8 Personal & Professional Data Privacy Tips to Follow

  /     /     /  
Publicated : 22/11/2024   Category : security


8 Personal & Professional Data Privacy Tips to Follow


With International Data Privacy Day coming later this month, Security Now offers a checklist to help protect personal and professional data.



Although International Data Privacy Day on January 28 falls over a weekend this year, no one in their right mind should cease vigilance for 24 hours to celebrate it.
And if something does go wrong on that day, what would be the point of bolting the privacy door after an event occurs? Multiply this concept by 365 days a year, and its a reminder that bearing best practice in mind can save time, money and integrity.
In the spirit of forewarned is forearmed, we decided not to wait until later this month to ask Joe Carson, chief security scientist at
Thycotic
, to share his eight new privacy protection tips. Some are common sense, while others relate to threats which have increased over the last few months. All of them involve keeping our identities and personal data a secret. (See
Thycotics Joseph Carson: Hackers Will Soon Read Your Mind
.)
Security needs friction
Dont be tempted to make security frictionless for yourself; it may be easier, but never use a social login to access other accounts or utilities. That moment of inconvenience is there to remind you -- again -- of the value of your data. If the social login gets compromised it means that cyber criminals could cascade to all the accounts using that social login, said Carson.
Factor in privacy
Two-factor authentication for social media is an inconvenience, but its vital. Many have slipped into a lax mindset when it comes to identifying ourselves for account access. Thats because social networks are open by default, privacy is basic or turned off and security is optional. So, what about a new mindset where we make security decisions based on the value of the data were protecting?
(Source:
Pixabay
)
Always tune privacy settings with data value at the forefront of decisions. Quickly, two-factor authentication becomes common practice. If multi-factor authentication is available use it, said Carson. I prefer using an authenticator application like Google, Microsoft, Symantec or Authy instead of SMS.
Be $tr0ng3r
Always devise a strong password, unique to an account, and change it regularly. If youre tempted to assign the same password several times over, so that its more memorable, just dont. Still relying on a master sheet of paper -- or worse, a Word document -- to track hundreds of passwords?
Get a password manager to help track the age of each password, said Carson, it lets you know what additional security controls have been applied and helps generate complex passwords for all your accounts so you wont have to type or remember them.
Dont be overly social
At heart, we all dislike those incentives from social media firms aimed at extracting more personal information from us while were registering or trying to log back in. But the more you provide beyond the minimum to open an account, the more information someone will find if they hack it; its pretty simple. If you have already added this information, set it to hidden or remove it from your profile, said Carson.
Some people on public WiFi are spies
Using public WiFi is becoming very risky. Not only is there an inherent risk to your data over an unsecured connection, but the cyberthieves are now making their WiFi look like your WiFi; always check the SSID exactly matches the real credentials of the hotspot youre using. Data criminals love to have their own SSID thats very similar, or one that simply says FreeWiFi. (See
WPA3 Standard Teased at CES Following KRACK Attack
.)
The risks of public WiFi are so high that Carson recommends always using a VPN for access. If thats not an option, routing data via the cellular network is a good alternative. Something simple, like disabling auto WiFi connect settings, or enabling Ask To Join, will remove the risk of your device connecting by default to networks like café, airport or lobby -- since these are names that scammers use too. Also, dont elect to remember the network.
The fundamentals of network security are being redefined – dont get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth annual
Big Communications Event
. Theres still time to register and communications service providers get in free!
One worrying trend is for criminals to host their own websites, such as Facebook, waiting for you to enter your credentials. Use the latest browser versions as they are tooled to spot this deceit. Always assume someone is monitoring your data over public WiFi, advises Carson. Dont change any passwords over public WiFi, or enter any financial authentication details. Steer away from any links that look suspicious.
You dont have to like social media
There are risks associated with liking a social page or comment, or following the user. Different applications can access your profile, said Carson. Once access is granted most people dont practice the good cyber hygiene required to clean up when the access is no longer required.
Beware of images
In order to capture information about what device and browser you use, your software versions, patch levels and more, hackers may send you an HTML email containing a tiny image, said Carson. Simply clicking on this email will download the image into your email client automatically, by default, unless you change your settings. And in downloading that image you are sharing information that hackers can use to exploit your systems.
Is this expected, valid and trusted?
The golden rule that stops many unnecessary security issues in their tracks is to step back and briefly consider whether an interaction that shares data is expected, valid and trusted. A no answer in there is an advance alarm signal that something may be wrong.
We are a society of clickers; we like to click on things like hyperlinks, advises Carson. Nearly 30% of people will click on malicious links. We all need to be more aware and cautious. Before clicking, stop and think.
Have a safe 2018.
Related posts:
Thycotics Joseph Carson: Government & Encryption Issues Will Be Huge
Countries, Coins & Cloud Will Test Enterprise Security in 2018
Dirty Practices Make for Difficult Security
— Simon Marshall, Technology Journalist, special to Security Now

Last News

▸ Senate wants changes to cybercrime law. ◂
Discovered: 23/12/2024
Category: security

▸ Car Sector Speeds Up In Security. ◂
Discovered: 23/12/2024
Category: security

▸ Making use of a homemade Android army ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
8 Personal & Professional Data Privacy Tips to Follow