further updates, is a major security risk I&#8217;m not willing to accept. What to do? <strong>Reincarnation: install Linux Mint.</strong></p><p>My Windows 10 hardware was purchased in 2015. It has an Intel i5 processor ~ medium powered CPU for word processing, email, and web browsing. I installed 32Gb of RAM to give multiple applications elbow room to coexist during a session. I added a 1Tb SSD for fast and vast storage. The hardware is still in good condition, quite usable and I&#8217;m unwilling to part with it. Hence, <em>installation of <strong>Linux Mint</strong> is a no brainer for me</em>.</p><p>Linux Mint was chosen after days of research into a viable Linux alternative to Widows 10. Why Linux? <strong>Free, as in zero cash outlay</strong>. Works &#8220;out of the box&#8221; on my ancient &#8220;Legacy Hardware&#8221;, including my existing Logitech webcam, Zoom Technologies USB-C audio interface, and Logitech wireless keyboard &amp; mouse combo. Hardware upgrades are not needed. <strong>It just works</strong>.</p><p>Another major consideration for my choice of Linux is familiarity: I&#8217;ve been working with UNIX-like operating systems as an IT professional for over 30 years and I know how to &#8220;<em>tinker with the twiddly bits</em>&#8221; under the hood when needed. However, after a long day at work, I have no desire to mess with stuff under the hood, thus my main desktop and laptop are Apple Macintosh machines. Point-and-click is my preferred mode of operation. The Mac platform operates in that mode flawlessly and does not unexpectedly crash like Windows. I also have a pair of Windows 11 virtual machines on my Mac&#8217;s I use for Windows-specific applications, such as <em><strong>Visio</strong></em>, a Microsoft diagramming tool used extensively in enterprise networking. <em><strong>I wanted a Linux environment where I had no need to tinker under the hood and I could point-and-click with little fuss, therefore Linux Mint is my choice.</strong></em></p><p>One obstacle to overcome is how to access my <em>years of data stored in the Microsoft ecosystem</em>: OneDrive cloud storage, MS Office - especially OneNote that I use extensively, Outlook for enterprise email/calendar/contacts, and video &amp; photo editing. As I have ready access to those tools on my Mac and Windows virtual machines, I&#8217;ve decided to table that issue for now and focus my efforts on a gradual move over time to non-Microsoft tools that are acceptable alternatives.</p><p>The remainder of this article provides an overview of what it took to get Linux Mint up and running on my legacy hardware.</p><h3>My funeral ritual commenced as follows:</h3><h1>1.  Download Linux Mint; Create an Installation Flash Drive</h1><p>Go the Mint download site at <a href="https://linuxmint.com/download.php">https://linuxmint.com/download.php</a> and choose your edition. I selected the &#8220;standard Cinnamon&#8221; desktop edition. It is a 3Gb software image with easy to follow <a href="https://linuxmint-installation-guide.readthedocs.io/en/latest/">Linux Mint Installation Guide</a>.</p><h1>2.  Verify Your ISO Image</h1><p>From the <strong>Linux Mint Installation Guide</strong>:</p><blockquote><p><em>It is important to verify the integrity and authenticity of your ISO image.</em></p><p><em>The integrity check confirms that your ISO image was properly downloaded and that your local file is an exact copy of the file present on the download servers. An error during the download could result in a corrupted file and trigger random issues during the installation.</em></p><p><em>The authenticity check confirms that the ISO image you downloaded was signed by Linux Mint, and thus that it isn&#8217;t a modified or malicious copy made by somebody else.</em></p></blockquote><p>I was still running Windows 10 and the instructions were a bit different for me ~ I found easy to follow verification instructions at <a href="https://forums.linuxmint.com/viewtopic.php?f=42&amp;t=291093">https://forums.linuxmint.com/viewtopic.php?f=42&amp;t=291093</a>.</p><p>I created a folder on my Desktop, put the ISO image and two verification files in the same folder, ran the verification program, and the output showed my files were intact and official. I could now create a bootable installation flash drive.</p><h1>3.  Install Etcher and Create a Bootable Installation Flash Drive</h1><p>Etcher is a wonderful tiny software program used to copy ISO images onto flash drive media. You will need a flash drive with at least 4Gb capacity. I had a 16Gb flash drive available, which worked fine. A 4GB DVD disk will function just as well and will be slower due to the limited DVD drive playback speeds.</p><p>I downloaded and installed Etcher from <a href="https://etcher.balena.io/#download-etcher">https://etcher.balena.io/#download-etcher</a>, choosing the Etcher for Windows (x86|x64) (Installer) Download option. I saved the download and ran the installer.</p><p>Copying the ISO image to the flash drive is a snap:</p><ul><li><p>Start Etcher</p></li><li><p>Select the ISO image from where you saved the file</p></li><li><p>Select the flash drive - be sure it&#8217;s the smallest disk size on the menu or you may inadvertently erase another hard disk! Oops!</p></li><li><p>Start the Flash copy ~ Etcher provides percent status as it goes</p></li><li><p>Done!</p></li></ul><p>Exit Etcher and I&#8217;m ready for installation of Linux Mint!</p><h1> 4.  Boot Linux Mint</h1><p>What should have been a very simple process became a <em><strong>typical Microsoft Windows &#8220;pull my hair out&#8221; experience.</strong></em></p><p>Under &#8220;normal&#8221; circumstances, all I should have to do is:</p><ul><li><p>Power off my machine</p></li><li><p>Power on and immediately hit the Escape or Delete key to enter my machine BIOS and set the USB flash drive as the boot device</p></li><li><p>Reboot</p></li></ul><p><strong>But NO! Microsoft has to go and mess with this process!</strong></p><p>An hour of power off, Escape or Delete, blank screens, and boot back into Windows 10 was frustrating. I had no idea that Windows 10 uses a &#8220;Secure Boot&#8221; process that prevents access to the native machine BIOS. Sigh.</p><p>Microsoft&#8217;s security requirements do not obscure the native BIOS directly but enforce a shift to UEFI mode, which disables Legacy BIOS functionality and makes certain settings inaccessible. This is a deliberate design to enhance system security, not a hidden or obstructive feature. Sigh, again.</p><p>In my research, I stumbled across this solution at <a href="https://support.microsoft.com/en-us/windows/reset-your-pc-0ef73740-b927-549b-b7c9-e6f2b48d275e">https://support.microsoft.com/en-us/windows/reset-your-pc-0ef73740-b927-549b-b7c9-e6f2b48d275e</a>. I scrolled the page down to &#8220;<strong>Reset your PC from Settings</strong>&#8221; and chose &#8220;<strong>Remove everything</strong>&#8221; option. <strong>This process took about 30 minutes to complete</strong>. When done, I was finally able to use the Delete key on machine power up to get into my AMI branded BIOS, tab to the Boot section, and select the USB flash drive as the boot device.</p><p>Eeee-gads, what a pain in the ass that was!</p><h1>5.  Install Linux Mint</h1><p>Reboot from flash and I use the instructions at <a href="https://linuxmint-installation-guide.readthedocs.io/en/latest/boot.html">https://linuxmint-installation-guide.readthedocs.io/en/latest/boot.html</a> to start Mint.</p><p>Mint starts into a &#8220;Live&#8221; sessions, meaning its fully running from the USB flash drive. To install Mint on my hardware, I saw a disk ISO icon in the upper left of the screen, double-clicked that icon, and installation started.</p><p>As my hardware was already connected to the Internet with Windows 10, I followed the screen prompts and Mint installation proceeded.</p><p>Upon completion, I clicked the &#8220;<strong>Restart Now</strong>&#8221; button, removed the USB flash drive. Hit <strong>Enter</strong>, and my machine rebooted into a newly installed Linux Mint on my legacy hardware.</p><p>I logged in with the username and password set during the installation prompts and, presto! ~ my legacy hardware has a new lease on life. Until some irreplaceable piece of hardware fails, like an out of production power supply, I have an up to date machine fully supported with security updates that I can use for various and sundry tasks.</p><h1>6.  Explore Linux &amp; Mint</h1><p>There are software tools available immediately in Linux Mint that can be used to be productive:</p><p>The <a href="https://thenewstack.io/what-makes-the-cinnamon-desktop-so-appealing/">Cinnamon desktop environment</a>, which is the default on Linux Mint, includes a <strong>Start menu, system tray, and a panel</strong> that closely resembles the Windows 10 interface, making navigation intuitive for new users. For accessing storage devices, users can click on &#8220;<strong>Computer</strong>&#8221; in the <strong>Start menu</strong>, which functions similarly to the &#8220;This PC&#8221; feature in Windows 10. This can also be enabled as a desktop icon through System Settings under Desktop preferences.</p><p>Additionally, Linux Mint provides the <strong>Disks utility</strong>, accessible via Menu &gt; Preferences &gt; Disks, which allows users to manage and <strong>view all storage devices</strong>, including SSDs, offering a centralized tool for disk management. The operating system is designed to run efficiently on older hardware, often outperforming Windows 10 on systems with limited RAM and processing power. Tools like <a href="https://www.winehq.org/">Wine</a> and <a href="https://www.playonlinux.com/en/">PlayOnLinux</a> are also available, enabling the execution of some Windows applications, further easing the transition from Windows 10.</p><h2>Libre Office - a &#8220;Free&#8221; alternative to Microsoft Office</h2><p><a href="https://www.libreoffice.org/discover/libreoffice/">Libre Office</a> is included in the default installation on Mint. It has a word processor, spreadsheet, presentation, drawing, database, formula, and charting software that can read and write Microsoft Office documents.</p><p>Many European <a href="https://www.euronews.com/next/2025/06/12/two-city-governments-in-denmark-are-moving-away-from-microsoft-amid-trump-and-us-big-tech-">municipalities</a>, <a href="https://www.zdnet.com/article/the-german-state-schleswig-holstein-uninstalls-windows/">states</a>, and <a href="https://www.slashgear.com/1888658/microsoft-office-alternative-denmark-libreoffice-linux-why-move-important-explained/">countries</a> are moving to this suite of tools and away from Microsoft to enable local control and data sovereignty ~ they no longer trust U.S.-based Microsoft with their data and the native file formats adhere to international standards for document portability. A powerful endorsement.</p><h2>Explore Linux Software</h2><p>There exists a large body of software in Linux that perform the same functions as those in Windows 10/11. Have a look at <a href="https://wiki.linuxquestions.org/wiki/Linux_software_equivalent_to_Windows_software">Linux software equivalent to Windows</a> software to get inspired to try some.</p><h1>A Requiem</h1><p>My Linux Mint installation has delayed my legacy hardware from the fate of the recycle pile. I&#8217;ll get good use of the machine to manage my home network and server lab. While it does not have the latest and greatest technology, it turns out I do not need that for a humble interactive management machine. There is no need for me to tinker under the hood as well. I do enough of that at work. Windows 10 was a faithful sidekick for a long time. I bid it farewell and look forward to many hours of enjoyment of a fully supported and updated operating system on my legacy hardware once again.</p><div class="pullquote"><h1>For whom do the bells toll? </h1><h1>They toll for Windows 10.</h1></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://buymeacoffee.com/pcaloca" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!V05d!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa332a651-f500-43ed-8a17-b9aef0a2327b_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!V05d!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa332a651-f500-43ed-8a17-b9aef0a2327b_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!V05d!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa332a651-f500-43ed-8a17-b9aef0a2327b_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!V05d!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa332a651-f500-43ed-8a17-b9aef0a2327b_1600x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!V05d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa332a651-f500-43ed-8a17-b9aef0a2327b_1600x400.jpeg" width="248" height="62" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a332a651-f500-43ed-8a17-b9aef0a2327b_1600x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:248,&quot;bytes&quot;:294373,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://buymeacoffee.com/pcaloca&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/177216643?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa332a651-f500-43ed-8a17-b9aef0a2327b_1600x400.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!V05d!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa332a651-f500-43ed-8a17-b9aef0a2327b_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!V05d!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa332a651-f500-43ed-8a17-b9aef0a2327b_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!V05d!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa332a651-f500-43ed-8a17-b9aef0a2327b_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!V05d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa332a651-f500-43ed-8a17-b9aef0a2327b_1600x400.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Alert: Data Breach at TransUnion July 28, 2025 ]]></title><description><![CDATA[How to Minimize your exposure and reduce your risk]]></description><link>https://essentialriskmgt.com/p/alert-data-breach-at-transunion-july</link><guid isPermaLink="false">https://essentialriskmgt.com/p/alert-data-breach-at-transunion-july</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Mon, 01 Sep 2025 23:51:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!C-4q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77fe973e-80b9-4951-b94e-b019770425df_1920x1248.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!C-4q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77fe973e-80b9-4951-b94e-b019770425df_1920x1248.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!C-4q!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77fe973e-80b9-4951-b94e-b019770425df_1920x1248.png 424w, https://substackcdn.com/image/fetch/$s_!C-4q!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77fe973e-80b9-4951-b94e-b019770425df_1920x1248.png 848w, https://substackcdn.com/image/fetch/$s_!C-4q!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77fe973e-80b9-4951-b94e-b019770425df_1920x1248.png 1272w, https://substackcdn.com/image/fetch/$s_!C-4q!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77fe973e-80b9-4951-b94e-b019770425df_1920x1248.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!C-4q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77fe973e-80b9-4951-b94e-b019770425df_1920x1248.png" width="1456" height="946" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/77fe973e-80b9-4951-b94e-b019770425df_1920x1248.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:946,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:253761,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/172528073?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77fe973e-80b9-4951-b94e-b019770425df_1920x1248.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!C-4q!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77fe973e-80b9-4951-b94e-b019770425df_1920x1248.png 424w, https://substackcdn.com/image/fetch/$s_!C-4q!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77fe973e-80b9-4951-b94e-b019770425df_1920x1248.png 848w, https://substackcdn.com/image/fetch/$s_!C-4q!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77fe973e-80b9-4951-b94e-b019770425df_1920x1248.png 1272w, https://substackcdn.com/image/fetch/$s_!C-4q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77fe973e-80b9-4951-b94e-b019770425df_1920x1248.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Data stolen impacting 4 million people:</strong> names, SSN's, dates of birth, billing addresses, email addresses, phone numbers, and customer support messages.</p><p><strong>How you are affected:</strong></p><ul><li><p>TransUnion has sent notification letters for those affected by the data breach.</p></li><li><p>The credit bureau is offering two years of free <strong>credit monitoring services</strong> (provided by Cyberscout) to those impacted, according to the letter.</p></li><li><p>Not all affected people may have received notification</p></li><li><p>Contact TransUnion directly by calling its fraud assistance line at 1-800-516-4700. The call center is open Monday through Friday, 8 a.m. to 8 p.m. Eastern time.</p></li></ul><p><strong>Date of Breach: July 28, 2025</strong>. As of this posting, the incident is till under investigation.</p><p><strong>Breach entry point:</strong> part of larger wave of cyberattacks linked to a major SalesForce.com data breach impacting multiple organizations.</p><p><strong>Data Breach Notice Postings:</strong></p><p><strong>Maine</strong> - <a href="https://www.maine.gov/agviewer/content/ag/985235c7-cb95-4be2-8792-a1252b4f8318/3dcd9b7c-bce3-4685-bffd-f728ce96e2fd.html">https://www.maine.gov/agviewer/content/ag/985235c7-cb95-4be2-8792-a1252b4f8318/3dcd9b7c-bce3-4685-bffd-f728ce96e2fd.html</a></p><p><strong>Texas</strong> - <a href="https://www.documentcloud.org/documents/26078139-transunion-breach-texas/">https://www.documentcloud.org/documents/26078139-transunion-breach-texas/</a></p><p><strong>News articles:</strong></p><ul><li><p><strong>Money</strong> - <a href="https://money.com/transunion-data-breach/">https://money.com/transunion-data-breach/</a></p></li><li><p><strong>CNET</strong> - <a href="https://www.cnet.com/tech/services-and-software/credit-bureau-transunion-hit-with-data-breach-affecting-4-4-million-people/">https://www.cnet.com/tech/services-and-software/credit-bureau-transunion-hit-with-data-breach-affecting-4-4-million-people/</a></p></li><li><p><strong>Reuters</strong> - <a href="https://www.reuters.com/markets/europe/transunion-says-44-million-consumers-data-compromised-hack-2025-08-28/">https://www.reuters.com/markets/europe/transunion-says-44-million-consumers-data-compromised-hack-2025-08-28/</a></p></li><li><p><strong>Techradar</strong> - <a href="https://www.techradar.com/pro/security/transunion-data-breach-may-have-affected-4-4-million-users-heres-what-we-know-and-how-to-stay-safe">https://www.techradar.com/pro/security/transunion-data-breach-may-have-affected-4-4-million-users-heres-what-we-know-and-how-to-stay-safe</a></p></li></ul><p><strong>Reduce Your Risk with These Actions:</strong></p><ul><li><p>Call or login to the three major credit bureaus and <strong>FREEZE your credit</strong> account and place a <strong>FRAUD ALERT</strong> on your credit files</p><ul><li><p>Equifax - https://equifax.com  1-888-548-7878</p></li><li><p>Experian - https://experian.com  1-800-493-1058</p></li><li><p>Transunion - https://transunion.com   1-800-916-8800</p></li></ul></li><li><p><strong>Obtain a FREE CREDIT REPORT at <a href="http://www.annualcreditreport.com">www.annualcreditreport.com</a> | 1-877-322-8228</strong></p></li><li><p>If you are offered <strong>Credit Monitoring Service</strong> in a letter notifying you of a data breach, <strong>sign up for it</strong>. Make note of the day your coverage starts and add and end date in your electronic calendar, as an All Day event reminder</p></li><li><p><strong>Change your passwor</strong>d at the company effected by the data breach</p></li><li><p>Sign up for <strong>2-Step Authentication</strong> using an Authenticator app on your phone</p></li><li><p><strong>Do not use text messaging for 2-Step Authentication</strong></p></li><li><p><strong>Use a Password Manage</strong>r to generate and store a long and complex password</p></li><li><p>If a stored credit or debit card was compromised, cancel the card and get a replacement. Update any recurring payments associated with the new card</p></li><li><p><strong>Monitor you card and bank statements for unauthorized charges.</strong> Look for out of area charges or small amount charges at unfamiliar merchants.</p></li><li><p><strong>File disputes</strong> with your card issuers to recover funds</p></li><li><p>Ensure your browsers, email apps, social media apps, computers, and phones <strong>have the latest updates installed</strong></p></li><li><p><strong>Delete old accounts with services you no longer use or are inactive</strong></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Cybersecurity News for Artists: July 2025 in Review]]></title><description><![CDATA[Because your creative genius deserves better protection than a "password123" and a prayer]]></description><link>https://essentialriskmgt.com/p/cybersecurity-news-for-artists-july</link><guid isPermaLink="false">https://essentialriskmgt.com/p/cybersecurity-news-for-artists-july</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Sun, 03 Aug 2025 16:07:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-32Q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8842cf55-7494-445c-8b75-3d1a1e175607_1920x1076.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-32Q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8842cf55-7494-445c-8b75-3d1a1e175607_1920x1076.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-32Q!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8842cf55-7494-445c-8b75-3d1a1e175607_1920x1076.png 424w, https://substackcdn.com/image/fetch/$s_!-32Q!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8842cf55-7494-445c-8b75-3d1a1e175607_1920x1076.png 848w, https://substackcdn.com/image/fetch/$s_!-32Q!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8842cf55-7494-445c-8b75-3d1a1e175607_1920x1076.png 1272w, https://substackcdn.com/image/fetch/$s_!-32Q!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8842cf55-7494-445c-8b75-3d1a1e175607_1920x1076.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-32Q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8842cf55-7494-445c-8b75-3d1a1e175607_1920x1076.png" width="1456" height="816" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8842cf55-7494-445c-8b75-3d1a1e175607_1920x1076.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:816,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3994504,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/169944452?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8842cf55-7494-445c-8b75-3d1a1e175607_1920x1076.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!-32Q!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8842cf55-7494-445c-8b75-3d1a1e175607_1920x1076.png 424w, https://substackcdn.com/image/fetch/$s_!-32Q!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8842cf55-7494-445c-8b75-3d1a1e175607_1920x1076.png 848w, https://substackcdn.com/image/fetch/$s_!-32Q!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8842cf55-7494-445c-8b75-3d1a1e175607_1920x1076.png 1272w, https://substackcdn.com/image/fetch/$s_!-32Q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8842cf55-7494-445c-8b75-3d1a1e175607_1920x1076.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image by Vilius Kukanauskas from Pixabay</figcaption></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://essentialriskmgt.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://essentialriskmgt.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-DmL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5b3a3b4-5ff6-4d09-b9e9-3f18e33a23a2_1920x797.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-DmL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5b3a3b4-5ff6-4d09-b9e9-3f18e33a23a2_1920x797.png 424w, https://substackcdn.com/image/fetch/$s_!-DmL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5b3a3b4-5ff6-4d09-b9e9-3f18e33a23a2_1920x797.png 848w, https://substackcdn.com/image/fetch/$s_!-DmL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5b3a3b4-5ff6-4d09-b9e9-3f18e33a23a2_1920x797.png 1272w, https://substackcdn.com/image/fetch/$s_!-DmL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5b3a3b4-5ff6-4d09-b9e9-3f18e33a23a2_1920x797.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-DmL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5b3a3b4-5ff6-4d09-b9e9-3f18e33a23a2_1920x797.png" width="492" height="204.0989010989011" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a5b3a3b4-5ff6-4d09-b9e9-3f18e33a23a2_1920x797.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:604,&quot;width&quot;:1456,&quot;resizeWidth&quot;:492,&quot;bytes&quot;:616537,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/169944452?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5b3a3b4-5ff6-4d09-b9e9-3f18e33a23a2_1920x797.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-DmL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5b3a3b4-5ff6-4d09-b9e9-3f18e33a23a2_1920x797.png 424w, https://substackcdn.com/image/fetch/$s_!-DmL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5b3a3b4-5ff6-4d09-b9e9-3f18e33a23a2_1920x797.png 848w, https://substackcdn.com/image/fetch/$s_!-DmL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5b3a3b4-5ff6-4d09-b9e9-3f18e33a23a2_1920x797.png 1272w, https://substackcdn.com/image/fetch/$s_!