Skip to main content

Tech Topic Connection: Privacy... The Basics

I’m sure you’ve read a news headline or watched a report on TV, where someone’s lives where completely ruined because their information was stolen by hacker. As we continue using technology to store and share our personal data, we must be vigilant and protect our information. Having a basic knowledge of privacy and how it’s related to many different aspects of technology can help you prevent the loss or theft of your information. Understanding how to create accounts and manage your passwords properly are two great starts to managing your privacy.

Let’s start at the beginning, what is Privacy? The National Institute of Standards and Technology defines Privacy as “assurance that the confidentiality of, and access to, certain information about an entity is protected” (https://csrc.nist.gov/glossary/term/privacy). When thinking about computer privacy, you are really thinking about protecting your information.

When creating a new online account, you can protect your data by checking to see the privacy settings. For example, you could change your GPS location sharing from “Always” to “Never”. You should always be thinking about the kind of information you are sharing in your accounts. And if it’s avoidable, don’t share your personal information at all. For example, avoid posting sensitive personal details on social media to be shared with anyone.  

As a consumer, there also are options to purchase additional hardware or software to help maintain your information and data privacy. For example, virus-scanning computer programs can monitor your computer for suspicious activities or files. You can also purchase hardware to help assist with protecting your information. A firewall can be a software or hardware component, and it’s used to help block unauthorized communications with your network. Firewall hardware is often used in businesses, and some personal devices may have a software firewall already built into the operating system.

Another way you can help protect your information is by using encryption. The encryption of your information means that it is completely scrambled and unreadable while en route; that way, if there’s any interception, it’s protected. If the recipient of the encrypted data has authorization, they are given the decryption key, and the information becomes readable again.

One popular cyberthreat used is called Phishing. Phishing is when fraudulent messages are sent to users, with the intent of having the user willingly give over financial or sensitive account information. The messages are very cleverly designed, so the users might not realize it’s not a legitimate company. The links within those messages could be a virus application that downloads when clicked or sends the users to another page where they are prompted to enter their personal details.

Creating an account with unique, strong passwords is another great way to protect your privacy. Reusing the same passwords creates a scenario where multiple accounts can all become compromised at once. It’s also recommended that you avoid using passwords that can easily be guessed, such as “Password1”, or words that might be common to you, such as your wedding anniversary or pet’s name.

Just as important as creating your accounts and passwords is, managing that information is equally important. Thankfully, you do not need to use and create an entirely new database to manage your personal accounts and passwords. There are many different products, so choosing the right one can feel overwhelming. One tip to consider when picking your password manager is whether it needs to be compatible with multiple devices. Another thing to consider is the cost, some password managers are free, and some are costly. Always do your research and ask for recommendations from friends and professionals before you make a decision.

As you can see, computer privacy is incredibly important. Each additional precaution taken can help prevent a potential catastrophe from happening. In an online Forbes article, one recommendation made was to “assume there is no privacy” (Forbes, 2019). It might sound simple, but I think it’s one of the most important. By taking that precaution, you are being proactive rather than reactive to your privacy protection. Or as the expression goes, better to be safe than sorry!

 

References

Bian Yang, Huiguang Chu, Guoqiang Li, Petrovic, S., & Busch, C. (2014). Cloud Password Manager Using Privacy-Preserved Biometrics. 2014 IEEE International Conference on Cloud Engineering, Cloud Engineering (IC2E), 2014 IEEE International Conference on, Ic2e, 505–509. https://doi.org/10.1109/IC2E.2014.91

Forbes. (June 7th, 2019). A Beginner’s Guide To Online Privacy 12 Important Tips. https://www.forbes.com/sites/forbestechcouncil/2019/06/07/a-beginners-guide-to-online-privacy-12-important-tips/?sh=386c883353ed

National Institute of Standards and Technology. Computer Security Resource Center. Retrieved on January 29th, 2024.  https://csrc.nist.gov/glossary/term/privacy

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.

Comments