The topic of privacy and data confidentiality is an indispensable part of discussions between governments and citizens. Not only do governments fail to keep their promises to adhere to the security rules for processing our data, but we users are also not aware enough to effectively protect our digital identities.
The well-known and slightly trite cliché "If you have nothing to hide, you don't have to be afraid" is our reality. Case in point: in major cities, cameras monitor the streets and people 24/7. Not only what we do but how we look, how we behave, what our emotions are, who we have met. Whether we want to or not, we are the target of profiling and analysis by sophisticated systems, the data from which will be used by many companies. Either we get a good deal, or we get caught in a scam. Every stick has two ends.
Your privacy is built by your environment - not by you.
Does this mean that you have no control over securing your identity, even by being aware and using sophisticated security measures? Yes, you don't.
Despite full awareness, you can, for example, use quick voice search using tools like Google Cortana or Alexa, while driving. Convenient? Certainly. But did you know that your voice is being recorded? Despite your awareness, you leave another digital footprint to identify you.
Humans are the weakest link in the security chain. A cliché repeated to the point of boredom by cyber security gurus or large corporations. Still relevant. Hackers ruthlessly exploit our weaknesses, using the data we openly leave online for their own, often criminal purposes.
ISCG advises
You don't hide in a tight bunker and hide your identity. You need to communicate, and communication requires...identification (visual, voice, digital). Apply a few simple rules to increase your security comfort and minimize the risk of losing valuable information.
ISCG recommends - 8 simple safety rules:
1. Less information in social media channels - The more you provide, the better you are recognized, and your data can be easily processed for criminals' purposes.
2. Enable secure profiles and settings in your applications -Multi-component authentication (e.g., login to Facebook with traditional password + additional SMS). Set security alerts and notifications.
3. Use sI|_nYc|-| passwords and change them often - Don't use one password for multiple platforms. The more complicated and longer the password, the lower the risk of hacking and data theft. Change passwords regularly.
4. Don't log in with profiles from social media accounts - Where possible, create separate accounts. The fewer links to a given profile, the better.
5. Don't use public Wi-Fi - You leave too much data. It's better to use your mobile carrier's network resources (3G/4G/LTE). Block options for automatic Wi-Fi logins and requests to join the network. Very often hackers use popular names like "Airport" or "Cafe" to take control of your device. If possible, use secure connection tunneling via VPN.
6. Reduce unnecessary social media activity - you don't have to keep track of all posts and even less give automatic access to your account to various applications.
7. Check your email carefully - pay attention to attachments, images or suspicious links. If you are not sure of the sender - all the more reason not to open the message.
8. Before you click - think - As a society of "clickers," we like quick links and links to content of interest. Check the sender, content and message, as they can often contain malicious code that will encrypt your data. And then you have to cry. And pay.
Source: https://thycotic.com/company/blog/2018/01/26/data-privacy-day-has-privacy-gone-forever/
Do you need support? Get a free consultation with an ISCG expert and find out how to improve your security experience