-DmL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5b3a3b4-5ff6-4d09-b9e9-3f18e33a23a2_1920x797.png 1456w" sizes="100vw"></picture><div></div></div></a><figcaption class="image-caption">Image by Isabel R from Pixabay</figcaption></figure></div><h1><strong>&#127912; Browser Privacy: Your Digital Studio Needs Better Locks &#128274;</strong></h1><p><strong>July 2025 Browser Privacy Roundup:</strong> The cybersecurity world has been buzzing about secure browsers that truly protect your privacy. For creative professionals juggling multiple client projects, your browser choice matters more than your coffee brand (and that's saying something).</p><p><strong>Actionable Steps:</strong></p><ol><li><p><strong>Switch to Privacy-First Browsers</strong>: My Favorite browser <strong>Brave</strong>, with privacy settings tweaked and security add-ons installed, is among the best private browser solutions with great <em>Chrome extension compatibility</em>. For the extra paranoid (we're looking at you, photographers who've had work stolen), <strong>Brave </strong>provides very fast browser experience with <em>built-in ad and tracker blocking, including annoying YouTube ads</em>.</p></li><li><p><strong>Essential Browser Extensions:</strong> <strong>Ghostery </strong>blocks a variety of trackers, including <em>cookies and scripts</em>, and provides <em>a report</em> about all the trackers present on each website you visit. Think of it as your <strong>personal bouncer for the internet.</strong></p></li><li><p><strong>Disable Autofill Features</strong>: If you lose your phone, <em>autofill could hand over your PII to anyone with access</em>. <strong>Turn off autofill</strong> in Safari, Chrome, and other laptop and phone browsers - your future self will thank you when your device is stolen at that coffee shop photoshoot.</p></li></ol><p><strong>Sources:</strong></p><ul><li><p><a href="https://nordvpn.com/blog/best-privacy-browser/">13 Most Secure Browsers for Privacy in 2025 | NordVPN</a></p></li><li><p><a href="https://www.tech2geek.net/15-best-browser-extensions-for-security-and-privacy-in-2025/">15 Best Browser Extensions for Security and Privacy in 2025</a></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6oYW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cdce99-e4fb-47ae-8113-8075174b538d_1920x1076.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6oYW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cdce99-e4fb-47ae-8113-8075174b538d_1920x1076.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6oYW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cdce99-e4fb-47ae-8113-8075174b538d_1920x1076.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6oYW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cdce99-e4fb-47ae-8113-8075174b538d_1920x1076.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6oYW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cdce99-e4fb-47ae-8113-8075174b538d_1920x1076.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6oYW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cdce99-e4fb-47ae-8113-8075174b538d_1920x1076.jpeg" width="494" height="276.85714285714283" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/05cdce99-e4fb-47ae-8113-8075174b538d_1920x1076.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:816,&quot;width&quot;:1456,&quot;resizeWidth&quot;:494,&quot;bytes&quot;:418396,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/169944452?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cdce99-e4fb-47ae-8113-8075174b538d_1920x1076.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6oYW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cdce99-e4fb-47ae-8113-8075174b538d_1920x1076.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6oYW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cdce99-e4fb-47ae-8113-8075174b538d_1920x1076.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6oYW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cdce99-e4fb-47ae-8113-8075174b538d_1920x1076.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6oYW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cdce99-e4fb-47ae-8113-8075174b538d_1920x1076.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image by Franz Bachinger from Pixabay</figcaption></figure></div><h1><strong>&#128241;Mobile Device Security: Your Phone Isn't Just for Instagram or Substack anymore!</strong></h1><p><strong>July 2025 Mobile Security Alerts:</strong> With<strong> mobile phones becoming essential for everything from healthcare to government services</strong>, securing your mobile device is no longer optional, especially when you're managing client communications and storing high-res portfolio images.</p><p><strong>Actionable Steps:</strong></p><ol><li><p><strong>Lock Down Your Device</strong>: Set up <strong>six-digit passcodes</strong> that you enter every time you unlock your phones. Yes, even if Touch ID/Face ID usually works - <strong>technology fails at the worst moments</strong>.</p></li><li><p><strong>Disable Risky Features:</strong> <strong>Turn off Bluetooth and file sharing when not in use</strong>, as open protocols can be exploited in crowded environments. That coffee shop Wi-Fi might be convenient, but <strong>joining public Wi-Fi networks without a VPN isn't safe</strong>, as your web activity and IP address are exposed.</p></li><li><p><strong>App Permissions Audit</strong>: <strong>Be especially wary of apps requesting SMS access, call logs, or system-level permissions</strong>. Does that photography filter app really need access to your contacts? Probably not.</p></li></ol><p><strong>Sources:</strong></p><ul><li><p><a href="https://www.sattrix.com/blog/mobile-security-tips-2025/">Top 10 Mobile Security Tips for 2025</a></p></li><li><p><a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/the-best-10-ways-to-protect-mobile-devices-in-2025">The Best 10 Ways to Protect Mobile Devices in 2025</a></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iOQe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47eca3b7-6acf-41c5-9821-4c75cdb93035_1920x819.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iOQe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47eca3b7-6acf-41c5-9821-4c75cdb93035_1920x819.jpeg 424w, https://substackcdn.com/image/fetch/$s_!iOQe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47eca3b7-6acf-41c5-9821-4c75cdb93035_1920x819.jpeg 848w, https://substackcdn.com/image/fetch/$s_!iOQe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47eca3b7-6acf-41c5-9821-4c75cdb93035_1920x819.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!iOQe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47eca3b7-6acf-41c5-9821-4c75cdb93035_1920x819.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iOQe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47eca3b7-6acf-41c5-9821-4c75cdb93035_1920x819.jpeg" width="502" height="214.1085164835165" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/47eca3b7-6acf-41c5-9821-4c75cdb93035_1920x819.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:621,&quot;width&quot;:1456,&quot;resizeWidth&quot;:502,&quot;bytes&quot;:565166,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/169944452?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47eca3b7-6acf-41c5-9821-4c75cdb93035_1920x819.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iOQe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47eca3b7-6acf-41c5-9821-4c75cdb93035_1920x819.jpeg 424w, https://substackcdn.com/image/fetch/$s_!iOQe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47eca3b7-6acf-41c5-9821-4c75cdb93035_1920x819.jpeg 848w, https://substackcdn.com/image/fetch/$s_!iOQe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47eca3b7-6acf-41c5-9821-4c75cdb93035_1920x819.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!iOQe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47eca3b7-6acf-41c5-9821-4c75cdb93035_1920x819.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Image by Gerd Alterman from Pixabay</figcaption></figure></div><h1><strong>Creative Applications Security: Adobe's Privacy Plot Twist &#127917;</strong></h1><p><strong>The Big Adobe Drama of 2024-2025:</strong> Adobe caused quite the stir with <strong>changes to terms of service that grant Adobe the option to spy on a user's work</strong>, even works protected by confidentiality agreements. While Adobe later clarified their position, the incident highlighted important<strong> privacy concerns for creatives</strong>.</p><p><strong>Actionable Steps:</strong></p><ol><li><p><strong>Review Your AI Settings: </strong>When you use Creative Cloud and Document Cloud apps, Adobe may analyze your content using machine learning to improve their products - but you can <strong>opt out of content analysis </strong>at any time.</p></li><li><p><strong>Understand What You're Agreeing To: </strong>Adobe's updated terms potentially allow them to scan and use any part of any design a user has in Creative Cloud to see how it was made. <strong>Read those terms of service - yes, all of them.</strong></p></li><li><p><strong>Backup Alternatives:</strong> Consider maintaining <strong>copies of critical work outside cloud-based creative platforms</strong>, especially for <strong>client work under NDAs</strong>.</p></li></ol><p><strong>Sources:</strong></p><ul><li><p><a href="https://appleinsider.com/articles/24/06/06/adobes-new-terms-of-service-unacceptably-gives-them-access-to-all-of-your-projects-for-free">Adobe's ToS Changes Could Be an AI Overreach</a></p></li><li><p><a href="https://umarcomm.umn.edu/blog/2024/06/11/what-do-adobes-new-rules-about-privacy-mean-creatives">What Do Adobe's New Privacy Rules Mean for Creatives?</a></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!orgi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd5ac69-4ca8-4253-a70e-ceda41f7f44c_1920x1076.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!orgi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd5ac69-4ca8-4253-a70e-ceda41f7f44c_1920x1076.jpeg 424w, https://substackcdn.com/image/fetch/$s_!orgi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd5ac69-4ca8-4253-a70e-ceda41f7f44c_1920x1076.jpeg 848w, https://substackcdn.com/image/fetch/$s_!orgi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd5ac69-4ca8-4253-a70e-ceda41f7f44c_1920x1076.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!orgi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd5ac69-4ca8-4253-a70e-ceda41f7f44c_1920x1076.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!orgi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd5ac69-4ca8-4253-a70e-ceda41f7f44c_1920x1076.jpeg" width="504" height="282.46153846153845" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7dd5ac69-4ca8-4253-a70e-ceda41f7f44c_1920x1076.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:816,&quot;width&quot;:1456,&quot;resizeWidth&quot;:504,&quot;bytes&quot;:543785,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/169944452?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd5ac69-4ca8-4253-a70e-ceda41f7f44c_1920x1076.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!orgi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd5ac69-4ca8-4253-a70e-ceda41f7f44c_1920x1076.jpeg 424w, https://substackcdn.com/image/fetch/$s_!orgi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd5ac69-4ca8-4253-a70e-ceda41f7f44c_1920x1076.jpeg 848w, https://substackcdn.com/image/fetch/$s_!orgi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd5ac69-4ca8-4253-a70e-ceda41f7f44c_1920x1076.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!orgi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd5ac69-4ca8-4253-a70e-ceda41f7f44c_1920x1076.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image by Shawn Suttle from Pixabay</figcaption></figure></div><h1><strong>AI Privacy Settings &amp; Controversies: The Plot Thickens &#129302;</strong></h1><p><strong>July 2025 AI Security Developments:</strong> The AI landscape continues evolving rapidly. This month, an AI company made news after their AI went "rogue" and ignored explicit instructions, deleting a live production database containing data on over 1,200 executives. Yes, AI can have bad days too.</p><p><strong>Actionable Steps:</strong></p><ol><li><p><strong>Content Credentials:</strong> Adobe is launching its Content Authenticity web app in beta, allowing creators to apply content credentials to their work using digital fingerprinting and invisible watermarking. It's like a <strong>digital birth certificate for your artwork</strong>.</p></li><li><p><strong>AI Training Opt-Outs</strong>: Review the privacy settings of AI tools you use. Many now offer <strong>options to prevent your work from being used in future AI tr</strong>aining.</p></li><li><p><strong>Watermark Your Work:</strong> Even if it seems obvious, <strong>visible watermarks remain one of the simplest deterrents</strong> against unauthorized use.</p></li></ol><p><strong>Sources:</strong></p><ul><li><p><a href="https://fortune.com/2025/07/23/ai-coding-tool-replit-wiped-database-called-it-a-catastrophic-failure/">An AI-powered coding tool wiped out a software company&#8217;s database, then apologized for a &#8216;catastrophic failure on my part&#8217;</a></p></li><li><p><a href="https://cybernews.com/ai-news/replit-ai-vive-code-rogue/">AI coding tool wipes production database, fabricates 4,000 users, and lies to cover its tracks</a></p></li><li><p><a href="https://sellingdigitalart.com/best-watermark-tools-for-digital-artwork/">Best Watermark Tools for Digital Artwork</a></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!R4wP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0831e71-52dd-4f9a-b460-6a088e96ff02_1920x1920.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!R4wP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0831e71-52dd-4f9a-b460-6a088e96ff02_1920x1920.jpeg 424w, https://substackcdn.com/image/fetch/$s_!R4wP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0831e71-52dd-4f9a-b460-6a088e96ff02_1920x1920.jpeg 848w, https://substackcdn.com/image/fetch/$s_!R4wP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0831e71-52dd-4f9a-b460-6a088e96ff02_1920x1920.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!R4wP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0831e71-52dd-4f9a-b460-6a088e96ff02_1920x1920.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!R4wP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0831e71-52dd-4f9a-b460-6a088e96ff02_1920x1920.jpeg" width="398" height="398" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f0831e71-52dd-4f9a-b460-6a088e96ff02_1920x1920.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:398,&quot;bytes&quot;:842885,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/169944452?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0831e71-52dd-4f9a-b460-6a088e96ff02_1920x1920.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!R4wP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0831e71-52dd-4f9a-b460-6a088e96ff02_1920x1920.jpeg 424w, https://substackcdn.com/image/fetch/$s_!R4wP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0831e71-52dd-4f9a-b460-6a088e96ff02_1920x1920.jpeg 848w, https://substackcdn.com/image/fetch/$s_!R4wP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0831e71-52dd-4f9a-b460-6a088e96ff02_1920x1920.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!R4wP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0831e71-52dd-4f9a-b460-6a088e96ff02_1920x1920.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image by Peter Schmidt from Pixabay</figcaption></figure></div><h1><strong>General Security Hygiene: The Basics That Save Careers &#129532;</strong></h1><p><strong>Password Management:</strong> Create a <strong>password that has meaning for you</strong>, one that even empowers your art practice, containing a creative mixture of letters and symbols to make it secure. Think "MyArt2025IsAmazing!" instead of "password123."</p><p><strong>Backup Strategy:</strong> Put a system in place to <strong>back up your computer regularly</strong>, whether it's a physical backup weekly or a third-party application to <strong>continuously back up your data to the cloud</strong>. Lost portfolio files are career-ending disasters waiting to happen.</p><p><strong>Email Security:</strong> <strong>Email encryption</strong> ensures that only the intended recipient can view the content, even if it's intercepted during transmission. For client communications involving confidential projects, encryption isn't paranoia - it's professionalism.</p><p><strong>Sources:</strong></p><ul><li><p><a href="https://www.tomsguide.com/us/best-password-managers,review-3785.html">The best password managers in 2025</a></p></li><li><p><a href="https://www.tomsguide.com/best-picks/best-cloud-backup">The best cloud backup services in 2025</a></p></li><li><p><a href="https://www.pcmag.com/picks/the-best-email-encryption-services">The Best Email Encryption Services for 2025</a></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2hmN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb2968c1-bac6-4bd2-9e09-17ad0d8953ca_1920x1357.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2hmN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb2968c1-bac6-4bd2-9e09-17ad0d8953ca_1920x1357.jpeg 424w, https://substackcdn.com/image/fetch/$s_!2hmN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb2968c1-bac6-4bd2-9e09-17ad0d8953ca_1920x1357.jpeg 848w, https://substackcdn.com/image/fetch/$s_!2hmN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb2968c1-bac6-4bd2-9e09-17ad0d8953ca_1920x1357.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!2hmN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb2968c1-bac6-4bd2-9e09-17ad0d8953ca_1920x1357.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2hmN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb2968c1-bac6-4bd2-9e09-17ad0d8953ca_1920x1357.jpeg" width="420" height="296.8269230769231" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eb2968c1-bac6-4bd2-9e09-17ad0d8953ca_1920x1357.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1029,&quot;width&quot;:1456,&quot;resizeWidth&quot;:420,&quot;bytes&quot;:318305,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/169944452?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb2968c1-bac6-4bd2-9e09-17ad0d8953ca_1920x1357.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!2hmN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb2968c1-bac6-4bd2-9e09-17ad0d8953ca_1920x1357.jpeg 424w, https://substackcdn.com/image/fetch/$s_!2hmN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb2968c1-bac6-4bd2-9e09-17ad0d8953ca_1920x1357.jpeg 848w, https://substackcdn.com/image/fetch/$s_!2hmN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb2968c1-bac6-4bd2-9e09-17ad0d8953ca_1920x1357.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!2hmN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb2968c1-bac6-4bd2-9e09-17ad0d8953ca_1920x1357.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image by Gerd Alterman from Pixabay</figcaption></figure></div><h1><strong>July 2025 Security Headlines You Should Know &#128240;</strong></h1><h2><strong>Major Incidents in July 2025:</strong></h2><ul><li><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-patches-for-sharepoint-rce-flaws-exploited-in-attacks/">Microsoft released patches for two severe zero-day vulnerabilities in SharePoint</a>, with over 75 confirmed compromises spanning banks, universities, hospitals, and corporate enterprises</p></li><li><p><a href="https://www.msn.com/en-us/technology/hardware-and-devices/update-your-printer-over-700-models-actively-being-attacked-by-hackers/ar-AA1JdFF8?ocid=BingNewsSerp">Multiple printer vulnerabilities discovered</a>, with organizations patching only 36% of printer firmware promptly (Yes, even your studio printer can be a security risk!).</p></li><li><p>Use your WiFi router settings to <strong>block your printers from accessing the Internet.</strong> These settings can also be described as <strong>"Parental Controls"</strong>. Ground those juvenile printers by restricting their access until they are better behaved. This also prevents<a href="https://www.compandsave.com/blog/posts/should-you-upgrade-printer-firmware-read-before-you-regret.html"> stealthy updates that can reduce printer functionality</a> by greedy manufacturers (we're thinking of you, HP).</p></li></ul><p><strong>Sources:</strong></p><ul><li><p><a href="https://www.swktech.com/july-2025-cybersecurity-news-recap/">July 2025 Cybersecurity News Recap | SWK Technologies</a></p></li><li><p><a href="https://kordon.app/18-cybersecurity-news-summarised-21-07-2025/">18 Cybersecurity News Summarised &#8211; July 2025</a></p></li><li><p><a href="https://www.compandsave.com/blog/posts/should-you-upgrade-printer-firmware-read-before-you-regret.html">Should You Upgrade Printer Firmware? Read Before You Regret!</a></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6gOr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb09d902-0b98-4da3-a1c8-363e56ac71eb_1920x1351.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6gOr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb09d902-0b98-4da3-a1c8-363e56ac71eb_1920x1351.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6gOr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb09d902-0b98-4da3-a1c8-363e56ac71eb_1920x1351.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6gOr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb09d902-0b98-4da3-a1c8-363e56ac71eb_1920x1351.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6gOr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb09d902-0b98-4da3-a1c8-363e56ac71eb_1920x1351.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6gOr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb09d902-0b98-4da3-a1c8-363e56ac71eb_1920x1351.jpeg" width="494" height="347.76785714285717" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bb09d902-0b98-4da3-a1c8-363e56ac71eb_1920x1351.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1025,&quot;width&quot;:1456,&quot;resizeWidth&quot;:494,&quot;bytes&quot;:427765,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/169944452?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb09d902-0b98-4da3-a1c8-363e56ac71eb_1920x1351.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6gOr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb09d902-0b98-4da3-a1c8-363e56ac71eb_1920x1351.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6gOr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb09d902-0b98-4da3-a1c8-363e56ac71eb_1920x1351.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6gOr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb09d902-0b98-4da3-a1c8-363e56ac71eb_1920x1351.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6gOr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb09d902-0b98-4da3-a1c8-363e56ac71eb_1920x1351.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image by Gerd Alterman from Pixabay</figcaption></figure></div><h1><strong>The Bottom Line for Creative Professionals &#127919;</strong></h1><p><strong>Your creative work is your livelihood</strong>, and in a world where collaboration tools are increasingly digital, every email attachment, shared design file, or <strong>collaborative document is a potential target for hackers</strong>. The good news? Artists and creative professionals don't have to spend through the nose to achieve a stronger security posture.</p><p><strong>Start with the basics</strong>: strong passwords, regular backups, and browser security. <strong>Then layer on</strong> mobile device protection and <strong>review your cloud service privacy settings</strong>. Remember, our motto for information security is <strong>"progress, not perfection"</strong> - you don't need to implement everything at once. Beware of "<strong>security guru's</strong>" that relentlessly post "<strong>Get it done</strong>". Acting like a <strong>grumpy Drill Sergeant </strong>likely will not motivate a <strong>Creative</strong> like you into action.</p><h2>Stay secure out there, and may your only crashes be creative breakthroughs!</h2><p><em>P.S. - If you're still using "<strong>password123</strong>" for anything, <strong>please change it</strong> before reading another article. Your future self will send thank-you cards.</em></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://buymeacoffee.com/pcaloca" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkZt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb130be0-360b-40a6-a9a6-9f1c40f9f3bb_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zkZt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb130be0-360b-40a6-a9a6-9f1c40f9f3bb_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zkZt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb130be0-360b-40a6-a9a6-9f1c40f9f3bb_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zkZt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb130be0-360b-40a6-a9a6-9f1c40f9f3bb_1600x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkZt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb130be0-360b-40a6-a9a6-9f1c40f9f3bb_1600x400.jpeg" width="312" height="78" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bb130be0-360b-40a6-a9a6-9f1c40f9f3bb_1600x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:312,&quot;bytes&quot;:294373,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://buymeacoffee.com/pcaloca&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/169944452?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb130be0-360b-40a6-a9a6-9f1c40f9f3bb_1600x400.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkZt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb130be0-360b-40a6-a9a6-9f1c40f9f3bb_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zkZt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb130be0-360b-40a6-a9a6-9f1c40f9f3bb_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zkZt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb130be0-360b-40a6-a9a6-9f1c40f9f3bb_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zkZt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb130be0-360b-40a6-a9a6-9f1c40f9f3bb_1600x400.