Protecting Sensitive Information

Protecting Sensitive Information

Protecting Sensitive InformationProtecting Sensitive Information and seeing that hackers do not breach private data is a never ending battle. The two areas that are most at the forefront of these attacks are the primary mobile phone of a user and their email account.

Primary e-mail account and mobile phone number key to privacy. With them almost the entire breath of an individual’s web presence can be found.  With the proper user ID and password everything a user accesses or uses is fully exposed.

As our reliance upon on-line services grows, these two data points are extremely common means of authentication. and the focus of cyber attackers.

A user can do the following to minimize the exposure and ensure the enterprise is protecting sensitive information:

  • Use a business style email account to minimize breach risks. – Google and Microsoft are the world’s two largest email providers, with have both consumer and business-grade subscriptions.
  • Minimize exposure to risks by miniizing the use of mobile devices for sensitive transactions – Minimize purchases and registrations that depend on mobile devices. Do them on a desktop if at all possible.
  • Do not save password in your browser – A third-party password manager is one of the most valuable security precautions you can take. Having a unique, impossible-to-guess password for every service you use is an excellent way to prevent most common forms of attack.
  • Do not use the mobile phone for the authentication process – This strategy forces you to use a trusted device as an authenticator. A hacker who has a SIM-swapped phone number or an email password doesn’t have a trusted device and is thus locked out.
  • Backup and wync frequently –  Save the really important stuff, like family photos, in at least two cloud locations: iCloud and OneDrive, for example. And yes, keep a local backup of those files, just in case.

Read On Order Sensitive Information Policy Download Selected Pages Privacy Compliance Policy

See also: