The “gig economy”, where workers take on ad hoc jobs or are engaged as independent contractors has clear benefits for firms. Employers save on training, capital expenses (they don’t pay for offices or tools) and have a ready pool of potential candidates.
But on the flipside, workers are taking on more risk. Whether it’s insecure connections, risky payments, or just bad internet hygiene, you and your devices may be exposed.
But there are some things you can do to protect yourself.
Gig work on the internet
There are plenty of of jobs to do on the internet, and they are varied. Freelancer.com claims to connect more than 22 million employers and freelancers from over 247 countries, doing jobs from programming to designing. Then there are also marketplaces like Envato, and “micro jobs” markets like Amazon Mechanical Turk.
These platforms pose particular challenges, as employers can no longer rely on control over devices, so they must trust the skills of gig workers. This trust comes from reputation or reviews, meaning one screw up can be costly.
This is why establishing good security habits are perhaps even more important than ever.
Some tips to look after your devices
-
Look after your hardware. When out and about don’t let your phone or computer out of your sight. Don’t plug in strange USB drives or devices that you’ve just found somewhere or can’t trust. Some of these could be contaminated with a virus, and devices can be hacked in a surprisingly short amount of time when hackers have physical access.
-
Use strong passwords. Whether on the platform you use, or your payment provider, easy passwords are the hacker’s friend. They have all the well-known ones already. If the site or service has a minimum of eight characters, don’t stop there. Maybe even try a pass phrase (a series of words rather than a one word password), but don’t use a common phrase that everyone else will know too. If your account is the point of entry for a hacker, it’s hard to argue that you should be trusted again (plus, it’s embarrassing and the gig economy runs on reputation, remember).
-
Use a secure connection, including HTTPS and a Virtual Private Network (VPN). This applies to both computers and mobile phones. It doesn’t matter if your employer isn’t insisting on it already, you have an obligation to keep their intellectual property and other data safe. Plus, this may help you get around geo-blocks when working with overseas employers. It’s not fun if your connection is subverted without your knowledge. While at first the leak appears a mystery, there is always a trail.
-
Use encryption when handling files and communicating. Email can be hacked, files can be stolen. Witness what happened to the Democratic Party in the last US election. And events like the Yahoo breach also show you don’t need to be specifically targeted. There are now plenty of organisations that provide encrypted communications services, and they are always getting easier to use.
-
Use a digital signature. While you are attending to point #3, get a public/private key pair. You send the public key to anyone you want, but keep the private one secure (you keep this key very, very safe). The security of the signature comes from the way that the two keys are related mathematically. Only your private key can unlock a message encrypted with your public key and vice versa. Therefore, this is a way of firmly establishing identity when communicating. A message signed with my key can only have come from me.
-
When you finish the job, don’t ever go back to “see how things went”. Just because you still have access (as no-one got around to removing it after you left), this doesn’t imply you have authorisation. A notable side benefit is not running afoul of various laws relating to improper access to computer systems.
Mike Johnstone does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond the academic appointment above.
This article was originally published on The Conversation. Read the original article.


Elon Musk’s Empire: SpaceX, Tesla, and xAI Merger Talks Spark Investor Debate
Anthropic Eyes $350 Billion Valuation as AI Funding and Share Sale Accelerate
SpaceX Updates Starlink Privacy Policy to Allow AI Training as xAI Merger Talks and IPO Loom
SpaceX Reports $8 Billion Profit as IPO Plans and Starlink Growth Fuel Valuation Buzz
TSMC Eyes 3nm Chip Production in Japan with $17 Billion Kumamoto Investment
AMD Shares Slide Despite Earnings Beat as Cautious Revenue Outlook Weighs on Stock
Sony Q3 Profit Jumps on Gaming and Image Sensors, Full-Year Outlook Raised
Global PC Makers Eye Chinese Memory Chip Suppliers Amid Ongoing Supply Crunch
Jensen Huang Urges Taiwan Suppliers to Boost AI Chip Production Amid Surging Demand
SpaceX Prioritizes Moon Mission Before Mars as Starship Development Accelerates
Elon Musk’s SpaceX Acquires xAI in Historic Deal Uniting Space and Artificial Intelligence
OpenAI Expands Enterprise AI Strategy With Major Hiring Push Ahead of New Business Offering
Nvidia Nears $20 Billion OpenAI Investment as AI Funding Race Intensifies
Google Cloud and Liberty Global Forge Strategic AI Partnership to Transform European Telecom Services
Nvidia, ByteDance, and the U.S.-China AI Chip Standoff Over H200 Exports 