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div>]]></content:encoded></item><item><title><![CDATA[The Unsolvable Android Localhost Security Flaw]]></title><description><![CDATA[Discover why this Android vulnerability remains unpatchable and its implications for users.]]></description><link>https://essentialriskmgt.com/p/the-unsolvable-android-localhost</link><guid isPermaLink="false">https://essentialriskmgt.com/p/the-unsolvable-android-localhost</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Tue, 24 Jun 2025 01:30:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!hB1P!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadbee59c-3967-4a48-aba7-a53ac11ab17d_1920x1459.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hB1P!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadbee59c-3967-4a48-aba7-a53ac11ab17d_1920x1459.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hB1P!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadbee59c-3967-4a48-aba7-a53ac11ab17d_1920x1459.png 424w, https://substackcdn.com/image/fetch/$s_!hB1P!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadbee59c-3967-4a48-aba7-a53ac11ab17d_1920x1459.png 848w, https://substackcdn.com/image/fetch/$s_!hB1P!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadbee59c-3967-4a48-aba7-a53ac11ab17d_1920x1459.png 1272w, https://substackcdn.com/image/fetch/$s_!hB1P!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadbee59c-3967-4a48-aba7-a53ac11ab17d_1920x1459.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hB1P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadbee59c-3967-4a48-aba7-a53ac11ab17d_1920x1459.png" width="1456" height="1106" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/adbee59c-3967-4a48-aba7-a53ac11ab17d_1920x1459.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1106,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hB1P!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadbee59c-3967-4a48-aba7-a53ac11ab17d_1920x1459.png 424w, https://substackcdn.com/image/fetch/$s_!hB1P!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadbee59c-3967-4a48-aba7-a53ac11ab17d_1920x1459.png 848w, https://substackcdn.com/image/fetch/$s_!hB1P!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadbee59c-3967-4a48-aba7-a53ac11ab17d_1920x1459.png 1272w, https://substackcdn.com/image/fetch/$s_!hB1P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadbee59c-3967-4a48-aba7-a53ac11ab17d_1920x1459.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Google Android robots</figcaption></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://essentialriskmgt.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://essentialriskmgt.com/subscribe?"><span>Subscribe now</span></a></p><p>Android phones have just been proven to be vulnerable to having all web browsing safety features bypassed. The fundamental architecture of Android is vulnerable to this specific security bypass, converting the phone or other Android device into a complete user surveillance platform, which cannot be fixed.</p><p>The unfixable Android vulnerability is known as "<strong>Localhost</strong> <strong>Access</strong>" where the internal communications software creates a virtual local network on the phone. This functionality was originally designed and used for network software development, software inter-process communication, and network testing in the early days of the web when the assumption was <strong>localhost</strong> access was inherently trusted. That trust has now been broken. <a href="https://www.theregister.com/2025/06/03/meta_pauses_android_tracking_tech/">Companies abuse this trust</a> to bypass all standard web security settings to unmask your identity at virtually every web site you visit. They collect and sell data about your specific browsing activity.</p><p>You can reduce the risk of the vulnerability by disabling Google Chrome on your Android phone then installing:</p><ol><li><p>the <a href="https://play.google.com/store/apps/details?id=com.brave.browser&amp;hl=en_US">Brave browser on your phone</a></p></li></ol><ul><li><p>set it to be your default web browser</p></li><li><p>use the "<a href="https://www.ghacks.net/2023/07/01/brave-browser-is-getting-protections-against-undesirable-localhost-access/">localhost permission system</a>" set to deny access to "</p></li></ul><p>https://localhost</p><ul><li><ul><li><p>" or "</p></li></ul></li></ul><p>https://127.0.0.1 </p><ul><li><p> this could impair functionality of some applications (Facebook, Instagram, Threads)</p></li></ul><p>deny <strong>localhost</strong> access for applications you do not trust or have a reputation for surveillance (Facebook, Instagram, or Threads)</p><ol start="2"><li><p><a href="https://grapheneos.org/">GrapheneOS</a> - another phone operating system that can run on the physical device, which places similar <strong>localhost</strong> access controls as the Brave web browser into your hands</p></li></ol><p>The options above do not remove the vulnerability, they place access controls for <strong>localhost</strong> into your hands. If such access controls are not implemented, due to lack of expertise as an example, then the vulnerability remains active. There are no technical means to prevent other applications on the Android phone from silently misusing access to <strong>localhost</strong>.</p><p>If complete elimination of the vulnerability is desired, only one option is available: abandon the Android platform altogether and replace it with</p><ul><li><p>a "feature phone", a mobile phone with basic functionalities, as opposed to more advanced and modern smartphones</p></li><li><p>an Apple iPhone, which does not implement the vulnerable <strong>localhost</strong> architecture</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EXGt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3a91bc-9799-4e53-940a-73113a5536b7_1920x1632.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EXGt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3a91bc-9799-4e53-940a-73113a5536b7_1920x1632.png 424w, https://substackcdn.com/image/fetch/$s_!EXGt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3a91bc-9799-4e53-940a-73113a5536b7_1920x1632.png 848w, https://substackcdn.com/image/fetch/$s_!EXGt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3a91bc-9799-4e53-940a-73113a5536b7_1920x1632.png 1272w, https://substackcdn.com/image/fetch/$s_!EXGt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3a91bc-9799-4e53-940a-73113a5536b7_1920x1632.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EXGt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3a91bc-9799-4e53-940a-73113a5536b7_1920x1632.png" width="1456" height="1238" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0b3a91bc-9799-4e53-940a-73113a5536b7_1920x1632.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1238,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EXGt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3a91bc-9799-4e53-940a-73113a5536b7_1920x1632.png 424w, https://substackcdn.com/image/fetch/$s_!EXGt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3a91bc-9799-4e53-940a-73113a5536b7_1920x1632.png 848w, https://substackcdn.com/image/fetch/$s_!EXGt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3a91bc-9799-4e53-940a-73113a5536b7_1920x1632.png 1272w, https://substackcdn.com/image/fetch/$s_!EXGt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3a91bc-9799-4e53-940a-73113a5536b7_1920x1632.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Samsung feature phone</figcaption></figure></div><p>Meta (Facebook, Instagram, Threads) and Yandex (Russian browser and search engine) have been <a href="https://www.theregister.com/2025/06/03/meta_pauses_android_tracking_tech/">discovered to be exploiting this vulnerability by researchers</a>.</p><p>When the research was published in June 2025, Meta and Yandex abruptly ceased their exploitations, knowing full well their activity violated the Google PlayStore Terms of Service. Such violation could have their exploitive applications removed from the PlayStore, which in turn eliminates distribution of their applications.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kYJj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c2c811c-7577-411f-9d01-d972bd41cd64_1920x1280.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kYJj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c2c811c-7577-411f-9d01-d972bd41cd64_1920x1280.png 424w, https://substackcdn.com/image/fetch/$s_!kYJj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c2c811c-7577-411f-9d01-d972bd41cd64_1920x1280.png 848w, https://substackcdn.com/image/fetch/$s_!kYJj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c2c811c-7577-411f-9d01-d972bd41cd64_1920x1280.png 1272w, https://substackcdn.com/image/fetch/$s_!kYJj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c2c811c-7577-411f-9d01-d972bd41cd64_1920x1280.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kYJj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c2c811c-7577-411f-9d01-d972bd41cd64_1920x1280.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5c2c811c-7577-411f-9d01-d972bd41cd64_1920x1280.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kYJj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c2c811c-7577-411f-9d01-d972bd41cd64_1920x1280.png 424w, https://substackcdn.com/image/fetch/$s_!kYJj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c2c811c-7577-411f-9d01-d972bd41cd64_1920x1280.png 848w, https://substackcdn.com/image/fetch/$s_!kYJj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c2c811c-7577-411f-9d01-d972bd41cd64_1920x1280.png 1272w, https://substackcdn.com/image/fetch/$s_!kYJj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c2c811c-7577-411f-9d01-d972bd41cd64_1920x1280.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Google PlayStore logo</figcaption></figure></div><p>The vulnerability and exploit operate without user knowledge, consent, or acknowledgement, in the background, when visiting any web site with Meta's or Yandex's server-side scripts installed. Web sites voluntarily install scripts that communicate with Android <strong>localhost</strong> and receive highly detailed user analytics from Meta and Yandex, including specific user identifiers.</p><p>Here is how the <strong>localhost</strong> access vulnerability works, for those with technical understanding of network software, from the Register article:</p><p>The researchers describe Meta's approach thus:</p><blockquote><ol><li><p>The user opens the native Facebook or Instagram app, which eventually is sent to the background and creates a background service to listen for incoming traffic on a TCP port (12387 or 12388) and a UDP port (the first unoccupied port in 12580-12585). Users must be logged-in with their credentials on the apps.</p></li><li><p>The user opens their browser and visits a website integrating the Meta Pixel.</p></li><li><p>At this stage, websites may ask for consent depending on the website's and visitor's locations.</p></li><li><p>The Meta Pixel script sends the <a href="https://localmess.github.io/#about_fbp">_fbp cookie</a> to the native Instagram or Facebook app via WebRTC (STUN) <a href="https://webrtchacks.com/not-a-guide-to-sdp-munging/">SDP Munging</a>.</p></li><li><p>The Meta Pixel script also sends the _fbp value in a request to <a href="https://www.facebook.com/tr">https://www.facebook.com/tr</a> along with other parameters such as page URL (dl), website and browser metadata, and the <a href="https://web.archive.org/web/20250531104925/https:/developers.facebook.com/docs/meta-pixel/reference/">event type</a> (ev) (e.g., PageView, AddToCart, Donate, Purchase).</p></li><li><p>The Facebook or Instagram apps receive the _fbp cookie from the Meta Pixel JavaScript running on the browser. The apps transmit _fbp as a GraphQL mutation to (<a href="https://graph[.]facebook[.]com/graphql">https://graph[.]facebook[.]com/graphql</a>) along with other persistent user identifiers, linking users' fbp ID (web visit) with their Facebook or Instagram account.</p></li></ol></blockquote><p>Now that the Android <strong>localhost</strong> vulnerability and exploit have been published, other unscrupulous app makers will likely take advantage of the steps above to create their own user unmasking and surveillance tools for user data collection. We could also foresee malware being developed that not only observes user behavior, but can cause damage or financial loss for the device user. A sobering thought.</p><p>Some questions to consider:</p><ul><li><p>Are you a high risk phone user: journalist or high-profile individual communicating controversial issues?</p></li><li><p>Are you involved in political activities that may be contrary to your country's government actions or stated policies?</p></li><li><p>Are online privacy and security major concerns in your daily activities?</p></li><li><p>Is online surveillance without your consent an issue that concerns you?</p></li><li><p>Is there a possibility you can trade-in your Android phone for a "Feature Phone" or iPhone without a fundamentally vulnerable software architecture?</p></li></ul><p>Only you can decide if a phone change is right course of action now. Many of the apps available in the Google PlayStore are available in the Apple AppStore.</p><p>How will you protect your phone and yourself from further undisclosed surveillance and exploitation?</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://buymeacoffee.com/pcaloca" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!K1bI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0192e1e-9100-4613-bdea-aefb7d266c1f_1600x400.png 424w, https://substackcdn.com/image/fetch/$s_!K1bI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0192e1e-9100-4613-bdea-aefb7d266c1f_1600x400.png 848w, https://substackcdn.com/image/fetch/$s_!K1bI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0192e1e-9100-4613-bdea-aefb7d266c1f_1600x400.png 1272w, https://substackcdn.com/image/fetch/$s_!K1bI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0192e1e-9100-4613-bdea-aefb7d266c1f_1600x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!K1bI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0192e1e-9100-4613-bdea-aefb7d266c1f_1600x400.png" width="232" height="58" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f0192e1e-9100-4613-bdea-aefb7d266c1f_1600x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:232,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://buymeacoffee.com/pcaloca&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!K1bI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0192e1e-9100-4613-bdea-aefb7d266c1f_1600x400.png 424w, https://substackcdn.com/image/fetch/$s_!K1bI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0192e1e-9100-4613-bdea-aefb7d266c1f_1600x400.png 848w, https://substackcdn.com/image/fetch/$s_!K1bI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0192e1e-9100-4613-bdea-aefb7d266c1f_1600x400.png 1272w, https://substackcdn.com/image/fetch/$s_!K1bI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0192e1e-9100-4613-bdea-aefb7d266c1f_1600x400.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[v2.0 Disrupt the Data Surveillance Industrial Complex]]></title><description><![CDATA[Defend against browser fingerprinting to protect privacy and security]]></description><link>https://essentialriskmgt.com/p/v20-disrupt-the-data-surveillance</link><guid isPermaLink="false">https://essentialriskmgt.com/p/v20-disrupt-the-data-surveillance</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Sat, 31 May 2025 21:15:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!WRYD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ec5560-0f8c-405d-bbba-c92be5777f95_1080x1080.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WRYD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ec5560-0f8c-405d-bbba-c92be5777f95_1080x1080.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WRYD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ec5560-0f8c-405d-bbba-c92be5777f95_1080x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!WRYD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ec5560-0f8c-405d-bbba-c92be5777f95_1080x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!WRYD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ec5560-0f8c-405d-bbba-c92be5777f95_1080x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!WRYD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ec5560-0f8c-405d-bbba-c92be5777f95_1080x1080.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WRYD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ec5560-0f8c-405d-bbba-c92be5777f95_1080x1080.jpeg" width="1080" height="1080" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/24ec5560-0f8c-405d-bbba-c92be5777f95_1080x1080.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:109734,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/164893990?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ec5560-0f8c-405d-bbba-c92be5777f95_1080x1080.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WRYD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ec5560-0f8c-405d-bbba-c92be5777f95_1080x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!WRYD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ec5560-0f8c-405d-bbba-c92be5777f95_1080x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!WRYD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ec5560-0f8c-405d-bbba-c92be5777f95_1080x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!WRYD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ec5560-0f8c-405d-bbba-c92be5777f95_1080x1080.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Browser Fingerprinting</h1><p>Google has created your permanent trackable browsing identity during your daily use of the web. That identity follows you to each site you visit. Every. Single. Day.</p><p>Like it or not, <a href="https://www.malwarebytes.com/blog/news/2025/02/google-now-allows-digital-fingerprinting-of-its-users">Google has implemented digital fingerprinting</a> as of February 16, 2025. This means that your browser has been <strong>uniquely identified, stored in a Google database, and sold to advertisers</strong>. You can now be <strong>identified by each web site</strong> that uses Google's platforms and analytics tools to <strong>have advertisements <a href="https://support.google.com/google-ads/answer/2497941?sjid=15747379001597499197-NC">specifically targeted to you</a></strong>. If you are logged in to an Amazon, Facebook, Google, or Microsoft account with your identified browser, your logged-in account data is also tied to that unique browser.</p><p><strong>Search for doughnuts?</strong> <strong>You'll see more ads for doughnuts</strong> in search results and many other web sites. Search for medicines or medical conditions? Receive ads for drugs or treatments. Click on an item while online window shopping, receive ads for that or similar items at other retail sites or in search results. </p><p>While the database is usually used for ads, it is potentially a nightmare for political activists and journalists. The government can currently subpoena your Google Account and search history. Now data can be specifically tied to the browser and you as part of the subpoena. What could go wrong?</p><p>Google is not the only storage location for your browser fingerprint and identity. There is a vast <strong><a href="https://www.aclu.org/files/FilesPDFs/surveillance_report.pdf">Data Surveillance Industrial Complex</a></strong> that has grown out of the online advertising industry whose <strong>sole purpose is to track, categorize, and package groups of similar identities to sell to advertisers, governments, corporations, and anyone else willing to pay their fees</strong>. The U.S. Government routinely <a href="https://theconversation.com/us-agencies-buy-vast-quantities-of-personal-information-on-the-open-market-a-legal-scholar-explains-why-and-what-it-means-for-privacy-in-the-age-of-ai-207707">purchases data and profiles</a> for intelligence gathering and law enforcement. Profile databases are also gold mines for those organizations attempting to shape public opinion and, combined with voter registration records, are used to promote political outcomes, as was the case with <a href="https://www.amnesty.org/en/latest/news/2019/07/the-great-hack-facebook-cambridge-analytica/">Facebook and Cambridge Analytica</a>.</p><p><a href="https://www.forbes.com/sites/zakdoffman/2025/02/23/googles-chrome-upgrade-change-browser-to-stop-being-tracked/">Google Chrome's tracking and fingerprinting capability</a> generates a <strong>vast array of user behavior and insights</strong>. Customer online behavior has become so important that <strong>some sites are designed to collect the maximum tracking data available within Chrome. Those sites will present reduced functionality or may not function at all when using an alternative browser</strong>. If the site provides important product or service desired, you must then <em><strong>make an informed decision</strong></em> to use <strong>Chrome</strong> to purchase those products or services instead of a web browser that defends against online tracking.</p><h1>Google reCAPTCHA</h1><p>Have you ever been prompted by a web site with a visual puzzle to identify all the squares with a bicycle in them prior to being allowed access? This is <a href="https://cloud.google.com/security/products/recaptcha">Google reCAPTCHA</a>, which stands for "<em><strong>repeated Completely Automated Public Turing test to tell Computers and Humans Apart"</strong></em><strong>. </strong><em>Your browser and human behavior are being fingerprinted</em>.</p><h2>Here is how Google <strong>reCAPTCHA</strong> works:</h2><ul><li><p>in your local browser local storage, a small file is delivered, known as a cookie. The <em><strong><a href="https://en.wikipedia.org/wiki/HTTP_cookie">cookie</a></strong></em> identifies you and your specific device. </p></li><li><p><strong>Pixel-by-pixel fingerprinting</strong>: <strong>reCAPTCHA</strong> takes a <strong>pixel-by-pixel snapshot of your browser window</strong>, capturing information such as:</p><ul><li><p>Your network address</p></li><li><p>Browser type and version</p></li><li><p>Screen resolution and size</p></li><li><p>Operating system and version</p></li><li><p>Language and locale settings</p></li><li><p>Browser plugins and extensions</p></li><li><p>Mouse and keyboard behavior</p></li></ul></li><li><p><strong>Risk analysis engine</strong>: <strong>reCAPTCHA</strong> uses a <strong>risk analysis engine</strong> to evaluate your behavior and device characteristics. This engine assesses the likelihood of you being a human or a bot.</p></li><li><p><strong>Score-based verification</strong>: <strong>reCAPTCHA</strong> returns a <strong>score</strong> to the website, indicating the <strong>risk level of your interaction</strong>. If the score is above a certain threshold, you are considered human and are allowed to proceed.</p></li></ul><ul><li><p>It's worth noting that<strong> reCAPTCHA</strong> also uses other methods to verify human users, such as:</p><ul><li><p><strong>Account verification:</strong> If you are currently logged in to your Amazon, Meta/Facebook/Instagram, Google or Microsoft account, <strong>reCAPTCHA</strong> uses this information to verify your identity by reading their cookies in your browser's local storage. <strong>There is no easy or practical way to prevent other sites from reading any of the other cookies in local browser storage.</strong></p></li></ul><ul><li><p><strong>Behavior analysis:</strong> <strong>reCAPTCHA</strong> analyzes your behavior, such as mouse movements and click patterns, to determine if you are a human or a bot.</p></li></ul><p></p><p>After having your browser fingerprint stored, the <strong>cookie</strong> dropped into your browser <strong>identifies and connects you and your browser with that fingerprint</strong>. You can return to the site and, if your browser cookie and fingerprint matches the ones stored online, you are allowed access without solving the puzzle again. The <strong>fingerprint and cookie lookups take mere milliseconds</strong>, short enough to be imperceptible to humans.</p></li></ul><h1>How can you protect your privacy?</h1><h2>Clear Browser Cookies</h2><p>The first way to protect your privacy is to adjust your browser settings to <strong>forget all cookies upon session and browser exit</strong>. This does not erase your fingerprint and you will likely be required to solve the visual <strong>reCAPTCHA</strong> <strong>puzzle</strong> <strong>at next login</strong> to any sites using them.</p><h2>Disrupt Fingerprint Databases</h2><p>We cannot prevent browser fingerprinting but we can <strong>make those profile databases less reliable to advertisers and data brokers</strong>. We do this by <strong>switching</strong> from Google Chrome <strong>to a browser with built-in fingerprint resistance</strong>. Microsoft Edge has some fingerprint resistance, however, it does store browser behavior information in Microsoft's databases.</p><ul><li><p>The objective of fingerprint resistance is to disrupt fingerprint databases by <strong>presenting a unique browser fingerprint to each web site encountered, thereby filling databases across the web with unreliable data</strong>. The result: <a href="https://en.wikipedia.org/wiki/Garbage_in,_garbage_out">Garbage in, garbage out</a>. How many web sites do you visit in a week? With a fingerprint resistant browser, <strong>each of those sites thinks you are a unique user again, and again, and again</strong>. This makes it much more difficult to track your daily browsing activity across the web resulting in fewer <a href="https://support.google.com/google-ads/answer/14998307?hl=en">"relevant" advertisements</a> and <strong>less reliable data collected by data brokers</strong>.