IBM Plays Cupid For Its Chinese Employees This Valentine's Day
valentines"IBM tested IAC's dating apps - including Match, OkCupid, and Tinder - and they were not among the apps found to exhibit the cited. (Reuters) - The millions of people using dating apps on company smartphones could be exposing themselves and their employers to hacking. With a market of more than million singles in the United States, the online dating industry has grown substantially over the past few years.
While some people have met their soul mates on dating applications, most people struggle with constant mismatching, bad choices and incompatibilities. The platform enables users to make better choices and build stronger relationships with potential mates that are formed by data-driven emotional intelligence instead of just intuition.
IBM Plays Cupid For Its Chinese Employees This Valentine’s Day
This technology allows the users to receive a tone check on their outbound messages to make sure they area relaying their intended emotional and social cues.
What was the motivation behind the development of your product?IBM 1401 COMPUTER & DATA PROCESSING FOR THE ROPER CORPORATION 72392
How did you envision impacting your audience? We envisioned impacting our audience by presenting a whole new way to create a relationship through presenting a true self, one that is determined through means that cannot be gamed and providing the ability for all users to be automatically verified.
Today, with IBM Watson, and our own technology, we are able to artfully blend Artificial Intelligence with big data to provide solutions to fundamental relationship problems that have plagued people for centuries. An emotional connection is the goal, one based on Emotional Quotient, where self-knowledge is the first step.
We are helping people understand who they are, how the choices affect outcomes, while also providing behavioral feedback so mistakes are not repeated. Before you used Watson APIs, how did you solve the market challenge?
Unfortunately, these tests can be gamed and are sometimes seen as draconian rather than developmental. Figure out if you want to use an app by checking the permissions it asks for by viewing the settings on your mobile device. When updating, apps often automatically reset the permissions determining what phone features they have access to, like your address book or GPS data. Use unique passwords for every online account you have.
If you use the same password for all your accounts it can leave you open to multiple attacks if one account is compromised.
Dating apps pose U.S. corporate security risk, says IBM
Always apply the latest patches and updates to your apps and your device when they become available. This will fix any identified bugs in your device and applications, resulting in a more secure experience.
Use only trusted Wi-Fi connections when on your dating app. Hackers love using fake Wi-Fi access points that connect you directly to their device to execute these types of attacks. Many of the vulnerabilities found in this research can be exploited via Wi-Fi. What Can Enterprises Do?
Businesses also need to be prepared to protect themselves from vulnerable dating apps active inside their infrastructure, especially for Bring Your Own Device BYOD scenarios. IBM found that nearly 50 percent of organizations sampled for this research have at least one of these popular dating apps installed on corporate-owned or personal mobile devices used for work.
To protect confidential corporate assets, businesses should: Leverage Enterprise Mobility Management EMM offerings with mobile threat management MTM capabilities to enable employees to utilize their own devices while still maintaining the security of the organization. Allow employees to only download applications from authorized app stores such as Google Play, iTunes, and the corporate app store.
Educate employees to know the dangers of downloading third party applications and what it means when they grant that app specific device permissions.
IBM Urges US Corporate Employees To Shun Dating Apps: They Pose Security Risk | Tech Times
Set automated policies on smartphones and tablets, which take immediate action if a device is found compromised or malicious apps are discovered. This enables protection to corporate resources while the issue is remediated. These apps were also analyzed to determine the granted permissions, unveiling a large number of excessive privileges.
In advance of releasing this research to the public, IBM Security has disclosed all impacted app vendors identified with this research.