The first thing is us, as a user, being aware of the vulnerabilities and the fact that our data is out there. Most of the time for renting a car we're concerned with insurance on a vehicle, what's our liability there? But now, we looking at that rental agreement and saying ‘What happens with this data?’ If I sync my phone, who owns it? Who has access to the GPS on the car while we're driving?
Program Director, Cybersecurity, Information Systems Security and Information Technology, American Military University