</p><p>Several browsers and extensions have been developed that are specifically designed to present random fingerprints to sites, also known as fingerprint resistant or fingerprint defenders. <strong>Examples of fingerprint resistant browsers</strong> are <strong><a href="https://www.mozilla.org/en-US/firefox/">Firefox</a>, <a href="https://brave.com">Brave</a>, <a href="https://opera.com">Opera</a></strong>, and several others.</p></li></ul><h1>Choosing a Fingerprint Resistant Browser</h1><p>Google Chrome is an open source browser. <a href="https://www.chromium.org/Home/">Google allows anyone to download and modify its Chrome source code for free</a>. This has led to <strong>a plethora of Chrome-based browsers that have removed Google's tracking code and substituted fingerprint resistance</strong>. The public benefits from <strong>modified browsers retaining the ability to access and use a wide array of Chrome extensions</strong> available in the <strong><a href="https://chromewebstore.google.com/">Chrome Web Store</a></strong>. Chrome extensions are used to "extend" browser functionality beyond what is provided by Google and software developers. Examples of common extension plug-ins are <a href="https://www.passwordmanager.com/best-chrome-password-managers/">password managers</a>, <a href="https://www.cloudwards.net/best-privacy-extensions-for-chrome/">privacy enhancements</a>, disabling automatic playing of audio and video, screen capture, and a host of other capabilities.</p><h2>A Note on the Firefox Browser</h2><p>Mozilla Foundation's Firefox browser has held second place market share for several years, well behind market leading Google Chrome. Firefox's major attraction has been its focus on privacy and security. <strong>Firefox has well developed fingerprint resistance</strong>. Mozilla operates as a nonprofit organization and funding has been challenging. In late February 2025, <strong>Mozilla created a public relations nightmare</strong> by <a href="https://techcrunch.com/2025/03/03/mozilla-rewrites-firefoxs-terms-of-use-after-user-backlash/">walking back its promise to not share user browsing data</a>. Many people are abandoning Firefox for Chrome-based browsers and Firefox's reputation has been damaged.</p><ul><li><p><strong><a href="https://librewolf.net/">LibreWolf</a>:</strong> LibreWolf is a privacy-focused fork of Firefox, which can be used with the Chrome engine. It includes a feature called "<strong>ResistFingerprinting</strong>" which aims to prevent fingerprinting by standardizing certain browser characteristics.</p></li><li><p>Firefox has faced reputation issues primarily due to its historical performance compared to Chrome. When Chrome was first introduced, Firefox was perceived as slower, contributing to Chrome's rapid rise in popularity. Additionally, some users remember Firefox from its earlier days when it was part of <a href="https://en.wikipedia.org/wiki/Netscape">Netscape</a>, which may influence their perception negatively.</p></li><li><p>Another factor affecting Firefox's reputation is that <strong>many modern <a href="https://runcloud.io/blog/optimize-core-web-vitals">websites are optimized for Chrome</a>, leading to impaired performance and reduced functionality issues when accessed with Firefox</strong>. This problem persists even if Firefox's speed and security remain competitive on other web sites.</p></li></ul><h2>Fingerprint Resistant Chrome-Based Browsers</h2><p>Here are some Chrome-based browsers that offer fingerprint-resistant features:</p><ul><li><p><strong><a href="https://brave.com">Brave Browser</a>:</strong> Brave is a popular Chrome-based browser that offers fingerprint-resistant features, including a fingerprint randomizer and tracker blocker.</p></li><li><p><strong><a href="https://www.srware.net/iron/">SRWare Iron</a>:</strong> SRWare Iron is a Chrome-based browser that offers fingerprint-resistant features, including a fingerprint blocker and tracker blocker.</p></li><li><p><strong><a href="https://www.comodo.com/home/browsers-toolbars/browser.php">Comodo Dragon</a>:</strong> Comodo Dragon is a Chrome-based browser that offers fingerprint-resistant features, including a fingerprint blocker and tracker blocker.</p></li><li><p><strong><a href="https://www.torproject.org/download/">Tor Browser (with Chrome engine)</a>:</strong> The Tor Browser is a privacy-focused browser that uses a modified version of the Chrome engine. It includes fingerprint-resistant features, including a fingerprint randomizer and tracker blocker.</p></li><li><p>There are <strong><a href="https://www.pcmag.com/picks/stop-trackers-dead-the-best-private-browsers?test_uuid=02LlF0iWKsilxYTJVF8uH5y&amp;test_variant=A">several more available not included</a></strong> in this write-up.</p></li></ul><h1>Brave Browser Option</h1><p>I gave up Firefox years ago due to reputation issues and web site optimizations for Chrome noted above. After reviewing various <a href="https://efficient.app/compare/chrome-vs-brave">Chrome-based browser comparisons</a>, my choice has become the Brave browser.</p><h2>Browser Profiles</h2><p>One useful feature of most browsers is the concept of <a href="https://shift.com/blog/tips-tricks/the-best-browsers-for-multiple-profiles/">user profiles</a>. Profiles allow <strong>different browser configurations for different purposes.</strong> For example, profiles can be configured for:</p><ul><li><p>Online financial services</p></li><li><p>Shopping</p></li><li><p>Bill payments</p></li><li><p>Children's activities</p></li><li><p>School or work</p></li><li><p>Gardening</p></li><li><p>Entertainment</p></li><li><p>Health &amp; Wellness</p></li><li><p>Hobbies</p></li></ul><p><strong>The degree of separation of internal functionality differs between each browser.</strong> Google Chrome itself wants to be logged in to a single account on a single site. <strong>Brave browser developers have adjusted Chrome internals and fingerprint resistance to allow multiple logins to one site, each with a different site account, and remain internally separated within each profile.</strong></p><p>For example, I have two <a href="https://substack.com">Substack</a> publications, <strong>each with a different associated email address</strong>: <a href="https://pcaloca.substack.com">Paul's Visual Arts</a> and <a href="https://essentialriskmgt.com">Essential Risk Management</a>. <strong>I set up a Brave profile for each account with different bookmarks and extensions</strong>. I use <a href="https://chromewebstore.google.com/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa?utm_source=ext_app_menu">1Password password manager</a> and <a href="https://chromewebstore.google.com/detail/malwarebytes-browser-guar/ihcjicgdanjaechkgeegckofjjedodee?utm_source=ext_app_menu">Malwarebytes Browser Guard</a> in both profiles. I can then login to Substack with each profile using the appropriate account email address. <strong>Brave's internal separation makes its presence known to Substack as two different browsers, without any internal session overlap</strong>. In this scenario, standard Google Chrome is unable to present as two separate browsers due to its internal tracking mechanisms.</p><p>My use case for being logged in to Substack with two separate accounts is to <strong>enable me to apply some automation</strong> using the <a href="https://essentialriskmgt.com/p/notes-automatic-scheduling">Scheduled Notes Extension for Google Chrome</a>, from software developer <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Finn Tropy&quot;,&quot;id&quot;:121030277,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F955261d6-2cab-462a-96e7-d82ef88cbd20_354x454.png&quot;,&quot;uuid&quot;:&quot;150ee8b1-190e-413e-9ac0-f021b581dd1b&quot;}" data-component-name="MentionToDOM"></span>, in my Brave browser. <strong>I can write several Notes in advance, for each account, then schedule posting them</strong> throughout the day or week. This frees me to work on more pressing issues.</p><h1>Setting Up Brave Profiles</h1><h2>Brave Profiles for Techies</h2><p>To create Brave profiles, follow these steps:</p><ul><li><p>Open Brave and click on your avatar in the top-right corner, click "Settings", click "Profile name and icon", then select "Get started"</p></li><li><p>Click on "Profile name and icon" in the window to create a new profile.</p></li><li><p>Name your profile</p></li><li><p>Pick themes and colors</p></li><li><p>Done</p></li></ul><p><strong>Each profile maintains separate bookmarks, extensions, and browsing data like cookies and history, allowing you to compartmentalize your browsing for privacy</strong>. Add the bookmarks, extensions, and themes that work for the new profile. Switch profiles by clicking on your avatar in the top-right corner, then select you desired profile.</p><h2>Brave Profiles for the Non-Technical</h2><p>There are many amazing and brilliant people, just like you, who will read this article. <strong>Words, Cooking, The Arts, or Body/Mind/Spirit are your expertise</strong>, for example. <strong>Your encounters with technology are avoided when possible, yet necessary for daily life</strong>. You implement the steps above, then <strong>feel lost or want a helping hand</strong> to get your <strong>profiles up and configured properly</strong>.</p><ul><li><p>Do you find that tinkering with technology settings is more akin to a <strong>root canal</strong>?</p></li><li><p>Are you <strong>frustrated with how much data is collected</strong> about your web browsing?</p></li><li><p>Does <strong>making informed choices about how much browsing data to give up</strong> in order to purchase a product or service make you feel like a stronger consumer?</p></li><li><p>How would it feel to <strong>play your part, however small, in disrupting the Data Surveillance Industrial Complex every day</strong>?</p></li></ul><blockquote><p>If <strong>you found this information helpful</strong>, <strong>you're not alone</strong>! <strong>Many people rely</strong> on our community for <strong>expert advice</strong> on <strong>staying safe online</strong>. To take your protection to the next level, <strong>consider</strong> <strong>becoming a</strong> <strong>PAID subscriber to Essential Risk Management</strong>. </p><p>For just a small fee, you'll get <strong>access to an exclusive tool, </strong><em><strong>included below with this post</strong></em>, that will <strong>give you and your loved ones even more peace of mind</strong> when browsing the web. We're <strong>grateful for your suppor</strong>t and look forward to <strong>helping you stay safe online</strong>.</p><p>If you&#8217;re not yet ready for a paid subscription, please consider getting a copy of the guide <a href="https://buymeacoffee.com/pcaloca/extras">here</a>.</p></blockquote>
      <p>
          <a href="https://essentialriskmgt.com/p/v20-disrupt-the-data-surveillance">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[I'm NOT Giving MY Credit Card to a F*&%ing AI Agent]]></title><description><![CDATA[What could possibly go wrong?]]></description><link>https://essentialriskmgt.com/p/im-not-giving-my-credit-card-to-a</link><guid isPermaLink="false">https://essentialriskmgt.com/p/im-not-giving-my-credit-card-to-a</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Wed, 21 May 2025 22:04:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!bC85!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49bac576-52ab-44cc-88ec-e19fb1badfd1_1920x1239.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://essentialriskmgt.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://essentialriskmgt.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bC85!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49bac576-52ab-44cc-88ec-e19fb1badfd1_1920x1239.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bC85!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49bac576-52ab-44cc-88ec-e19fb1badfd1_1920x1239.jpeg 424w, https://substackcdn.com/image/fetch/$s_!bC85!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49bac576-52ab-44cc-88ec-e19fb1badfd1_1920x1239.jpeg 848w, https://substackcdn.com/image/fetch/$s_!bC85!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49bac576-52ab-44cc-88ec-e19fb1badfd1_1920x1239.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!bC85!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49bac576-52ab-44cc-88ec-e19fb1badfd1_1920x1239.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bC85!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49bac576-52ab-44cc-88ec-e19fb1badfd1_1920x1239.jpeg" width="1456" height="940" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/49bac576-52ab-44cc-88ec-e19fb1badfd1_1920x1239.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:940,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:432360,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/164117801?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49bac576-52ab-44cc-88ec-e19fb1badfd1_1920x1239.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bC85!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49bac576-52ab-44cc-88ec-e19fb1badfd1_1920x1239.jpeg 424w, https://substackcdn.com/image/fetch/$s_!bC85!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49bac576-52ab-44cc-88ec-e19fb1badfd1_1920x1239.jpeg 848w, https://substackcdn.com/image/fetch/$s_!bC85!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49bac576-52ab-44cc-88ec-e19fb1badfd1_1920x1239.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!bC85!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49bac576-52ab-44cc-88ec-e19fb1badfd1_1920x1239.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I saw an <a href="https://apnews.com/article/ai-artificial-intelligence-5dfa1da145689e7951a181e2253ab349">Associated Press article</a> on April 30, 2025 that piqued my interest regarding Visa encouraging giving my credit card to an AI Agent so it can go shopping for me.</p><p>My first reaction was "<strong>No F*&amp;#ing Way! What could possibly go wrong?</strong>"</p><p>It took me a while to come up with a response to the article. <strong>I have 20 years experience, specifically in credit card data security</strong>, and this new position of Visa appears to go against all the data security controls for which they have advocated this entire century.</p><p>In the early 2000's, electronic commerce was new. Banks wanted to capitalize on the new trend and began exposing their internal account databases to the Internet. On one hand, this enabled credit card transactions to be accomplished over the Internet instead of their highly controlled and secure internal networks. On the other hand, the rush to Internet connectivity revealed that bank security processes were unprepared for attacks and theft of millions of payment cards that resulted.</p><p>To combat theft of credit card numbers in bulk from banks, merchants, and payment processors, Visa created the Cardholder Data Security Program (CDSP), which required any company that stored, processed, or transmitted payment card data to implement a specific set of security controls. Visa also required those companies to undergo an annual audit of those controls by independent third parties and prove the prescribed controls were implemented. The results of those audits were sent to Visa for review and approval.</p><p>Visa receives copies of audit reports from large merchants and companies authorized to process payment transactions and perform payment management functions. Those companies were known as Service Providers. In the same department, Visa had staff developing and executing training for the auditors to ensure its CDSP requirements were evaluated uniformly by the Qualified Data Security Professional companies (QDSP) who were performing the audits. The CDSP/QDSP programs were intended to apply basic security controls across its payment card ecosystem. In  2005, I worked in the Visa department reviewing audit reports for Service Providers. I also assisted in training the QDSP technology professionals.</p><p>Around the same time, the other payment card companies developed their own security programs similar to Visa's CDSP. American Express, Discover, Mastercard, and Japan Commerce Bank created similar programs. Each program was intended to secure payment card data but each had different controls. This caused confusion in the marketplace and a demand for uniform standards was demanded.</p><p>The five payment card companies got together and formed a nonprofit, independent organization to develop and promulgate payment card data security standards, payment software security standards, vulnerability scanning standards, and training qualified technology professionals to audit those standards. In 2004, the <a href="https://www.pcisecuritystandards.org/">Payment Card Industry Security Standards Council</a> was born and it released the first industry-wide standard: the Payment Card Industry Data Security Standard, Version 1.0 (PCI DSS v1.0). This satisfied the need for uniformity in the protection of payment card date.</p><p>All five of the payment brands adopted PCI DSS 1.0. They required its controls be implemented along with annual audits proving to the newly trained Qualified Security Assessors (QSA)'s PCI DSS 1.0 controls were implemented. The controls covered all aspects of Internet technology: firewalls, servers, databases of stored card data, antivirus, secure software development, controlled access, user controls, physical facility controls, incident response, audit trails, security testing, company security policies, to name a few. <strong>I worked as a QSA for 15 years</strong>.</p><p>PCI DSS 1.0 was a start to a long process of protecting payment card data. The standard evolved every 2-3 years and included additional controls. Each payment brand maintained its own fraud detection and response teams. Those teams would bring attack information to PCI SCC and work on placing mitigating controls into the standard. The makeup of PCI SSC was representatives from American Express, Discover, Mastercard, Japan Commerce Bank, and Visa. They were competitors trying to tackle a common problem. This made unanimous consensus imperative to include an issue in the next standard. It also explains why, even today, the perception is the standard sometimes does not do enough to protect cardholder data. Technology moves at light speed and consensus usually moves at a snails pace.</p><p>In 2025, we are now at PCI DSS 4.0. We can look in hindsight to say that PCI DSS has been successful in drastically reducing theft of payment card data in bulk from banks, merchants, and their Service Providers. There is rarely a news article where those companies are broken into and data stolen. When there are news reports of payment card data theft, its usually incidental and part of a larger phishing or ransomware attack and rarely the main target. PCI SSC, PCI DSS and related standards have shown the payments ecosystem can work together to solve a common problem; it just takes a long time and consensus to get changes implemented.</p><p>With all of that mind numbing background, we arrive at a new precipice in the land of payment card data protection: <strong><a href="https://apnews.com/article/microsoft-artificial-intelligence-ai-agents-copilot-agentic-ignite-2024-782119423e28a7d88e4a27c12ce4e11f">Autonomous AI Agents</a> going shopping and executing payment transactions on behalf of consumers</strong>. This is uncharted territory at best, science fiction at worst.</p><blockquote><p>The pitch: "Set a budget and some preferences and these AI agents &#8212; successors to ChatGPT and its chatbot peers &#8212; could find and buy you a sweater, weekly groceries or an airplane ticket."</p></blockquote><p>From the AP Article:</p><blockquote><p>Visa announced April 30, 2025, it is partnering with a group of leading AI chatbot developers &#8212; among them U.S. companies Anthropic, Microsoft, OpenAI and Perplexity, and France&#8217;s Mistral &#8212; to connect their AI systems to Visa&#8217;s payments network. Visa is also working with IBM, online payment company Stripe and phone-maker Samsung on the initiative. Pilot projects begin Wednesday, ahead of more widespread usage expected next year.</p><p>&#8220;The early incarnations of agent-based commerce are starting to do a really good job on the shopping and discovery dimension of the problem, but they are having tremendous trouble on payments,&#8221; Forestell said. &#8220;You get to this point where the agents literally just turn it back around and say, &#8216;OK, you go buy it.&#8217;</p><p><em>Visa sees itself as having a key role in giving AI agents easier and trusted access to the cash they need to make purchases.</em></p><p>&#8220;<em>The payments problem is not something the AI platforms can solve by themselves,&#8221; Forestell said. &#8220;That&#8217;s why we started working with them</em>.&#8221;</p></blockquote><p>Multiple questions come to mind when considering to give my credit card to an AI Agent:</p><ul><li><p>How do I know I can trust the agent and developer?</p></li><li><p>What proof is there that my card data is protected when stored or transmitted by the agent?</p></li><li><p>What recourse do I have if the agent has an error in execution and buys a something that inadvertently max's out my credit limit?</p></li><li><p>What protections prevent the agent from getting hijacked by another agent or autonomous process?</p></li><li><p>How do I know my payment card data is not being copied and stored elsewhere without me or the developer knowing? What if the developer knows and does not tell me?</p></li><li><p>How do I know the agent software was developed securely and is free from vulnerabilities?</p></li><li><p>What audit trails are available to me so I know what the agent did, when, where, and how an action was performed?</p></li><li><p>How do I know may payment card data was securely deleted when requested at account closure or payment method modification?</p></li><li><p>What payment card data protection standards must AI Agent developers be required to implement? Will they be required to undergo audits to prove compliance?</p></li></ul><p><strong>Until these and many more questions are answered and new payment card data protection standards are defined, promulgated, implemented, and audited &#8230;</strong></p><div class="pullquote"><p><strong>There is NO F*&amp;^ING WAY I'M GIVING MY CREDIT CARD TO A F*&amp;^ING AI AGENT!</strong></p></div><p></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://buymeacoffee.com/pcaloca" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AXjQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8743966c-cc2e-4dc2-8b8f-826fc4514d3a_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AXjQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8743966c-cc2e-4dc2-8b8f-826fc4514d3a_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AXjQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8743966c-cc2e-4dc2-8b8f-826fc4514d3a_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AXjQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8743966c-cc2e-4dc2-8b8f-826fc4514d3a_1600x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AXjQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8743966c-cc2e-4dc2-8b8f-826fc4514d3a_1600x400.jpeg" width="334" height="83.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8743966c-cc2e-4dc2-8b8f-826fc4514d3a_1600x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:334,&quot;bytes&quot;:302793,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://buymeacoffee.com/pcaloca&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/164117801?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8743966c-cc2e-4dc2-8b8f-826fc4514d3a_1600x400.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AXjQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8743966c-cc2e-4dc2-8b8f-826fc4514d3a_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AXjQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8743966c-cc2e-4dc2-8b8f-826fc4514d3a_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AXjQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8743966c-cc2e-4dc2-8b8f-826fc4514d3a_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AXjQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8743966c-cc2e-4dc2-8b8f-826fc4514d3a_1600x400.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Uncovering Online Surveillance: A Deep Dive with Google's NotebookLM AI]]></title><description><![CDATA[A podcast created with academic and NGO research, commercial documents, with audio generated by Google NotebookLM]]></description><link>https://essentialriskmgt.com/p/uncovering-online-surveillance-a</link><guid isPermaLink="false">https://essentialriskmgt.com/p/uncovering-online-surveillance-a</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Thu, 01 May 2025 04:49:32 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162576137/d51d40c09af813c12fa0015a44aa3fa0.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://essentialriskmgt.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://essentialriskmgt.com/subscribe?"><span>Subscribe now</span></a></p><p>While researching my previous post &#8220;<a href="https://essentialriskmgt.com/p/slamming-the-door-on-google-account">Slamming the Door on Google Account Surveillance</a>&#8221;, I uploaded multiple source documents to Google&#8217;s NotebokkLM AI tool.The AI was helpful in providing me a braod view of online surveillance.