Just released: How to raise venture capital in 2023

Download

Growing Concerns About Cybersecurity in Dating Apps

TL:DR

Key Takeaways

Matt McKenna Scale Underwriting
Matt McKenna

Underwriting Manager

The digital age has made it easier than ever to connect with potential partners through dating apps. However, the convenience and popularity of these apps have also made them a target for cybercriminals. Recent reports have revealed vulnerabilities in some popular dating apps, raising concerns about user privacy and security.

What Lessons Can Other Businesses Take Away?

Anyone who uses an app assumes that there’s a certain amount of privacy involved. This isn’t unique to dating apps. Consumers accept that the app marketplace and/or developer will collect usage and error data and certain forms of personally identifiable information.

What they don’t expect is that unauthorized third parties will be able to view and even control user experience on the app.

That’s the exact situation that dating app Tinder is dealing with right now. One flaw in the mobile app’s security gave some creative hackers a point of entry. Then they were able to view the pictures a user was looking and even track the user’s swipes.

In theory, a bad actor could sell this info, use it for blackmail or who knows what else.

But they’re not alone, as the Hustle noted. Several other dating apps have been called out for vulnerabilities and liabilities in their geo-location system. Hackers were actually able to physically locate users despite deliberate efforts from the companies to hide GPS data.

Cybersecurity in dating apps is the topic of the day but every company with an online presence bears similar risks. What can they learn from Tinder’s experience?

GUIDE

Cyber Risk Management Guide

Spotting Vulnerabilities Is a Constant Battle

It’s a marathon, not a sprint, and companies use various methods to address this. Third party security firms and bug bounties have emerged as valuable solutions.

Tinder is well aware of the ongoing threat:

In a statement to WIRED, a Tinder spokesperson wrote that “like every other technology company, we are constantly improving our defenses in the battle against malicious hackers,” and pointed out that Tinder profile photos are public to begin with. (Though user interactions with those photos, like swipes and matches, are not.) The spokesperson added that the web-based version of Tinder is in fact HTTPS-encrypted, with plans to offer those protections more broadly. “We are working towards encrypting images on our app experience as well,” the spokesperson said.

This shows us two things: 1) fixes take time and 2) no plan is foolproof.

Vulnerabilities Will Be Found and Exploited, and They Can Be Expensive to Fix

Whether it’s by you, bad actors or white hat hackers who want to raise awareness/promote their services, vulnerabilities will be found. The goal is for you to find them first so you can avoid bad press, or much worse.

In the case of Tinder, the problem is a clear vulnerability in their protocol: they use HTTP instead of HTTPS encryption. Pretty simple. But not all vulnerabilities will be so clear. The costs of finding and fixing these vary on a case-by-case basis. (One cyber security expert estimated an average cost of $28,000 to repair all of the bugs on a website.)

Insurance Can Protect You From Data Breaches When All Else Fails

Year after year, high-profile data breaches are showing us that companies who are proactive about cyber security are investing in their future. The cost of failure is simply too high.

By the time insurance enters the picture, the vulnerabilities have been found and exploited by bad actors. Now is the time for damage control.

Cyber insurance offers two main protections after a data beach happens:

  1. Paying the costs of defending you from certain suits and investigations.
  2. Reimbursing the company for certain direct expenses that arise.

Policies often include limits for defense costs, regulatory investigations, PCI compliance fines and expenses, breach notification costs, PR and crisis management consultation and the costs of maintaining a call center and credit monitoring for affected users. And these are just the basics in terms of protections available from carriers today. More nuanced and advanced coverages can be tailored to special risks.

Related Articles

data breach 2024
October 1 • Cyber Liability

Top 10 Cyber Security Data Breaches of 2024

Cybersecurity under attack in 2024! Discover the top 10 data breaches that rocked the world. Learn how major companies fell victim to cybercriminals. Understand the risks and take action to protect your business from cyber threats.

supply chain disruptions
August 27 • Cyber Liability

Cyber Attacks & Supply Chain Disruptions: Startup’s Worst Enemy?

Explore the evolving threat landscape for supply chain disruptions, mitigation strategies, and the importance of risk management in today’s volatile business environment.

cyber insurance pricing trends 2024
March 13 • Cyber Liability

Cyber Insurance Pricing Trends 2024

Uncertain about cyber insurance costs in 2024? Our article explores pricing trends, expert predictions on rate increases, and strategies to potentially reduce your cyber insurance premium.

cyber liability insurance premiums
March 4 • Cyber Liability

7 “Must Haves” For Cyber Liability Insurance in 2024

With cyber liability insurance premiums rising, business leaders must have the inside scoop to keep costs low. Our partners at Blacksmith InfoSec delve into those tips and tricks.

Cybersecurity Data Breaches
November 9 • Cyber Liability

Top 10 Cybersecurity Data Breaches of 2023

Today’s digital landscape is frightening for business leaders. Here’s a glimpse into some of the most cringe-worthy data breaches in 2023 — plus, how to avoid them.

Cyber Insurance Pricing Trends
July 19 • Cyber Liability

Cyber Insurance Pricing Trends 2023

After a hard-hit 2022, let’s explore the lessons learned, what currently impacts the cyber market, and cyber insurance pricing trends to expect in the future.