Geotagging

8th March 2021 | Cybrary Geotagging


geotagging cybrary

Geotagging adds geographical information to media through the use of metadata. Geotagging data often includes latitude and longitude coordinates, but may also include altitude, distance, and physical location names. Geotagging is most commonly used for photographs and can help people get specific information about where the picture was taken or the exact location of a user who logged on to an online service. Some digital rights management software relies on Geotagging information to permit or deny access to content.

Most cellphones are equipped with Global Positioning Systems (GPS), used for finding directions, local weather reports, or local restaurants to eat at. These mobile devices tie their GPS to the phone’s camera and automatically record the location data (geotagged data) within each image’s metadata. Law enforcement officials often use geotagging metadata in their investigations. 

What does this mean for an SMB?

Cellphone users often look for local businesses and are presented results based upon each business’s location. It’s a good idea for SMBs with a brick-and-mortar footprint to publish their location on their Google Business page to help bring people to their location. Other geotagging features CyberHoot has heard about relates to automated physical security measures. Some Mobile Device Management (MDM) software can automatically disable smartphone camera’s when that device is in a restricted area while allowing the camera to be used at other times. Unfortunately, not all devices are managed like a Smartphone. The US Military has had to ban fitness trackers from its high-security facilities due to the Geotagging features of those applications apps that publish this data to Internet websites like Garmin Connect or Strava.  Such location data puts the lives of our military at risk.

To learn more about Geotagging and its risks to Military Bases, please watch these short videos:

https://youtube.com/watch?v=0IB8p-YpXwAhttps%3A

Sources: 

Techopedia

Enterprise GRC

Additional Reading:

Apple Photos Geotagging Bug

U.S. Soldiers are revealing Sensitive Data by Jogging – Washington Post

Related Terms:

Metadata

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more
Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more