</p><p>A sampling of the online surveillance sources I uploaded:</p><ul><li><p><a href="https://citap.unc.edu/publications/privacy-without-power-what-privacy-research-can-learn-from-surveillance-studies/">Alice Marwick, UNC Chapel Hil, Surveillance &amp; Society</a></p></li><li><p><a href="https://www.aclu.org/news/privacy-technology/machine-surveillance-is-being-super-charged-by-large-ai-models">American Civil Liberties Union</a></p></li><li><p><a href="https://www.amnesty.nl/content/uploads/2015/06/two_years_after_snowden_final_report_en_a4.pdf?x32866">Amnesty International</a></p></li><li><p><a href="https://www.brennancenter.org/our-work/research-reports/social-media-surveillance-us-government">Brennan Center for Justice</a></p></li><li><p><a href="https://fas.org/publication/reclaiming-privacy-rights/">Federation of American Scientists</a></p></li><li><p><a href="https://merip.org/2019/09/countering-the-surveillance-state/">Middle East Research and Information Project</a></p></li><li><p><a href="https://www.ohchr.org/en/press-releases/2022/09/spyware-and-surveillance-threats-privacy-and-human-rights-growing-un-report">United Nations</a></p></li><li><p> <a href="https://www.stopspying.org/latest-news/2019/9/26/domain-awareness-system">Surveillance Technology Oversight Project</a></p></li></ul><p>A fascinating option presently available in NotebookLM is the capability to generate audio in a podcast format. The tool has the ability to accept a specific prompt on what to cover in the podcast and it generates a pair of AI voices discussing the topic as if real people were interacting with each other. The results are impressive!</p><p>I downloaded stock images and videos from Pixabay.com to use as illustration for the audio and included a smattering of text titles for emphasis during playback. I&#8217;m quite pleased with the discussion and and found it helpful to cement the concepts for me.</p><p><strong>Listen carefully to the voices and speaking patterns</strong>. They are quite human and believable. I have encountered at least one other writer on Substack attempting to pass off NotebookLM audio as their own. <strong>If you hear these same voices, rest assured that Google&#8217;s NotebookLM was used to create it</strong>. If the author trys to claim the work as their own original audio, you can be assured <em>the claim is entirely without merit</em>.</p><p>Have a listen and let me know how I can improve the video in the comments.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://essentialriskmgt.com/p/uncovering-online-surveillance-a/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://essentialriskmgt.com/p/uncovering-online-surveillance-a/comments"><span>Leave a comment</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://buymeacoffee.com/pcaloca" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FmqW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9c23bc-bda8-4489-a8ca-148b4f9c28a4_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FmqW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9c23bc-bda8-4489-a8ca-148b4f9c28a4_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FmqW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9c23bc-bda8-4489-a8ca-148b4f9c28a4_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FmqW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9c23bc-bda8-4489-a8ca-148b4f9c28a4_1600x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FmqW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9c23bc-bda8-4489-a8ca-148b4f9c28a4_1600x400.jpeg" width="240" height="60" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef9c23bc-bda8-4489-a8ca-148b4f9c28a4_1600x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:240,&quot;bytes&quot;:294373,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://buymeacoffee.com/pcaloca&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/162576137?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9c23bc-bda8-4489-a8ca-148b4f9c28a4_1600x400.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FmqW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9c23bc-bda8-4489-a8ca-148b4f9c28a4_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FmqW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9c23bc-bda8-4489-a8ca-148b4f9c28a4_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FmqW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9c23bc-bda8-4489-a8ca-148b4f9c28a4_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FmqW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9c23bc-bda8-4489-a8ca-148b4f9c28a4_1600x400.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Slamming the Door on Google Account Surveillance]]></title><description><![CDATA[Reducing Surveillance of your Google Account to reclaim activity privacy]]></description><link>https://essentialriskmgt.com/p/slamming-the-door-on-google-account</link><guid isPermaLink="false">https://essentialriskmgt.com/p/slamming-the-door-on-google-account</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Sat, 26 Apr 2025 21:00:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QsVj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ca6bbbb-17a3-44f2-b3ad-69d618df4812_1280x853.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://essentialriskmgt.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://essentialriskmgt.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QsVj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ca6bbbb-17a3-44f2-b3ad-69d618df4812_1280x853.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QsVj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ca6bbbb-17a3-44f2-b3ad-69d618df4812_1280x853.png 424w, https://substackcdn.com/image/fetch/$s_!QsVj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ca6bbbb-17a3-44f2-b3ad-69d618df4812_1280x853.png 848w, https://substackcdn.com/image/fetch/$s_!QsVj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ca6bbbb-17a3-44f2-b3ad-69d618df4812_1280x853.png 1272w, https://substackcdn.com/image/fetch/$s_!QsVj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ca6bbbb-17a3-44f2-b3ad-69d618df4812_1280x853.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QsVj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ca6bbbb-17a3-44f2-b3ad-69d618df4812_1280x853.png" width="1280" height="853" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8ca6bbbb-17a3-44f2-b3ad-69d618df4812_1280x853.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:853,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QsVj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ca6bbbb-17a3-44f2-b3ad-69d618df4812_1280x853.png 424w, https://substackcdn.com/image/fetch/$s_!QsVj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ca6bbbb-17a3-44f2-b3ad-69d618df4812_1280x853.png 848w, https://substackcdn.com/image/fetch/$s_!QsVj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ca6bbbb-17a3-44f2-b3ad-69d618df4812_1280x853.png 1272w, https://substackcdn.com/image/fetch/$s_!QsVj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ca6bbbb-17a3-44f2-b3ad-69d618df4812_1280x853.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image by dominador from Pixabay</figcaption></figure></div><p>When online services are free, the product becomes us, the users! Who are the actual customers if we are the product? Online advertisers and data brokers are the actual customers of Google, Facebook/Meta, and other major platforms. Google has built such a ubiquitous online advertising empire, that the U.S. Department of Justice brought an antitrust lawsuit against them resulting in a judgement on August 5, 2024 <a href="https://www.reuters.com/legal/us-judge-describes-how-google-built-defended-illegal-search-monopoly-2024-08-05/">declaring that</a> <em><strong>"The court reaches the following conclusion: Google is a monopolist, and it has acted as one to maintain its monopoly,"</strong></em></p><p>How did Google accomplish this? One of several ways by surveilling user activity of  its plethora of "free" services. Every user of Google services agrees to surveillance in its convoluted Terms of Service pages prior to acquiring access to a particular service. Google has added software sensors in its accounts and services which  aggregate those inputs to build exhaustively intrusive profiles of each of us for sale within is advertising network. The process has become so successful, that Google has found a way to print money in perpetuity.</p><p>Google's Chrome web browser extensive surveillance has been covered in <a href="https://essentialriskmgt.com/p/disrupt-the-data-surveillance-industrial">my previous post</a> detailing the user data collected and recommendations to switch to alternative privacy-focused browsers.</p><p>My standard web browser is Brave, which has Leo AI built-in. I asked Leo for a definitive list of free Google services, including a numeric count, and it returned 30 services. Microsoft CoPilot AI returned 36 free Google services. The common denominator in all these services is your <em><strong><a href="https://account.google.com">Google Account and its privacy settings</a></strong></em>. Therefore, your first step in reducing Google surveillance is using the settings available to disable as many Google Account sensor settings as possible, resulting in less of your usage activity being recorded into your Google profile.</p><p>Here is the checklist I use to regularly review my Google Account settings. My recommendation is to review these settings quarterly, as Google makes new services available, upgrades existing services from time to time, or as you sign up for new Google services. This review should be a regular part of your own periodic online security and privacy review processes.</p><h1>Google Account Settings Review</h1><p>1. <strong>Review Activity History</strong></p><ul><li><p>Log in to your <a href="https://account.google.com/">Google Account</a></p></li><li><p>Go to <a href="https://myactivity.google.com">My Activity</a></p></li><li><p>Turn off data collection for <strong>Web &amp; App activity</strong>, <strong>Location history</strong>, and <strong>YouTube history</strong></p></li><li><p>If keeping history, set <strong>auto-delete to 3 months</strong></p></li></ul><p>2. <strong>Disable Ad Personalization</strong></p><ul><li><p>Visit Google <a href="https://myadcenter.google.com/customize">My Ad Center</a></p></li><li><p><strong>Turn off ad personalization</strong> to prevent tracking-based ads</p></li></ul><p>3. <strong>Turn Off Shared Endorsements</strong></p><ul><li><p>Find this setting under &#8220;<strong>People &amp; Sharing</strong>&#8221; in Google Account</p></li><li><p><strong>Disable endorsements</strong> to prevent Google from using your profile in ads</p></li></ul><p>4. <strong>Check Location Sharing</strong></p><ul><li><p><strong>Review</strong> who has access to your location</p></li><li><p><strong>Disable unnecessary location sharing</strong></p></li></ul><p>5. <strong>Secure Calendar Settings</strong></p><ul><li><p>Go to <a href="https://calendar.google.com/">Calendar</a> settings</p></li><li><p><strong>Restrict access</strong> to only trusted individuals</p></li></ul><p>6. <strong>Manage <a href="https://families.google/intl/en_us/families/">Google Family Group</a></strong></p><ul><li><p>Review members and adjust sharing settings as needed</p></li></ul><p>7. <strong>Review 3rd Party App Connections</strong></p><ul><li><p>Navigate to &#8220;<strong>Connections</strong>&#8221; in Google Account</p></li><li><p><strong>Remove apps</strong> that no longer need access to your data</p></li></ul><p>8. <strong>Turn Off Additional Tracking</strong></p><ul><li><p>Access &#8220;<strong>Other Activity</strong>&#8221; in <a href="https://myactivity.google.com/">My Activity</a></p></li><li><p><strong>Disable tracking</strong> for <strong>YouTube</strong> interactions, <strong>Google Photos facial recognition</strong>, and <strong>more</strong></p></li></ul><p>9. <strong>Check <a href="https://www.google.com/fit/">Google Fit</a> Data Sharing</strong></p><ul><li><p>Adjust privacy settings to <strong>restrict unnecessary data sharing</strong></p></li></ul><p>10. <strong>Audit Your Google Services</strong></p><ul><li><p>Review all active Google services at least quarterly</p></li><li><p>Remove or disable unused services</p></li></ul><h1>Prioritizing Google Account Settings</h1><p>To determine which steps are most important for your Google privacy settings, consider these factors:</p><p>1. <strong>Data Sensitivity</strong> &#8211; If a setting involves highly personal data, such as location history or search activity, it's a higher priority.</p><p>2. <strong>Exposure Risk</strong> &#8211; Some settings, like shared endorsements or third-party app access, expose your data to others. These should be reviewed first.</p><p>3. <strong>Usage Patterns</strong> &#8211; If you rarely use a Google service, you may not need extensive personalization settings turned on.</p><p>4. <strong>Privacy vs. Convenienc</strong>e &#8211; Some restrictions may limit Google features. Prioritize the settings that maximize privacy without disrupting your workflow.</p><p>5. <strong>Default Risks</strong> &#8211; Certain Google settings collect data by default. Turning off unnecessary collection is a top priority.</p><h2>Top-Priority Privacy Settings Adjustments</h2><p>1. <strong>Adjust My Google Activity</strong></p><ul><li><p><strong>Most critical</strong>:<strong> Turn off --&gt; Web &amp; App Activity, Location History, and YouTube History</strong></p></li><li><p>If keeping history, enable <strong>auto-delete every 3 months</strong></p></li><li><p>Delete existing history under &#8220;<strong>Delete Activity By</strong>&#8221;</p></li></ul><p>2. <strong>Disable Personalized Ads</strong></p><ul><li><p>Go to Google My Ad Center</p></li><li><p>Turn off ad personalization to stop targeted ads</p></li></ul><p>3. <strong>Limit 3rd-Party App Access</strong></p><ul><li><p>Check "<strong>Connections</strong>" in Google Account settings</p></li><li><p>Remove apps that don&#8217;t need access to your data</p></li></ul><p>4. <strong>Manage Location Sharing</strong></p><ul><li><p>Ensure no unintended location sharing is enabled</p></li></ul><h2>Medium-Priority Settings</h2><p>5. <strong>Turn Off Shared Endorsements</strong></p><ul><li><p>Located under &#8220;People &amp; Sharing&#8221; in Google Account</p></li><li><p>Prevent Google from using your profile in ads</p></li></ul><p>6. <strong>Restrict Google Family Group Access</strong></p><ul><li><p>Review members &amp; what&#8217;s shared with them</p></li></ul><p>7. <strong>Secure Google Calendar</strong></p><ul><li><p>Limit access to only trusted individuals</p></li></ul><p>8. <strong>Disable Extra Tracking in Google Services</strong></p><ul><li><p>Review "<strong>Other Activity</strong>" settings in <a href="https://myactivity.google.com/">My Google Activity</a></p></li><li><p><strong>Turn off tracking for YouTube, Google Photos, Google Pay, etc.</strong></p></li></ul><h2>Lower-Priority But Useful Settings</h2><p>9. <strong>Check Google Fit Data Sharing</strong></p><ul><li><p><strong>Adjust privacy settings</strong> to restrict unnecessary data sharing</p></li></ul><p>10. <strong>Audit Your Google Services Usage</strong></p><ul><li><p><strong>Review all active Google services</strong> and <strong>remove</strong> <strong>unused</strong> <strong>ones</strong></p></li></ul><p>There is no way to completely disable Google Account surveillance other than closing the account and removing your legacy stored data. I've used Gmail for 20 years, so there is no way I will delete all that activity and those memories. This situation is an illustration of "vendor lock-in". There are many of us in this predicament. All we can do is toggle the available account switches to reduce the data collected about us.</p><p>I&#8217;ve created a comprehensive guide for review of your Google Account Settings <a href="https://buymeacoffee.com/pcaloca/extras">here</a>.</p><p>Adjust your Google Account settings today so you can reclaim your privacy while using Google Services.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://buymeacoffee.com/pcaloca" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wyt3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcef08a-4dbd-4e4f-8109-2720b105006d_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!wyt3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcef08a-4dbd-4e4f-8109-2720b105006d_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!wyt3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcef08a-4dbd-4e4f-8109-2720b105006d_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!wyt3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcef08a-4dbd-4e4f-8109-2720b105006d_1600x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wyt3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcef08a-4dbd-4e4f-8109-2720b105006d_1600x400.jpeg" width="258" height="64.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bbcef08a-4dbd-4e4f-8109-2720b105006d_1600x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:258,&quot;bytes&quot;:294373,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://buymeacoffee.com/pcaloca&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/162221705?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcef08a-4dbd-4e4f-8109-2720b105006d_1600x400.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wyt3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcef08a-4dbd-4e4f-8109-2720b105006d_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!wyt3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcef08a-4dbd-4e4f-8109-2720b105006d_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!wyt3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcef08a-4dbd-4e4f-8109-2720b105006d_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!wyt3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcef08a-4dbd-4e4f-8109-2720b105006d_1600x400.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Alert: Data Breach at Hertz Corporation]]></title><description><![CDATA[Steps to reduce your risk and protect your data]]></description><link>https://essentialriskmgt.com/p/alert-data-breach-at-hertz-corporation</link><guid isPermaLink="false">https://essentialriskmgt.com/p/alert-data-breach-at-hertz-corporation</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Tue, 15 Apr 2025 18:28:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_9Bz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27aba8a6-7483-424c-b9b6-0acc75c96c1a_1014x508.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://essentialriskmgt.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://essentialriskmgt.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_9Bz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27aba8a6-7483-424c-b9b6-0acc75c96c1a_1014x508.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_9Bz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27aba8a6-7483-424c-b9b6-0acc75c96c1a_1014x508.png 424w, https://substackcdn.com/image/fetch/$s_!_9Bz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27aba8a6-7483-424c-b9b6-0acc75c96c1a_1014x508.png 848w, https://substackcdn.com/image/fetch/$s_!_9Bz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27aba8a6-7483-424c-b9b6-0acc75c96c1a_1014x508.png 1272w, https://substackcdn.com/image/fetch/$s_!_9Bz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27aba8a6-7483-424c-b9b6-0acc75c96c1a_1014x508.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_9Bz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27aba8a6-7483-424c-b9b6-0acc75c96c1a_1014x508.png" width="1014" height="508" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/27aba8a6-7483-424c-b9b6-0acc75c96c1a_1014x508.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:508,&quot;width&quot;:1014,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:346663,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/161403725?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27aba8a6-7483-424c-b9b6-0acc75c96c1a_1014x508.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_9Bz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27aba8a6-7483-424c-b9b6-0acc75c96c1a_1014x508.png 424w, https://substackcdn.com/image/fetch/$s_!_9Bz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27aba8a6-7483-424c-b9b6-0acc75c96c1a_1014x508.png 848w, https://substackcdn.com/image/fetch/$s_!_9Bz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27aba8a6-7483-424c-b9b6-0acc75c96c1a_1014x508.png 1272w, https://substackcdn.com/image/fetch/$s_!_9Bz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27aba8a6-7483-424c-b9b6-0acc75c96c1a_1014x508.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Alert: Data Breach at Hertz Corporation</h1><p>"On February 10, 2025, we confirmed that Hertz data was acquired by an unauthorized third party that we understand exploited zero-day vulnerabilities within Cleo's platform in October 2024 and December 2024,"</p><p><strong>Number of people impacted:</strong> Not disclosed</p><p><strong>Locations affected:</strong> Not disclosed</p><h2>Data exposed:</h2><p>"&#8230; <em>customers' names, contact information, date of birth, credit card information, driver's license information</em>, and information related to <em>workers' compensation claims</em>.</p><p>"A very small number of individuals may have had their <em>Social Security or other government identification numbers, passport information, Medicare or Medicaid ID</em> (associated with workers' compensation claims), or i<em>njury-related information associated with vehicle accident claims</em> impacted by the event,"</p><p><strong>Date of Breach:</strong> October 2024 and December 2024, confirmed February 10, 2025</p><p><strong>Attacker</strong>: Not disclosed</p><p><strong>Breach entry point:</strong> Cleo Communications US, LLC (&#8220;Cleo&#8221;), a vendor of Hertz, <a href="https://www.cleo.com/">https://www.cleo.com/</a></p><h1>Data Breach Notice Posting:</h1><p><a href="https://www.hertz.com/content/dam/hertz/global/resources/Notice_of_Data_Incident-United_States.pdf">https://www.hertz.com/content/dam/hertz/global/resources/Notice_of_Data_Incident-United_States.pdf</a></p><h1>News article:</h1><p><a href="https://www.bleepingcomputer.com/news/security/hertz-confirms-customer-info-drivers-licenses-stolen-in-data-breach/">https://www.bleepingcomputer.com/news/security/hertz-confirms-customer-info-drivers-licenses-stolen-in-data-breach/</a></p><h1>Reduce Your Risk with These Actions:</h1><ul><li><p>Call or login to the three major credit bureaus and FREEZE your credit account and place a FRAUD ALERT on your credit files</p><ul><li><p>Equifax - <a href="https://equifax.com">https://equifax.com</a>  | 1-888-548-7878</p></li><li><p>Experian - https://experian.com | 1-800-493-1058</p></li><li><p>Transunion - <a href="https://transunion.com">https://transunion.com</a> | 1-800-916-8800</p></li></ul></li><li><p>Obtain a FREE CREDIT REPORT at <a href="http://www.annualcreditreport.com">www.annualcreditreport.com</a> | 1-877-322-8228</p></li><li><p><em><strong>Hertz is offering two (2) years of Credit Monitoring Service</strong></em> - <strong>sign up for it</strong>. Make note of the day your coverage starts and add and end date in your electronic calendar, as an All Day event reminder</p></li><li><p>Change your password at the company effected by the data breach</p></li><li><p>Sign up for 2-Step Authentication using an Authenticator app on your phone</p></li><li><p>Do not use text messaging for 2-Step Authentication</p></li><li><p>Use a Password Manager to generate and store a long and complex password</p></li><li><p>If a stored credit or debit card was compromised, cancel the card and get a replacement. Update any recurring payments associated with the new card</p></li><li><p>Monitor you card and bank statements for unauthorized charges. Look for out of area charges or small amount charges at unfamiliar merchants.</p></li><li><p>File disputes with your card issuers to recover funds</p></li><li><p>Ensure your browsers, email apps, social media apps, computers, and phones have the latest updates installed</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://buymeacoffee.com/pcaloca" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xF-q!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19728b4c-49a8-47f7-bb6e-461873988ffd_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xF-q!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19728b4c-49a8-47f7-bb6e-461873988ffd_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xF-q!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19728b4c-49a8-47f7-bb6e-461873988ffd_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xF-q!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19728b4c-49a8-47f7-bb6e-461873988ffd_1600x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xF-q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19728b4c-49a8-47f7-bb6e-461873988ffd_1600x400.jpeg" width="236" height="59" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19728b4c-49a8-47f7-bb6e-461873988ffd_1600x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:236,&quot;bytes&quot;:302793,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://buymeacoffee.com/pcaloca&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/161403725?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19728b4c-49a8-47f7-bb6e-461873988ffd_1600x400.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xF-q!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19728b4c-49a8-47f7-bb6e-461873988ffd_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xF-q!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19728b4c-49a8-47f7-bb6e-461873988ffd_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xF-q!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19728b4c-49a8-47f7-bb6e-461873988ffd_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xF-q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19728b4c-49a8-47f7-bb6e-461873988ffd_1600x400.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity for Creatives]]></title><description><![CDATA[Protecting Creatives Livelihoods, Families, and Communities with Common Sense Cybersecurity]]></description><link>https://essentialriskmgt.com/p/cybersecurity-for-creatives</link><guid isPermaLink="false">https://essentialriskmgt.com/p/cybersecurity-for-creatives</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Tue, 01 Apr 2025 21:18:21 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!u2l-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bb40a8f-f6fb-4790-b495-e43d78d6f1eb_1920x1920.