I’m sure you’ve read a news headline or watched
a report on TV, where someone’s lives where completely ruined because their information
was stolen by hacker. As we continue using technology to store and share our
personal data, we must be vigilant and protect our information. Having a basic
knowledge of privacy and how it’s related to many different aspects of technology
can help you prevent the loss or theft of your information. Understanding how to
create accounts and manage your passwords properly are two great starts to
managing your privacy.
Let’s start at the beginning, what is Privacy? The National Institute of Standards and Technology defines Privacy as “assurance that the confidentiality of, and access to, certain information about an entity is protected” (https://csrc.nist.gov/glossary/term/privacy). When thinking about computer privacy, you are really thinking about protecting your information.
When creating a new online account, you can
protect your data by checking to see the privacy settings. For example, you
could change your GPS location sharing from “Always” to “Never”. You should
always be thinking about the kind of information you are sharing in your accounts.
And if it’s avoidable, don’t share your personal information at all. For
example, avoid posting sensitive personal details on social media to be shared
with anyone.
As a consumer, there also are options to
purchase additional hardware or software to help maintain your information and
data privacy. For example, virus-scanning computer programs can monitor your
computer for suspicious activities or files. You can also purchase hardware to
help assist with protecting your information. A firewall can be a software or
hardware component, and it’s used to help block unauthorized communications
with your network. Firewall hardware is often used in businesses, and some
personal devices may have a software firewall already built into the operating
system.
Another way you can help protect your
information is by using encryption. The encryption of your information means
that it is completely scrambled and unreadable while en route; that way, if
there’s any interception, it’s protected. If the recipient of the encrypted
data has authorization, they are given the decryption key, and the information
becomes readable again.
One popular cyberthreat used is called
Phishing. Phishing is when fraudulent messages are sent to users, with the
intent of having the user willingly give over financial or sensitive account
information. The messages are very cleverly designed, so the users might not
realize it’s not a legitimate company. The links within those messages could be
a virus application that downloads when clicked or sends the users to another
page where they are prompted to enter their personal details.
Creating an account with unique, strong
passwords is another great way to protect your privacy. Reusing the same
passwords creates a scenario where multiple accounts can all become compromised
at once. It’s also recommended that you avoid using passwords that can easily be
guessed, such as “Password1”, or words that might be common to you, such as
your wedding anniversary or pet’s name.
Just as important as creating your accounts
and passwords is, managing that information is equally important. Thankfully,
you do not need to use and create an entirely new database to manage your
personal accounts and passwords. There are many different products, so choosing
the right one can feel overwhelming. One tip to consider when picking your
password manager is whether it needs to be compatible with multiple devices. Another
thing to consider is the cost, some password managers are free, and some are
costly. Always do your research and ask for recommendations from friends and
professionals before you make a decision.
As you can see, computer privacy is incredibly
important. Each additional precaution taken can help prevent a potential catastrophe
from happening. In an online Forbes article, one recommendation made was to “assume
there is no privacy” (Forbes, 2019). It might sound simple, but I think it’s one of the most important. By
taking that precaution, you are being proactive rather than reactive to your privacy
protection. Or as the expression goes, better to be safe than sorry!
References
Bian Yang, Huiguang
Chu, Guoqiang Li, Petrovic, S., & Busch, C. (2014). Cloud Password Manager
Using Privacy-Preserved Biometrics. 2014 IEEE International Conference
on Cloud Engineering, Cloud Engineering (IC2E), 2014 IEEE International
Conference on, Ic2e, 505–509. https://doi.org/10.1109/IC2E.2014.91
Forbes. (June 7th,
2019). A Beginner’s Guide To Online Privacy 12 Important Tips. https://www.forbes.com/sites/forbestechcouncil/2019/06/07/a-beginners-guide-to-online-privacy-12-important-tips/?sh=386c883353ed
National Institute
of Standards and Technology. Computer Security Resource Center. Retrieved
on January 29th, 2024. https://csrc.nist.gov/glossary/term/privacy
Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.
Comments
Post a Comment