Geotagging

8th March 2021 | Cybrary Geotagging


geotagging cybrary

Geotagging adds geographical information to media through the use of metadata. Geotagging data often includes latitude and longitude coordinates, but may also include altitude, distance, and physical location names. Geotagging is most commonly used for photographs and can help people get specific information about where the picture was taken or the exact location of a user who logged on to an online service. Some digital rights management software relies on Geotagging information to permit or deny access to content.

Most cellphones are equipped with Global Positioning Systems (GPS), used for finding directions, local weather reports, or local restaurants to eat at. These mobile devices tie their GPS to the phone’s camera and automatically record the location data (geotagged data) within each image’s metadata. Law enforcement officials often use geotagging metadata in their investigations. 

What does this mean for an SMB?

Cellphone users often look for local businesses and are presented results based upon each business’s location. It’s a good idea for SMBs with a brick-and-mortar footprint to publish their location on their Google Business page to help bring people to their location. Other geotagging features CyberHoot has heard about relates to automated physical security measures. Some Mobile Device Management (MDM) software can automatically disable smartphone camera’s when that device is in a restricted area while allowing the camera to be used at other times. Unfortunately, not all devices are managed like a Smartphone. The US Military has had to ban fitness trackers from its high-security facilities due to the Geotagging features of those applications apps that publish this data to Internet websites like Garmin Connect or Strava.  Such location data puts the lives of our military at risk.

To learn more about Geotagging and its risks to Military Bases, please watch these short videos:

https://youtube.com/watch?v=0IB8p-YpXwAhttps%3A

Sources: 

Techopedia

Enterprise GRC

Additional Reading:

Apple Photos Geotagging Bug

U.S. Soldiers are revealing Sensitive Data by Jogging – Washington Post

Related Terms:

Metadata

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

AI Poisoning: Fake Support Scam — AI Search as the New Attack Surface

AI Poisoning: Fake Support Scam — AI Search as the New Attack Surface

Cybercriminals always follow Internet eyeballs. Not literally, but figuratively. And today's eyeballs are...

Read more
CISA Details an Emerging Mobile Spyware Alert

CISA Details an Emerging Mobile Spyware Alert

Active Attacks on Messaging Apps The Cybersecurity and Infrastructure Security Agency (CISA) recently issued...

Read more
Zero Trust RPAM: The Future of Secure Remote Access

Zero Trust RPAM: The Future of Secure Remote Access

The world of work has changed enormously since COVID-19. Gone are the days when IT admins sat behind a corporate...

Read more