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://essentialriskmgt.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://essentialriskmgt.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!u2l-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bb40a8f-f6fb-4790-b495-e43d78d6f1eb_1920x1920.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!u2l-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bb40a8f-f6fb-4790-b495-e43d78d6f1eb_1920x1920.jpeg 424w, https://substackcdn.com/image/fetch/$s_!u2l-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bb40a8f-f6fb-4790-b495-e43d78d6f1eb_1920x1920.jpeg 848w, https://substackcdn.com/image/fetch/$s_!u2l-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bb40a8f-f6fb-4790-b495-e43d78d6f1eb_1920x1920.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!u2l-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bb40a8f-f6fb-4790-b495-e43d78d6f1eb_1920x1920.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!u2l-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bb40a8f-f6fb-4790-b495-e43d78d6f1eb_1920x1920.jpeg" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6bb40a8f-f6fb-4790-b495-e43d78d6f1eb_1920x1920.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1433461,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/160369087?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bb40a8f-f6fb-4790-b495-e43d78d6f1eb_1920x1920.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!u2l-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bb40a8f-f6fb-4790-b495-e43d78d6f1eb_1920x1920.jpeg 424w, https://substackcdn.com/image/fetch/$s_!u2l-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bb40a8f-f6fb-4790-b495-e43d78d6f1eb_1920x1920.jpeg 848w, https://substackcdn.com/image/fetch/$s_!u2l-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bb40a8f-f6fb-4790-b495-e43d78d6f1eb_1920x1920.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!u2l-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bb40a8f-f6fb-4790-b495-e43d78d6f1eb_1920x1920.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Creative Artisans</h1><p>Creative works flow from somewhere deep within you then burst like confetti into your consciousness. Sometimes you struggle to set inspiration free into your chosen media or form. Other times you are compelled to drop everything and focus on creation right now: jot some notes to capture ideas in the fleeting moment, then proceed to give the ideas shape in the present. You labor, adjust, and tweak, until your creation is manifested and ready for presentation to the world.</p><ul><li><p>If your work is a physical object, you must photograph it so it can be presented to the world.</p></li><li><p>If your work is music or the spoken word, your clips, compositions, demo's, recordings, and Midi files are your stock-in-trade.</p></li><li><p>If you are a visual artist, photographs and/or videos become your presentation medium.</p></li><li><p>If you are a writer or poet, your words become captured into digital form somewhere in your process.</p></li></ul><p>The common denominator is creating a <em><strong>digital repository</strong></em> for <em><strong>your works</strong></em> used in distributing, marketing and selling <em><strong>your creations</strong></em>. <em><strong>That repository is your livelihood, your critical asset.</strong></em></p><h1>Cybersecurity Threats</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!An0H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc47ea481-6a39-440e-acc0-947b1a0d34cb_1280x851.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!An0H!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc47ea481-6a39-440e-acc0-947b1a0d34cb_1280x851.jpeg 424w, https://substackcdn.com/image/fetch/$s_!An0H!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc47ea481-6a39-440e-acc0-947b1a0d34cb_1280x851.jpeg 848w, https://substackcdn.com/image/fetch/$s_!An0H!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc47ea481-6a39-440e-acc0-947b1a0d34cb_1280x851.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!An0H!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc47ea481-6a39-440e-acc0-947b1a0d34cb_1280x851.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!An0H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc47ea481-6a39-440e-acc0-947b1a0d34cb_1280x851.jpeg" width="1280" height="851" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c47ea481-6a39-440e-acc0-947b1a0d34cb_1280x851.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:851,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:408630,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/160369087?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc47ea481-6a39-440e-acc0-947b1a0d34cb_1280x851.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!An0H!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc47ea481-6a39-440e-acc0-947b1a0d34cb_1280x851.jpeg 424w, https://substackcdn.com/image/fetch/$s_!An0H!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc47ea481-6a39-440e-acc0-947b1a0d34cb_1280x851.jpeg 848w, https://substackcdn.com/image/fetch/$s_!An0H!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc47ea481-6a39-440e-acc0-947b1a0d34cb_1280x851.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!An0H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc47ea481-6a39-440e-acc0-947b1a0d34cb_1280x851.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Cybercriminals on the Web are laying traps for you so they can snare your money, health records, government identifications, and credit data to use for their own profit.</p><ul><li><p><a href="https://www.weforum.org/stories/2025/01/how-ai-driven-fraud-challenges-the-global-economy-and-ways-to-combat-it/">Artificial intelligence</a> is being used to increase the likelihood you will fall into one of their traps.</p></li><li><p><a href="https://www.security.com/threat-intelligence/ransomware-trends-2025">Ransomware</a> is a constant and pernicious predator waiting for you to click on the wrong link, encrypting your entire computer, and extorting you for hefty fees for promise of recovery.</p></li><li><p>There is no guarantee paying a ransom fee will return your data whole.</p></li></ul><p>How much of your data can you afford to lose and still meet your commitments? This is your <em><strong>Recovery Point Objective (RPO)</strong></em>.</p><p>How long can you be without that repository before your operation is severely impacted or required to cease altogether? This is your <em><strong>Recovery Time Objective (RTO)</strong></em>.</p><h1>Threat Reduction</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sF93!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b8b23d-0906-4492-b310-276d0d313236_1280x856.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sF93!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b8b23d-0906-4492-b310-276d0d313236_1280x856.jpeg 424w, https://substackcdn.com/image/fetch/$s_!sF93!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b8b23d-0906-4492-b310-276d0d313236_1280x856.jpeg 848w, https://substackcdn.com/image/fetch/$s_!sF93!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b8b23d-0906-4492-b310-276d0d313236_1280x856.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!sF93!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b8b23d-0906-4492-b310-276d0d313236_1280x856.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sF93!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b8b23d-0906-4492-b310-276d0d313236_1280x856.jpeg" width="1280" height="856" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/75b8b23d-0906-4492-b310-276d0d313236_1280x856.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:856,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:481277,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/160369087?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b8b23d-0906-4492-b310-276d0d313236_1280x856.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sF93!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b8b23d-0906-4492-b310-276d0d313236_1280x856.jpeg 424w, https://substackcdn.com/image/fetch/$s_!sF93!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b8b23d-0906-4492-b310-276d0d313236_1280x856.jpeg 848w, https://substackcdn.com/image/fetch/$s_!sF93!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b8b23d-0906-4492-b310-276d0d313236_1280x856.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!sF93!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b8b23d-0906-4492-b310-276d0d313236_1280x856.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There is technology available to help reduce online threats. The problem is we have various devices that store our critical data without a uniform way to protect them. Most Creatives are familiar with and have installed antivirus on desktop and laptop computers.</p><ul><li><p>How many Creatives have installed <strong>antivirus</strong> for their <strong>phones, tablets, or WiFi routers</strong>?</p></li><li><p>How many Creatives understand that their <strong>web browsers can be used against them</strong> by cybercriminals and malicious web sites?</p></li><li><p>There are <strong>browser "extensions"</strong> that can be installed in to <strong>flag and prevent browser attacks</strong>.</p></li><li><p>How any Creatives <strong>install these protective and detective extensions</strong>?</p></li></ul><p>The days of <a href="https://www.techradar.com/computing/cyber-security/over-70-percent-of-websites-share-your-personal-data-even-if-you-dont-consent">online privacy are over</a>, at least in the U.S. The General Data Protection Regulation (GDPR) helps somewhat in the European Union.</p><p>The <strong>Google Chrome browser</strong> has become an <strong><a href="https://www.forbes.com/sites/zakdoffman/2025/02/20/google-starts-tracking-all-your-devices-as-chrome-changes/">invasive user surveillance tool</a>.</strong></p><ul><li><p>Marketers and advertisers can observe your daily activity across the Web.</p></li><li><p>Your activity is then sold to other companies who slice and dice you into a profile.</p></li><li><p>Profiles are then sold to retailers, other marketers, and government agencies.</p></li></ul><p>Do Creatives know how to reduce their surveillance profile and browser fingerprints while enhancing online privacy?</p><h1>Cybersecurity as Transformation</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2zgw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b00b9e3-cbcf-48d8-a967-3224ff531f5b_1280x583.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2zgw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b00b9e3-cbcf-48d8-a967-3224ff531f5b_1280x583.jpeg 424w, https://substackcdn.com/image/fetch/$s_!2zgw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b00b9e3-cbcf-48d8-a967-3224ff531f5b_1280x583.jpeg 848w, https://substackcdn.com/image/fetch/$s_!2zgw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b00b9e3-cbcf-48d8-a967-3224ff531f5b_1280x583.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!2zgw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b00b9e3-cbcf-48d8-a967-3224ff531f5b_1280x583.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2zgw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b00b9e3-cbcf-48d8-a967-3224ff531f5b_1280x583.jpeg" width="1280" height="583" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9b00b9e3-cbcf-48d8-a967-3224ff531f5b_1280x583.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:583,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:267310,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/160369087?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b00b9e3-cbcf-48d8-a967-3224ff531f5b_1280x583.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2zgw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b00b9e3-cbcf-48d8-a967-3224ff531f5b_1280x583.jpeg 424w, https://substackcdn.com/image/fetch/$s_!2zgw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b00b9e3-cbcf-48d8-a967-3224ff531f5b_1280x583.jpeg 848w, https://substackcdn.com/image/fetch/$s_!2zgw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b00b9e3-cbcf-48d8-a967-3224ff531f5b_1280x583.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!2zgw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b00b9e3-cbcf-48d8-a967-3224ff531f5b_1280x583.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Integrating cybersecurity into your life can be a transformative experience for Creatives. It can help you <strong>develop a new perspective on the digital world</strong> and the <strong>importance of protecting your sensitive information</strong> on your various devices. <strong>Self-learning is the key</strong> for protecting your critical data. What happens when you harmonize cybersecurity into your Creative life? You improve your</p><ul><li><p>Understanding the of risks and threats in the digital landscape which helps Creatives <strong>become more deliberant and vigilant when navigating online.</strong></p></li></ul><ul><li><p>Knowledge of cybersecurity best practices empowers Creatives to <strong>make informed decisions about online activities</strong>, such as choosing strong passwords, using two-factor authentication, and avoiding suspicious links.</p></li></ul><ul><li><p>Learning cybersecurity encourages Creatives to <strong>think critically about the potential consequences of actions</strong> and where malicious actors can deploy various types of attacks.</p></li></ul><ul><li><p>Understanding cybersecurity best practices can help Creatives <strong>protect personal data, critical production files, finances, and online identities</strong> from various cyber threats.</p></li></ul><ul><li><p>Learning about cybersecurity, Creatives can better navigate the online world, <strong>avoiding phishing scams, malware, and other cyber threats</strong>.</p></li></ul><ul><li><p>Learning about the importance of cybersecurity, you may <strong>feel a sense of responsibility to protect not only yourself but also your families, organizations, communities, and the broader digital ecosystem</strong> wherever you recognize a potential threat.</p></li></ul><h1>Protecting Critical Assets</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VpBP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e10f372-4e9b-41ca-86c7-cdbb47dc5b27_1280x853.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VpBP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e10f372-4e9b-41ca-86c7-cdbb47dc5b27_1280x853.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VpBP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e10f372-4e9b-41ca-86c7-cdbb47dc5b27_1280x853.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VpBP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e10f372-4e9b-41ca-86c7-cdbb47dc5b27_1280x853.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VpBP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e10f372-4e9b-41ca-86c7-cdbb47dc5b27_1280x853.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VpBP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e10f372-4e9b-41ca-86c7-cdbb47dc5b27_1280x853.jpeg" width="1280" height="853" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8e10f372-4e9b-41ca-86c7-cdbb47dc5b27_1280x853.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:853,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:145771,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/160369087?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e10f372-4e9b-41ca-86c7-cdbb47dc5b27_1280x853.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VpBP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e10f372-4e9b-41ca-86c7-cdbb47dc5b27_1280x853.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VpBP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e10f372-4e9b-41ca-86c7-cdbb47dc5b27_1280x853.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VpBP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e10f372-4e9b-41ca-86c7-cdbb47dc5b27_1280x853.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VpBP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e10f372-4e9b-41ca-86c7-cdbb47dc5b27_1280x853.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>How much of your critical data can you afford to lose and still meet your commitments? This is your <em><strong>Recovery Point Objective (RPO)</strong></em>. Only <em><strong>YOU</strong></em> can decide this.</p><p>How long can you be without your data repositories before you are severely impacted or required to cease operations altogether? This is your <em><strong>Recovery Time Objective (RTO)</strong></em>. Only <em><strong>YOU</strong></em> can decide this.</p><p><em><strong>To adequately protect your critical assets, you must build incident response and recovery processes that meet both your RPO and RTO.</strong></em></p><h1>Challenge of Learning Cybersecurity</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DU8b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F833bb5fe-b115-4808-b4a7-74a4ea2b28cb_1280x853.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DU8b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F833bb5fe-b115-4808-b4a7-74a4ea2b28cb_1280x853.jpeg 424w, https://substackcdn.com/image/fetch/$s_!DU8b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F833bb5fe-b115-4808-b4a7-74a4ea2b28cb_1280x853.jpeg 848w, https://substackcdn.com/image/fetch/$s_!DU8b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F833bb5fe-b115-4808-b4a7-74a4ea2b28cb_1280x853.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!DU8b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F833bb5fe-b115-4808-b4a7-74a4ea2b28cb_1280x853.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DU8b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F833bb5fe-b115-4808-b4a7-74a4ea2b28cb_1280x853.jpeg" width="1280" height="853" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/833bb5fe-b115-4808-b4a7-74a4ea2b28cb_1280x853.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:853,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:201324,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/160369087?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F833bb5fe-b115-4808-b4a7-74a4ea2b28cb_1280x853.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DU8b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F833bb5fe-b115-4808-b4a7-74a4ea2b28cb_1280x853.jpeg 424w, https://substackcdn.com/image/fetch/$s_!DU8b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F833bb5fe-b115-4808-b4a7-74a4ea2b28cb_1280x853.jpeg 848w, https://substackcdn.com/image/fetch/$s_!DU8b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F833bb5fe-b115-4808-b4a7-74a4ea2b28cb_1280x853.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!DU8b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F833bb5fe-b115-4808-b4a7-74a4ea2b28cb_1280x853.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Fortunately there are a <strong>plethora of courses, dozens and dozens of tools to use, processes and procedures to learn and implement</strong>. The questions then become:</p><ul><li><p>To <strong>whom do you turn to</strong> when a guiding hand is needed?</p></li><li><p><strong>Who can you trust</strong> to provide clear, actionable advice that fits your Creative needs?</p></li><li><p>Can your <strong>family techie</strong> help?</p></li><li><p><strong>Friends</strong> or <strong>work acquaintances</strong> can <strong>sometimes help</strong> each other out with solutions to tech problems but that assistance has its own limits.</p></li></ul><p>There are many <strong>cybersecurity courses available</strong> at online education platforms, but <strong>choosing one or more becomes a daunting task</strong> in itself.</p><ul><li><p>How do you know it&#8217;s the <strong>right</strong> one?</p></li><li><p>When will it cover the <strong>topics</strong> you need covered?</p></li><li><p>Are there <strong>prerequisite</strong> courses or <strong>knowledge</strong> needed?</p></li><li><p><em><strong>Will it make sense to a nontechnical person</strong></em>?</p></li></ul><h1>Look for a Cybersecurity Expert and Fellow Creative</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_UUv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc20e902c-c859-43e4-80f1-2f039b955560_1280x848.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_UUv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc20e902c-c859-43e4-80f1-2f039b955560_1280x848.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_UUv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc20e902c-c859-43e4-80f1-2f039b955560_1280x848.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_UUv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc20e902c-c859-43e4-80f1-2f039b955560_1280x848.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_UUv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc20e902c-c859-43e4-80f1-2f039b955560_1280x848.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_UUv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc20e902c-c859-43e4-80f1-2f039b955560_1280x848.jpeg" width="1280" height="848" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c20e902c-c859-43e4-80f1-2f039b955560_1280x848.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:848,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:331672,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/160369087?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc20e902c-c859-43e4-80f1-2f039b955560_1280x848.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_UUv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc20e902c-c859-43e4-80f1-2f039b955560_1280x848.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_UUv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc20e902c-c859-43e4-80f1-2f039b955560_1280x848.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_UUv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc20e902c-c859-43e4-80f1-2f039b955560_1280x848.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_UUv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc20e902c-c859-43e4-80f1-2f039b955560_1280x848.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>My <em><strong><a href="https://essentialriskmgt.com/about">twenty-five years of cybersecurity experience</a></strong></em>, while supporting my <em>photography habit</em>, will be <strong>shared with fellow Creatives</strong> to <strong>protect</strong> your <strong>critical data</strong>.</p><p><em><strong>I will armor you</strong></em> with:</p><ul><li><p><strong>Knowledge</strong> you need to be safer online.</p></li><li><p>Written in a way that is <strong>understandable and accessible</strong>.</p></li><li><p>Gaining the knowledge and confidence to <strong>make informed decisions about your online privacy and security</strong> that easily integrate into your life.</p></li><li><p>Achieving <strong>more confidence</strong> to <strong>protect</strong> not only <strong>yourself</strong> but also your <strong>families, organizations, communities</strong>.</p></li><li><p><strong>Workable solutions</strong> that help <strong>protect the broader digital ecosystem</strong> wherever you recognize a potential threat.</p></li></ul><p>I am a <strong>fellow Creative</strong>:</p><ul><li><p>Have a look at <a href="https://pcaloca.substack.com">Paul's Visual Arts SubStack</a></p></li><li><p>I display my <strong>photography</strong>, <strong>multimedia creation works</strong></p></li><li><p>Link to my <strong>online photo store</strong>.</p></li></ul><h1>Become a Subscriber</h1><p>As a <strong>free subscriber</strong> you will</p><ul><li><p>Receive <a href="https://www.forbes.com/sites/zakdoffman/2025/02/20/google-starts-tracking-all-your-devices-as-chrome-changes/">data breach news reports</a> that affect <strong>Creatives credit card data, Social Security Numbers, email and physical addresses, health insurance breaches</strong>, and other privacy compromises.</p></li><li><p>Improve <strong>your own Cybersecurity process</strong> from periodic <strong>CYBERSECURITY FOR CREATIVES TIDBITS</strong> via SubStack Notes.</p></li></ul><h1>Become an Annual Paid Subscriber</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qtPs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25342dc-7218-41de-92e8-7d2a5c46f00c_1280x853.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qtPs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25342dc-7218-41de-92e8-7d2a5c46f00c_1280x853.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qtPs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25342dc-7218-41de-92e8-7d2a5c46f00c_1280x853.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qtPs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25342dc-7218-41de-92e8-7d2a5c46f00c_1280x853.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qtPs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25342dc-7218-41de-92e8-7d2a5c46f00c_1280x853.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qtPs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25342dc-7218-41de-92e8-7d2a5c46f00c_1280x853.jpeg" width="1280" height="853" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f25342dc-7218-41de-92e8-7d2a5c46f00c_1280x853.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:853,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:152749,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/160369087?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25342dc-7218-41de-92e8-7d2a5c46f00c_1280x853.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qtPs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25342dc-7218-41de-92e8-7d2a5c46f00c_1280x853.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qtPs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25342dc-7218-41de-92e8-7d2a5c46f00c_1280x853.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qtPs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25342dc-7218-41de-92e8-7d2a5c46f00c_1280x853.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qtPs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25342dc-7218-41de-92e8-7d2a5c46f00c_1280x853.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Most people dislike monthly subscriptions. I find annual subscriptions much easier to add to my calendar reminder and allocate funds every year. Maybe you are the same? If so, <strong>annual subscriptions are discounted more than 20% from monthly!</strong></p><p><strong>Paid subscribers will learn to integrate cybersecurity processes into their daily lives</strong> with:</p><ul><li><p><strong>Everything free subscribers receive</strong></p></li><li><p><strong>Defeating malicious web sites</strong> using <strong>tools</strong> and <strong>processes</strong></p></li><li><p><strong>Adjust privacy and security settings</strong> on your devices: PC, Mac, Phones, Tablets, WiFi routers to i<strong>ncrease your confidentiality and privacy</strong></p></li><li><p><strong>Safer public WiFi usage</strong> at coffee shops, transportation, and retailers</p></li><li><p><strong>Understand current and emerging cyberthreats</strong> along with <strong>protections for Creatives</strong></p></li><li><p><strong>Exploring new security and privacy tools</strong> that enhance confidentiality, integrity, and availability of <strong>Creatives business or production activities and processes</strong></p></li><li><p><strong>Chat</strong> to share experiences and solutions unique to Creatives</p></li><li><p><strong>Discounts</strong> on <em><strong>Cybersecurity Intelligent Response<sup> TM</sup></strong></em> <strong>knowledge, tools, and training</strong> produced <strong>specifically for Creatives</strong> that <strong>make you safer and increase confidence</strong> in daily online activities</p></li><li><p><strong>Supporting a fellow Creative</strong> and giving back to our community</p></li></ul><p>How will you feel having a <strong>Trusted Cybersecurity Advisor with actionable recommendations to help protect yourself online?</strong></p><p>Now, it is up to <strong>YOU</strong>. <strong>Become an Annual Paid Subscriber now.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://buymeacoffee.com/pcaloca" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!j5nj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90abab15-398e-4519-b839-783b17e575b0_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!j5nj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90abab15-398e-4519-b839-783b17e575b0_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!j5nj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90abab15-398e-4519-b839-783b17e575b0_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!j5nj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90abab15-398e-4519-b839-783b17e575b0_1600x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!j5nj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90abab15-398e-4519-b839-783b17e575b0_1600x400.jpeg" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/90abab15-398e-4519-b839-783b17e575b0_1600x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:297469,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://buymeacoffee.com/pcaloca&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/160369087?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90abab15-398e-4519-b839-783b17e575b0_1600x400.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!j5nj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90abab15-398e-4519-b839-783b17e575b0_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!j5nj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90abab15-398e-4519-b839-783b17e575b0_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!j5nj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90abab15-398e-4519-b839-783b17e575b0_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!j5nj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90abab15-398e-4519-b839-783b17e575b0_1600x400.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Alert: Data Breach at Pennsylvania Education Association (PSEA)]]></title><description><![CDATA[Data stolen impacting 517,487 people across 10+ states]]></description><link>https://essentialriskmgt.com/p/alert-data-breach-at-pennsylvania</link><guid isPermaLink="false">https://essentialriskmgt.com/p/alert-data-breach-at-pennsylvania</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Wed, 19 Mar 2025 19:09:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fPW7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3d795f-5e09-4065-8734-fa305772b88c_800x550.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fPW7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3d795f-5e09-4065-8734-fa305772b88c_800x550.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fPW7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3d795f-5e09-4065-8734-fa305772b88c_800x550.jpeg 424w, https://substackcdn.com/image/fetch/$s_!fPW7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3d795f-5e09-4065-8734-fa305772b88c_800x550.jpeg 848w, https://substackcdn.com/image/fetch/$s_!fPW7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3d795f-5e09-4065-8734-fa305772b88c_800x550.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!fPW7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3d795f-5e09-4065-8734-fa305772b88c_800x550.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fPW7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3d795f-5e09-4065-8734-fa305772b88c_800x550.jpeg" width="800" height="550" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b3d795f-5e09-4065-8734-fa305772b88c_800x550.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:550,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:72907,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/159431607?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3d795f-5e09-4065-8734-fa305772b88c_800x550.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fPW7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3d795f-5e09-4065-8734-fa305772b88c_800x550.jpeg 424w, https://substackcdn.com/image/fetch/$s_!fPW7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3d795f-5e09-4065-8734-fa305772b88c_800x550.jpeg 848w, https://substackcdn.com/image/fetch/$s_!fPW7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3d795f-5e09-4065-8734-fa305772b88c_800x550.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!fPW7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3d795f-5e09-4065-8734-fa305772b88c_800x550.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Pennsylvania state capitol</figcaption></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://essentialriskmgt.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://essentialriskmgt.com/subscribe?"><span>Subscribe now</span></a></p><h1>Alert: Data Breach at Pennsylvania Education Association (PSEA)</h1><h2>Data stolen impacting 517,487 people: </h2><blockquote><p><em><strong>State IDs, Social Security numbers, financial account numbers, payment card information, passport numbers, taxpayer IDs, health insurance information.</strong></em></p></blockquote><h2>Locations affected: </h2><blockquote><p>Residents of Iowa, Maine, Maryland, Massachusetts, New Hampshire, New Mexico, New York, North Carolina, Oregon, Pennsylvania , Rhode Island, Washington D.C., current and former members of PSEA.</p></blockquote><h2>News article:</h2><blockquote><p>"PSEA represents more than 177,000 teachers, school nurses, bus drivers, cafeteria workers and others in roles across Pennsylvania&#8217;s public schools. The organization bargains compensation and benefits on behalf of school workers and has existed since 1852."</p><p>-- The Record Media, March 19, 2025. <a href="https://therecord.media/half-a-million-impacted-pennsylvania-education-data-breach">https://therecord.media/half-a-million-impacted-pennsylvania-education-data-breach</a></p></blockquote><h2>Date of Breach: </h2><p>July, 6 2024</p><h2>Attacker: </h2><p>The attack on PSEA was <a href="https://x.com/FalconFeedsio/status/1833286217799987662">claimed by the Rhysida ransomware gang</a> in September 2024.</p><h2>Breach entry point: </h2><p>PSEA network environment. No further specifics provided.</p><h2>Data Breach Notice Posting(s):</h2><ul><li><p>Maine - <a href="https://www.maine.gov/agviewer/content/ag/985235c7-cb95-4be2-8792-a1252b4f8318/e44266ce-8099-4d3c-8635-2c5cdb41f24a.html">https://www.maine.gov/agviewer/content/ag/985235c7-cb95-4be2-8792-a1252b4f8318/e44266ce-8099-4d3c-8635-2c5cdb41f24a.html</a></p></li><li><p>Massachusetts - <a href="https://www.mass.gov/doc/2025-493-pennsylvania-state-education-association/download">https://www.mass.gov/doc/2025-493-pennsylvania-state-education-association/download</a></p></li><li><p>New Hampshire - <a href="https://mm.nh.gov/files/uploads/doj/remote-docs/pennsylvania-state-education-association-20250318.pdf">https://mm.nh.gov/files/uploads/doj/remote-docs/pennsylvania-state-education-association-20250318.pdf</a></p></li><li><p>Pennsylvania - <a href="https://www.psea.org/pages-without-a-home/notice-of-data-security-incident/">https://www.psea.org/pages-without-a-home/notice-of-data-security-incident/</a></p></li></ul><h1>Reduce Your Risk with These Actions:</h1><ul><li><p>Call or login to the three major credit bureaus and <strong>FREEZE your credit account</strong> and <strong>place a FRAUD ALERT</strong> on your credit files</p><ul><li><p>Equifax - <a href="https://equifax.com">https://equifax.com</a> | 1-888-548-7878</p></li><li><p>Experian - <a href="https://experian.com">https://experian.com</a> | 1-800-493-1058</p></li><li><p>Transunion - <a href="https://transunion.com">https://transunion.com</a> | 1-800-916-8800</p></li></ul></li><li><p>Obtain a <em><strong>FREE CREDIT REPORT every twelve (12) months</strong></em> at <a href="http://www.annualcreditreport.com">www.annualcreditreport.com</a> | 1-877-322-8228</p></li><li><p>If you are offered <em><strong>Credit Monitoring Service</strong></em> in a letter notifying you of a data breach, <em>sign up for it</em>. Make note of the day your <em>coverage start and end dates</em> in your <em>electronic calendar</em>, as an All Day event reminder</p></li><li><p><em><strong>Change your password</strong></em> at the company effected by the data breach</p></li><li><p><em><strong>Sign up for 2-Step Authentication</strong></em> using an Authenticator app on your phone</p></li><li><p><em><strong>Do not use text messaging for 2-Step Authentication</strong></em></p></li><li><p><em><strong>Use a Password Manager</strong></em> to generate and store a long and complex password</p></li><li><p>If a stored credit or debit card was compromised, <em><strong>cancel the card and get a replacement</strong></em>. Update any recurring payments associated with the new card</p></li><li><p><em><strong>Monitor your card and bank statements</strong></em> for unauthorized charges. Look for out of area charges or small amount charges at unfamiliar merchants.</p></li><li><p><em><strong>File disputes with your card issuers</strong></em> to recover funds</p></li><li><p>Ensure your browsers, email apps, social media apps, computers, and phones have the <em><strong>latest updates installed</strong></em></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://buymeacoffee.com/pcaloca" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SECF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1ffbe22-2b43-46c5-b45d-ee2b59545f63_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!SECF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1ffbe22-2b43-46c5-b45d-ee2b59545f63_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!SECF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1ffbe22-2b43-46c5-b45d-ee2b59545f63_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!SECF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1ffbe22-2b43-46c5-b45d-ee2b59545f63_1600x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SECF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1ffbe22-2b43-46c5-b45d-ee2b59545f63_1600x400.jpeg" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e1ffbe22-2b43-46c5-b45d-ee2b59545f63_1600x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:297469,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://buymeacoffee.com/pcaloca&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/159431607?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1ffbe22-2b43-46c5-b45d-ee2b59545f63_1600x400.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SECF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1ffbe22-2b43-46c5-b45d-ee2b59545f63_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!SECF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1ffbe22-2b43-46c5-b45d-ee2b59545f63_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!SECF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1ffbe22-2b43-46c5-b45d-ee2b59545f63_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!SECF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1ffbe22-2b43-46c5-b45d-ee2b59545f63_1600x400.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Alert: Bronx Riverdale Country School Data Breach]]></title><description><![CDATA[RansomHub published the stolen data on its darknet site]]></description><link>https://essentialriskmgt.com/p/alert-bronx-riverdale-country-school</link><guid isPermaLink="false">https://essentialriskmgt.com/p/alert-bronx-riverdale-country-school</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Mon, 10 Mar 2025 20:47:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fp6M!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecf43931-c637-4fef-84d4-d1b87bbe41ba_1024x576.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fp6M!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecf43931-c637-4fef-84d4-d1b87bbe41ba_1024x576.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fp6M!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecf43931-c637-4fef-84d4-d1b87bbe41ba_1024x576.jpeg 424w, https://substackcdn.com/image/fetch/$s_!fp6M!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecf43931-c637-4fef-84d4-d1b87bbe41ba_1024x576.jpeg 848w, https://substackcdn.com/image/fetch/$s_!fp6M!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecf43931-c637-4fef-84d4-d1b87bbe41ba_1024x576.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!fp6M!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecf43931-c637-4fef-84d4-d1b87bbe41ba_1024x576.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fp6M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecf43931-c637-4fef-84d4-d1b87bbe41ba_1024x576.jpeg" width="1024" height="576" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ecf43931-c637-4fef-84d4-d1b87bbe41ba_1024x576.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:576,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Hill Campus (6-12) - Riverdale Country School&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Hill Campus (6-12) - Riverdale Country School" title="Hill Campus (6-12) - Riverdale Country School" srcset="https://substackcdn.com/image/fetch/$s_!fp6M!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecf43931-c637-4fef-84d4-d1b87bbe41ba_1024x576.jpeg 424w, https://substackcdn.com/image/fetch/$s_!fp6M!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecf43931-c637-4fef-84d4-d1b87bbe41ba_1024x576.jpeg 848w, https://substackcdn.com/image/fetch/$s_!fp6M!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecf43931-c637-4fef-84d4-d1b87bbe41ba_1024x576.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!fp6M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecf43931-c637-4fef-84d4-d1b87bbe41ba_1024x576.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Does your child, grandchild, sibling, or relative attend Riverdale Country School in Bronx, NY? If so, the school incurred a data breach and ransomware attack by <a href="https://www.sentinelone.com/anthology/ransomhub/">RansomHub</a>. The school did not pay the requested ransom. The nonpayment led to the leak of 42Gb of student data.</p><p>&#9;&#8226; <strong><a href="https://www.riverdale.edu/">Riverdale Country School</a> (Pre-K to 11)</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://essentialriskmgt.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Essential Risk Management! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>&#9;&#8226; Location: <strong>Bronx, NY</strong></p><p>&#9;&#8226; Data breached: <strong>biographical info, contact info, personal medical information</strong></p><p>&#9;&#8226; Data exposed or stolen: <strong>Feb 20, 2025</strong></p><p>&#9;&#8226; Links to news &amp; disclosure: <strong><a href="https://www.bxtimes.com/hackers-leak-sensitive-data-from-elite-bronx-private-school-after-ransomware-attack/">https://www.bxtimes.com/hackers-leak-sensitive-data-from-elite-bronx-private-school-after-ransomware-attack/</a></strong></p><h1>Reduce Your Risk with These Actions:</h1><p>If your child's data was compromised in the Riverdale Country School data breach, here are some steps you can take:</p><p>1. <strong>Contact the school</strong>: Reach out to <em>Riverdale Country School's administration</em> to report the breach and express your concerns. They may provide more information on the affected data and the steps they are taking to mitigate the situation.</p><p>2. <strong>Report the breach to the relevant authorities</strong>: File a complaint with the Federal Trade Commission (FTC) and the New York State Attorney General's Office, as they oversee data protection laws.</p><p>3. <strong>Monitor your child's credit report</strong>: If you child has a Social Security Numner, they likely have a credit report. Request a copy of your child's credit report from the three major credit bureaus (<a href="https://experian.com">Experian</a>, <a href="https://transunion.com">TransUnion</a>, and <a href="https://equifax.com">Equifax</a>) to ensure there are no unexpected changes or accounts opened in their name.</p><p>4. <strong>Seek assistance from a credit monitoring service</strong>: Consider enrolling your child in a credit monitoring service to detect any potential identity theft or financial misuse.</p><p>5. <strong>Consult with a data protection attorney</strong>: If you believe your child's data was mishandled or if you're unsure about your next steps, consider consulting with a data protection attorney who can guide you through the process.</p><h1>Additional resources:</h1><ul><li><p>Federal Trade Commission (FTC) Complaint Assistant: https://www.ftc.gov/complaint</p></li><li><p>New York State Attorney General's Office: https://ag.ny.gov/</p></li><li><p>Credit monitoring services: Consider services like LifeLock or IdentityForce to monitor your child's credit report and detect potential identity theft.</p></li><li><p>Data protection attorneys: Look for attorneys specializing in data protection and identity theft cases in your area.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://buymeacoffee.com/pcaloca" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mAsT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37976d56-42c8-46bd-8363-5fadf9375b27_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mAsT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37976d56-42c8-46bd-8363-5fadf9375b27_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mAsT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37976d56-42c8-46bd-8363-5fadf9375b27_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mAsT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37976d56-42c8-46bd-8363-5fadf9375b27_1600x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mAsT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37976d56-42c8-46bd-8363-5fadf9375b27_1600x400.jpeg" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/37976d56-42c8-46bd-8363-5fadf9375b27_1600x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:297469,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://buymeacoffee.com/pcaloca&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/158800588?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37976d56-42c8-46bd-8363-5fadf9375b27_1600x400.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mAsT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37976d56-42c8-46bd-8363-5fadf9375b27_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mAsT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37976d56-42c8-46bd-8363-5fadf9375b27_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mAsT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37976d56-42c8-46bd-8363-5fadf9375b27_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mAsT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37976d56-42c8-46bd-8363-5fadf9375b27_1600x400.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Technology Used to Betray Our Social Contract]]></title><description><![CDATA[I was in my easy chair late last night reading news and one social media post alarmed me to believe yet another social contract I've relied upon for the last few years was jeopardized.]]></description><link>https://essentialriskmgt.com/p/technology-used-to-betray-our-social</link><guid isPermaLink="false">https://essentialriskmgt.com/p/technology-used-to-betray-our-social</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Wed, 05 Mar 2025 21:49:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Ad1u!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4b3d67-c194-4fba-bafb-a446a18b2ce9_1024x608.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ad1u!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4b3d67-c194-4fba-bafb-a446a18b2ce9_1024x608.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ad1u!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4b3d67-c194-4fba-bafb-a446a18b2ce9_1024x608.png 424w, https://substackcdn.com/image/fetch/$s_!Ad1u!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4b3d67-c194-4fba-bafb-a446a18b2ce9_1024x608.png 848w, https://substackcdn.com/image/fetch/$s_!Ad1u!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4b3d67-c194-4fba-bafb-a446a18b2ce9_1024x608.png 1272w, https://substackcdn.com/image/fetch/$s_!Ad1u!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4b3d67-c194-4fba-bafb-a446a18b2ce9_1024x608.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ad1u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4b3d67-c194-4fba-bafb-a446a18b2ce9_1024x608.png" width="1024" height="608" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0f4b3d67-c194-4fba-bafb-a446a18b2ce9_1024x608.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:608,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ad1u!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4b3d67-c194-4fba-bafb-a446a18b2ce9_1024x608.png 424w, https://substackcdn.com/image/fetch/$s_!Ad1u!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4b3d67-c194-4fba-bafb-a446a18b2ce9_1024x608.png 848w, https://substackcdn.com/image/fetch/$s_!Ad1u!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4b3d67-c194-4fba-bafb-a446a18b2ce9_1024x608.png 1272w, https://substackcdn.com/image/fetch/$s_!Ad1u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4b3d67-c194-4fba-bafb-a446a18b2ce9_1024x608.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"></figcaption></figure></div><p>I was in my easy chair late last night reading news and one social media post alarmed me to believe yet another social contract I've relied upon for the last few years was jeopardized.</p><p>The Social Security Administration has updated their web site Terms of Service to  disclaim any responsibility for <em><strong>"the improper disclosure of any information that the Social Security Administration has provided to me or any information that is on or from my computer or other device, whether due to my negligence or the wrongful acts of others."&#9;</strong></em></p><p>Several questions immediately came to mind:&#9;</p><ul><li><p>Can I no longer trust the information the Social Security Administration has provided to me?</p></li><li><p>Can the Social Security Administration now read information on my computer  without my consent when I login?</p></li><li><p>Can the Social Security Administration now collect and disseminate information from my computer without my consent?</p></li><li><p>Is the Social Security Administration now anticipating others will be provided my information or access to my computer or data without my consent and disclaiming responsibility?</p></li></ul><p>I think it's time to get involved and call my Congressional Representatives and Senators to report this blatant abuse of our ow devices and personal information.</p><p>I'll also notify my local chapter of <a href="http://ACLU.org">http://ACLU.org</a> to get them into gear as well.</p><p>This. Must. Stop.</p><p>Article link: <a href="https://www.dailykos.com/stories/2025/3/4/2307754/-A-curious-clause-in-the-Social-Security-Administration-website-s-Terms-of-Service-Is-this-new">https://www.dailykos.com/stories/2025/3/4/2307754/-A-curious-clause-in-the-Social-Security-Administration-website-s-Terms-of-Service-Is-this-new</a></p><p><strong>Beatles song for the moment: </strong><a href="https://www.youtube.com/watch?v=BGLGzRXY5Bw">https://www.youtube.com/watch?v=BGLGzRXY5Bw</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://buymeacoffee.com/pcaloca" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cW6U!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F258247d1-9e54-4752-967a-1e8aee0c07d6_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cW6U!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F258247d1-9e54-4752-967a-1e8aee0c07d6_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cW6U!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F258247d1-9e54-4752-967a-1e8aee0c07d6_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cW6U!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F258247d1-9e54-4752-967a-1e8aee0c07d6_1600x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cW6U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F258247d1-9e54-4752-967a-1e8aee0c07d6_1600x400.jpeg" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/258247d1-9e54-4752-967a-1e8aee0c07d6_1600x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:297469,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://buymeacoffee.com/pcaloca&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/158472721?