C Magazine Winter 2020 : Page 25

Menu
  • Page View
  • Contents View
  • Archive
  • Advertisers
  • News Feed
  • CHSInc.com
  • YouTube
  • Flickr
  • Twitter
  • LinkedIn

Make Data Privacy a Priority • Check your privacy settings. • Share your data with care. • Question who has your data and how they handle it. • Tell companies your data privacy is important. What Is Personally Identifiable Information? Tax ID number Credit card number • Talk to your family about data privacy. • Protect sensitive data sent electronically with encryption and other tools. • Don’t share personal information over social media. Home address Name and date of birth Social Security number Data elements linked or linkable to a specific person Email address • Don’t connect to unknown wireless networks or devices. appears to belong to a company you do business with, contact it by phone or email to find out if it is having website issues. Protect Passwords Have a password strategy. Using “Password1234” is inviting hackers to tap into your accounts and steal data. Tracking passwords on paper might seem old school, but is still a good option, says De Boer, and one still used by many government agencies. Changing from a short password to a longer pass phrase of 15 characters or more with special characters and numbers is also a good idea. “There are also many password management programs that work very well,” De Boer says. Be sure to change any default passwords that come with devices and software. “Those default passwords are on the Internet and are known to everyone,” De Boer says. Enable multi-factor authentication (MFA), which is becoming much more common and is another way to make it harder for someone to hack into your accounts. It usually requires a two-step process to log into programs by requiring the user to enter a verification code provided through email or text message. MFA is usually an opt-in process. Be Suspicious Don’t click on suspicious links. On a computer, hover the mouse over a link and the web address will pop up; on a smartphone, hold on the link to see the address. If the address doesn't match the website the link indicates, it might be a fake link created by a data thief. Never enter your login credentials through a link in an email. Instead, go directly to the website through a known bookmark to verify the communication or notification is legitimate. If you get a suspicious email from someone you know, focus on sender details, context and content. Would this person normally send you a request for this type of information? If you’re not sure, call that person to make sure he or she is truly requesting the information. “That one simple action is an easy way to thwart bank or billing fraud,” De Boer says. While smartphones can fit in our pockets, they carry as much computing power and data as some laptop computers. With that much data on the move, data protection is critical. Educating yourself on the risks and taking a few simple steps will go far in protecting your valuable data. n Phishing A practice where scammers use deceptive emails to trick people into helping the scammer collect sensitive data, gain access to accounts or steal money. Spear phishing The practice of sending emails that appear to come from a known or trusted source with the intent to get people to reveal confidential information. Malware Software designed to disrupt, damage or gain unauthorized access to computer or mobile device systems. Ransomware Malware that holds data hostage by blocking access to a computer system until a sum of money is paid. Your CHS Connection 25

Issue Articles

Issue List

Spring 2021

Winter 2021

Fall 2020

Summer 2020

Spring 2020

Winter 2020

Fall 2019

Summer 2019

Spring 2019

Special Issue

Winter 2019

Fall 2018

Summer 2018

Spring 2018

Winter 2018

September/October 2017

July/August 2017

May/June 2017

March/April 2017

January/February 2017

November/December 2016

September/October 2016

July/August 2016

May/June 2016

March/April 2016

January/February 2016

November/December 2015

September/October 2015

July/August 2015

May/June 2015

March/April 2015

January/February 2015

November/December 2014

September/October 2014

July/August 2014

May/June 2014

March/April 2014

January/February 2014

November/December 2013

September/October 2013

July/August 2013

May / June 2013

March/April 2013

January/February 2013

November/December 2012

September/October 2012

July/August 2012

May/June 2012

March/April 2012

January/February 2012

November/December 2011

September/October 2011

July/August 2011

May/June 2011

March/April 2011

January/February 2011

November/December 2010

September/October 2010

July/August 2010

May/June 2010

March/April 2010

January/February 2010

November/December 2009

September/October 2009

July/August 2009

May/June 2009

March/April 2009

January/February 2009

November/December 2008

September/October 2008

July/August 2008

May/June 2008

March/April 2008

January/February 2008

December 2007

Previous  Next


Library