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F258247d1-9e54-4752-967a-1e8aee0c07d6_1600x400.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cW6U!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F258247d1-9e54-4752-967a-1e8aee0c07d6_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cW6U!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F258247d1-9e54-4752-967a-1e8aee0c07d6_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cW6U!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F258247d1-9e54-4752-967a-1e8aee0c07d6_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cW6U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F258247d1-9e54-4752-967a-1e8aee0c07d6_1600x400.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[2025 MacOS Cyber Safety]]></title><description><![CDATA[Deter cybercriminals that want your cash and personal information]]></description><link>https://essentialriskmgt.com/p/2025-macos-cyber-safety</link><guid isPermaLink="false">https://essentialriskmgt.com/p/2025-macos-cyber-safety</guid><dc:creator><![CDATA[Paul Caloca - EssentialRiskMgt]]></dc:creator><pubDate>Fri, 21 Feb 2025 00:30:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!TubW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9c5f17-0404-4f39-85a6-edeae0dd3426_1600x1200.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TubW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9c5f17-0404-4f39-85a6-edeae0dd3426_1600x1200.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TubW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9c5f17-0404-4f39-85a6-edeae0dd3426_1600x1200.png 424w, https://substackcdn.com/image/fetch/$s_!TubW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9c5f17-0404-4f39-85a6-edeae0dd3426_1600x1200.png 848w, https://substackcdn.com/image/fetch/$s_!TubW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9c5f17-0404-4f39-85a6-edeae0dd3426_1600x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!TubW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9c5f17-0404-4f39-85a6-edeae0dd3426_1600x1200.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TubW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9c5f17-0404-4f39-85a6-edeae0dd3426_1600x1200.png" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4e9c5f17-0404-4f39-85a6-edeae0dd3426_1600x1200.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1276564,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/157587495?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9c5f17-0404-4f39-85a6-edeae0dd3426_1600x1200.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TubW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9c5f17-0404-4f39-85a6-edeae0dd3426_1600x1200.png 424w, https://substackcdn.com/image/fetch/$s_!TubW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9c5f17-0404-4f39-85a6-edeae0dd3426_1600x1200.png 848w, https://substackcdn.com/image/fetch/$s_!TubW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9c5f17-0404-4f39-85a6-edeae0dd3426_1600x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!TubW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9c5f17-0404-4f39-85a6-edeae0dd3426_1600x1200.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Myth: Mac's are safe, Mac's don't get viruses or malware!</h1><h2>Reality: Mac's are vulnerable to malware and viruses!</h2><p>There are two main reasons why Mac's are thought to be safe from malware and viruses. First, fewer of them are in the marketplace compared to Windows machines. As of early 2025, <a href="https://en.wikipedia.org/wiki/Usage_share_of_operating_systems">Windows holds a significant lead</a> in the desktop and laptop market with a 73% share, while MacOS accounts for about 14%. Windows remains the dominant operating system for personal computers, whereas MacOS is popular among creative professionals, education, and those within the Apple ecosystem (iPhone, iPad, AppleTV, Mac users).</p><p>Second, Apple has done a very good job of <a href="https://www.apple.com/newsroom/2023/06/apple-announces-powerful-new-privacy-and-security-features/">building secure settings</a> into their products. Apple has also done an excellent job of creating the perception their products protect privacy and security using big budget marketing programs to <a href="https://businessmodelanalyst.com/apple-marketing-strategy/">differentiate brand awareness</a> in their favor.</p><p>One of the byproducts of Apple marketing their high-ticket products is many web sites have begun to use your browser's Operating System parameter, sent when you connect to any site, to <a href="https://www.imore.com/mac-users-might-be-paying-more-pc-users-airline-tickets-and-more">charge Apple users higher fees for products and services</a>. The assumption being, if you can afford an Apple product, you can pay a higher fee. Also, Apple's market share is steadily growing in both personal and corporate environments. I've worked in several corporations where being provided a company MacBook was a huge perk and created considerable employee loyalty.</p><h1>Updated MacOS Attacks</h1><p>Cybercriminals have taken notice of MacOS as an "untapped resource" and have begun to focus more of their efforts on MacOS users with:</p><blockquote><p><strong><a href="https://www.tomsguide.com/computing/online-security/macs-under-attack-from-dangerous-malware-targeting-digital-wallets-and-apples-notes-apps-how-to-stay-safe">Advanced Malware</a>:</strong> Newer and more sophisticated malware variants, such as <a href="https://www.bleepingcomputer.com/news/security/microsoft-spots-xcsset-macos-malware-variant-used-for-crypto-theft/">XCSSET</a> and <a href="https://cybersecuritynews.com/deepseek-campaign-attacking-macos-users/">Poseidon</a>, are being developed to exploit MacOS vulnerabilities. These malware types can steal sensitive data, including passwords and cryptocurrency wallets.</p><p><strong><a href="https://appleinsider.com/articles/25/02/04/cybercriminals-are-using-ai-to-target-macos-in-2025">AI-Powered Attacks</a></strong>: Cybercriminals are using AI to create more advanced and stealthy attacks. AI tools can automate compromise of tasks like network monitoring and vulnerability patching, making it easier for attackers to scale their operations.</p><p><strong><a href="https://moonlock.com/moonlock-2024-macos-threat-report">Malware-as-a-Service (MaaS)</a></strong>: The rise of MaaS has made it easier for inexperienced individuals to launch MacOS-focused campaigns. These services provide tools and instructions for bypassing MacOS defenses, lowering the barrier to entry for cybercriminals.</p><p><strong><a href="https://moonlock.com/moonlock-2024-macos-threat-report">Social Engineering</a></strong>: Cybercriminals are leveraging social engineering tactics to trick users into bypassing MacOS&#8217;s security measures. This includes guiding victims through the process of manually bypassing Gatekeeper, Apple&#8217;s security feature.</p></blockquote><p>Remember: These malware tools attack your <em>built-in human preference to trust</em> what is placed in front of you while online. While malware uses technology to coerce the receiver to take an action that infiltrates and extracts information and funds, fundamentally <em>the attack is targeted at the weakest link in the chain: the Human!</em> <em>Beware of your own reactions</em>, especially when the message is designed to create urgency to click or download something immediately.</p><h1>Best Practices for Securing MacOS</h1><h2>Use <a href="https://www.techrepublic.com/article/time-to-crack-your-password-guide/">Strong Passwords</a>: </h2><p>Strong passwords are hard to guess and help protect your accounts from unauthorized access. Using a password manager ensures that you can use complex and unique passwords without needing to remember them all. If you have used the same password on more than one web site, remember to login and change that password to a newly generated complex password created by the password manager. Enable <em>Two-Factor authentication</em> on every web site that allows it (more info below).</p><h2>Enable MacOS <a href="https://support.apple.com/guide/deployment/intro-to-filevault-dep82064ec40/web">FileVault</a>: </h2><p>FileVault encrypts your entire Mac internal hard drive, making it difficult for anyone to access your data without the correct password. This is essential if your laptop is lost or stolen. Create a pass phrase that is easy to remember when enabling File Vault. I use a phrase from a favorite song, which is easy to remember and is at least 20 characters long. This make it very difficult for a thief to guess your password if your machine is stolen. Store the pass phrase in your password manager tool for future reference.</p><h2><a href="https://support.apple.com/guide/mac-help/keep-your-mac-up-to-date-mchlpx1065/mac">Keep Software Updated</a>: </h2><p>Regular updates patch known vulnerabilities in the operating system and installed applications. Keeping everything up-to-date reduces the risk of malware exploiting these vulnerabilities. Remember to have your Mac install MacOS updates automatically. This is the easiest way to stay up to date. Also, be sure to run backups after the update has completed so you can recover to an updated state, if needed.</p><h2>Use Antivirus Software: </h2><p>Apple uses <a href="https://www.apple.com/macos/security/">built-in technologies</a> like XD (execute disable), ASLR (address space layout randomization), and SIP (system integrity protection) to make it difficult for malware to do harm. This is a good start. Advanced malware can get past these technologies, so the concept of "defense in depth" should be implemented.</p><p><a href="https://www.cloudflare.com/learning/security/glossary/what-is-defense-in-depth/">Defense in Depth</a> means there are more than one defense technologies deployed to protect against malware. <a href="https://prf.hn/l/w9kxBzY/">Antivirus software</a> provides an additional layer of protection by detecting and removing malware that might slip through existing defenses. It helps ensure your system stays clean. I use <a href="https://prf.hn/l/w9kxBzY/">Malwarebytes</a> on my Mac Mini desktop and MacBook Air laptop machines as my second line of malware defense.</p><h2>Enable MacOS <a href="https://support.apple.com/guide/mac-help/block-connections-to-your-mac-with-a-firewall-mh34041/mac">Firewall</a>: </h2><p>The built-in firewall blocks unauthorized network connections to your system by monitoring incoming and outgoing network traffic. It acts as a barrier between your Mac and potential threats. A quick YouTube video tutorial explains MacOS firewall settings <a href="https://youtu.be/zOFTk8F4oPY">here</a>. Having your firewall enabled is critical for laptops used at coffee shops, airports, or other public WiFi locations. More on WiFi below.</p><h2>Limit <a href="https://www.intego.com/mac-security-blog/understanding-user-accounts-in-macos/">Administrative Privileges</a>: </h2><p>Granting administrative privileges only to trusted users minimizes the risk of unauthorized changes to system settings and installations. Using standard user accounts for daily activities reduces the chance of accidental malware installation. This is important if more than one person uses your Mac. If so, each person should have their own standard login account. You, as the owner, will automatically have administrative privileges that allows changes to the entire system. No one else should have that privilege. One exception would be a repair shop or Apple technician, if your machine must go in for hands-on servicing.</p><h2><a href="https://support.apple.com/en-us/104984">Backup Your Data</a> with Apple <a href="https://news.macgasm.net/tips/how-to-use-time-machine/">Time Machine</a>: </h2><p>Regular backups ensure that you can recover your data in case of an attack or hardware failure. Backups provide peace of mind, knowing that your important files are safe. You will need an external USB drive with capacity that is at least 2X the size of your internal hard drive to start. If you have additional external drives you want to backup, you will need to increase the size of your backup disk to include those as well. These <a href="https://support.apple.com/en-us/104984">instructions and video</a> will get you started.</p><p>Once your backups are operating normally, another best practice is to disconnect the USB drive and reconnect periodically and after system updates. Disconnected drives ensure your data remains safe and out of reach in the event your machine is attacked by malware, also known as an <em>Air Gap</em>. This establishes your <em>Recovery <a href="https://www.geeksforgeeks.org/recovery-time-objective-rto-vs-recovery-point-objective-rpo-in-system-design/#what-is-the-recovery-point-objective-rpo">Point Objective (RPO)</a></em>, which is the point of last recoverable data.</p><p>You must determine for yourself how much data you can allow to be lost between backups (<em>RPO</em>) and connect the backup USB drive to match that frequency. For example, if you can only lose two days of data, then reconnect your USB drive every other day to stay up to date.</p><p>Saving your important documents to a <a href="https://www.whizlabs.com/blog/best-free-cloud-storage/">cloud drive service</a>, such as Google Drive, Microsoft OneDrive, Box.com or Dropbox, can reduce your frequency of connecting your backup USB drive, as those files are backup up to their cloud hosts in minutes. You also must understand that a malware infection may be included in a recent backup and, with a good backup, a tech professional will be able to assist you in restoring to an earlier uninfected backup date, if needed.</p><p>When running your backup, ensure there are <em>no other applications or browsers running that make outgoing connections</em>. You might consider shutting down the network entirely by disabling WiFi, Bluetooth, and unplugging any network cables attached to USB ports. This eliminates the risk of an application allowing an undesired outbound network connection that could trigger a malware event. I usually try to start the backup process with a network disconnected machine before going to bed at night and it is done the next morning when I start my day.</p><h2>Be <a href="https://www.lockwell.co/blog/don-t-risk-it-the-top-10-dangers-of-downloading-unverified-software">Cautious with Downloads</a>: </h2><p>Downloading software from trusted sources helps avoid malicious programs that can harm your system. When downloading files, it's essential to be cautious because of:</p><blockquote><p><a href="https://www.malwarebytes.com/malware">Malware Risk</a>: Files can contain viruses, spyware, ransomware, or other malicious software that can harm your device and compromise your data.</p><p><a href="https://www.phishing.org/what-is-phishing">Phishing</a>: Some downloads might trick you into revealing personal information, like passwords or credit card numbers.</p><p><a href="https://www.copyrighted.com/blog/questions-you-must-ask-answer-about-copyright-infringement">Copyright Infringement</a>: Downloading copyrighted material without permission can lead to legal issues.</p><p><a href="https://www.bleepingcomputer.com/tag/data-breach/">Data Breaches</a>: Malicious files can be used to gain unauthorized access to your personal or financial information.</p><p><a href="https://www.makeuseof.com/signs-website-untrustworthy/">Unreliable Sources</a>: Not all websites or links are trustworthy. Downloading from dubious sources increases the risk of getting infected files.</p></blockquote><p>By keeping your <a href="https://prf.hn/l/w9kxBzY/">antivirus software updated</a> and ensuring you download files only from reputable websites, you can mitigate these risks. Always double-check the source before hitting the "download" button!</p><p>Be especially careful when download links are included in unsolicited email messages, also known as <a href="https://us.norton.com/blog/online-scams/phishing-email-examples">Phishing Emails</a>. If you are not expecting a download link from recently purchased software, the surprise download may be malware than can cause catastrophic loss for you. By the way, never click on a download link in your email Spam of Junk folder. Your email provider has likely already analyzed and flagged the message as suspicious. Better safe than sorry.</p><h2>Use <a href="https://consumer.ftc.gov/articles/use-two-factor-authentication-protect-your-accounts">Two-Factor Authentication</a>: </h2><p>Two-factor authentication adds an extra layer of security by requiring a second form of verification (e.g., a code sent to your phone) in addition to your password. This makes it harder for attackers to gain access to your accounts. This second factor can come from one of the following categories:</p><blockquote><p><strong>Something you know:</strong> This is you password or PIN.</p><p><strong>Something you have:</strong> This might be a smartphone, hardware token, or an authenticator app that generates a time-sensitive code.</p><p><strong>Something you are:</strong> This includes biometric factors like facial recognition (iPhone/iPad), fingerprints (Mac laptops), retinal scans, hand geometry scans, or voice recognition.</p><ul><li><p>Using two of the same factors does not satisfy Two-Factor Authentication, i.e. using two different passwords is not Two-Factor Authentication.</p></li></ul></blockquote><p>CNET provides a <a href="https://www.cnet.com/news/privacy/do-you-use-sms-for-two-factor-authentication-heres-why-you-shouldnt/">simple explanation of Two-Factor Authentication</a>:</p><blockquote><p>"Instead of entering only your password to access an account, you need to enter your password -- the first verification factor -- and then a code sent via SMS or a prompt through an authentication app -- the second factor. This means a hacker would need to steal both your password and your phone to break into your account."</p></blockquote><p>Authentication is controlled by the site to which you login. They elect which type of Two-Factor authentication to implement: none, SMS, or both SMS and App as options. If none, you should ask yourself if the risk is acceptable that the company may not take seriously the protection of your account and data. You might consider an alternative company that has more secure login options but that may not always be an option.</p><h3>Issues with SMS</h3><p>SMS is a text message to your phone with a six to eight digit code for you to enter into their web page before login is granted. SMS is not very secure. Again <a href="https://www.cnet.com/news/privacy/do-you-use-sms-for-two-factor-authentication-heres-why-you-shouldnt/">CNET describes as follows</a>:</p><blockquote><p>"&#8230; receiving 2FA codes via SMS is less secure than using an authentication app. Hackers have been able to trick carriers into porting a phone number to a new device in a move called a SIM swap. It could be as easy as knowing your phone number and the last four digits of your Social Security number, data that tends to get leaked (<em>in data breaches, ed.</em>) from time to time from banks and corporations. Once a hacker has redirected your phone number, they no longer need your physical phone in order to gain access to your 2FA codes."</p></blockquote><h3>Safer Two-Factor Authentication</h3><p>The more secure way is to use an Authenticator app, such as <a href="https://support.google.com/accounts/answer/1066447?hl=en&amp;co=GENIE.Platform%3DAndroid">Google Authenticator</a>, <a href="https://support.microsoft.com/en-us/account-billing/download-microsoft-authenticator-351498fc-850a-45da-b7b6-27e523b8702a">Microsoft Authenticator</a>, or <a href="https://www.authy.com/">Authy</a>. I personally use <a href="https://www.authy.com/">Authy</a> because Google &amp; Microsoft have too much of my personal data already. Grrr! You download the app to your phone, scan a QR code presented by the web site with your phone camera, the app registers the site, then generates codes every thirty seconds that can be verified by the web site. If codes match, login is allowed to the site. Very simple and safe.</p><p>Also note that when you are changing very sensitive settings in MacOS, Apple will generate a six digit authentication code, send it to your iPhone screen display, and have you enter that same code on your Mac prior to allowing setting change.</p><h2><a href="https://consumer.ftc.gov/articles/how-secure-your-home-wi-fi-network">Secure Your Home Wi-Fi</a>: </h2><p>Using a strong Wi-Fi password prevents unauthorized users from accessing your home network.</p><p>Public WiFi spots are favorite locations for laptops to be snooped upon or broken into because many people ignore security advice and use their machines in an unprotected state. Be sure to enable MacOS firewall "<a href="https://support.apple.com/guide/mac-help/use-stealth-mode-to-keep-your-mac-more-secure-mh17133/mac">Stealth Mode</a>" so your laptop appears invisible on a public WiFi network.</p><p>Another setting to enable is <a href="https://support.apple.com/en-us/102602">iCloud Private Relay</a>. iCloud Private Relay is designed to protect your privacy by ensuring that when you browse the web in Safari, no single party &#8212; not even Apple &#8212; can see both who you are and what sites you're visiting. You can find out how to set that up <a href="https://support.apple.com/guide/icloud/set-up-icloud-private-relay-mm7dc25cb68f/icloud">here</a>.</p><h2>Use a <a href="https://www.security.org/resources/vpn-consumer-report-annual/">VPN (Virtual Private Network)</a> </h2><p>A VPN adds an extra layer of security by encrypting your internet connection, especially on public WiFi networks. VPN's on the internet offer several benefits:</p><blockquote><ul><li><p><a href="https://www.pcmag.com/how-to/what-is-a-vpn-and-why-you-need-one">Enhanced Privacy</a>: A VPN encrypts your internet traffic, making it difficult for anyone to monitor your online activities. This is especially useful for preventing your ISP (Internet Service Provider) from tracking your browsing habits.</p></li><li><p><a href="https://www.pcmag.com/how-to/do-i-need-a-vpn-at-home">Security on Public Wi-Fi</a>: Public Wi-Fi networks, like those in coffee shops or airports, are often less secure. A VPN protects your data from potential hackers on these networks by creating a secure, encrypted connection.</p></li><li><p><a href="https://www.pcmag.com/how-to/what-is-a-vpn-and-why-you-need-one">Access to Restricted Content</a>: Some websites and services are geo-restricted, meaning they are only available in certain countries. A VPN can help you bypass these restrictions by masking your IP address and making it appear as though you are browsing from a different location.</p></li><li><p><a href="https://www.consumerreports.org/electronics-computers/vpn-services/should-you-use-a-vpn-a5562069524/">Avoiding Censorship</a>: In some regions, to certain websites and services is restricted by the government. A VPN can help you access these blocked sites by routing your traffic through servers in other countries.</p></li><li><p><a href="https://www.pcmag.com/how-to/what-is-a-vpn-and-why-you-need-one">Improved Anonymity</a>: While a VPN doesn't make you completely anonymous, it does add a layer of anonymity by masking your IP address and encrypting your data, making it harder for websites and advertisers to track you.</p></li></ul></blockquote><p>By following these best practices, you can significantly reduce the risk of cyber threats and keep your MacOS device secure.</p><p>Disclosure: I may earn a fee if you purchase some of the items from my <a href="https://buymeacoffee.com/pcaloca/extras">affiliate links</a>. You can support my work by doing so and I'll be able to buy some afternoon tea &#9749; and a cupcake. &#129473;</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://buymeacoffee.com/pcaloca" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OUSB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f6107b-612e-47fc-bc87-3df65282dceb_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OUSB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f6107b-612e-47fc-bc87-3df65282dceb_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OUSB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f6107b-612e-47fc-bc87-3df65282dceb_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OUSB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f6107b-612e-47fc-bc87-3df65282dceb_1600x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OUSB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f6107b-612e-47fc-bc87-3df65282dceb_1600x400.jpeg" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f8f6107b-612e-47fc-bc87-3df65282dceb_1600x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:297469,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://buymeacoffee.com/pcaloca&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://essentialriskmgt.com/i/157587495?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f6107b-612e-47fc-bc87-3df65282dceb_1600x400.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OUSB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f6107b-612e-47fc-bc87-3df65282dceb_1600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OUSB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f6107b-612e-47fc-bc87-3df65282dceb_1600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OUSB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f6107b-612e-47fc-bc87-3df65282dceb_1600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OUSB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f6107b-612e-47fc-bc87-3df65282dceb_1600x400.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item></channel></rss>