January 28, 2014
Increasingly, people publish their personal data on social networks and make this information available on different Internet sites. For this reason, and within the framework of the International Day for the Protection of Personal Data that is celebrated on January 28 of each year, the ESET Latin America Research Laboratory developed practical advice so that users can protect this information.
According to its definition, personal data has to do with all the information related to a person and that identifies them as a specific individual. Today, it is very common to share this type of information on the web, thanks to the use and popularity of social networks.
Below we detail the main recommendations made by the ESET Latin America Research Laboratory to prevent people’s personal data from being accessed by third parties:
When visiting websites where personal data is requested, it is advisable to do so at those who are trusted and have the SSL protocol. That is, the address in the browser begins with HTTPS. This allows data to travel over an encrypted channel.
In social networks, it is recommended not to accept strangers. We must remember that behind a false profile, there may be a person trying to take control of our equipment or steal information.
In social networks, more people can access the profiles than you think. A good practice is to take a few minutes to configure account privacy and thus prevent it from being visible to anyone.
Avoid entering home banking and email services from open Wi-Fi networks, as you can suffer a phishing attack.
Encrypt the disk or cellular device, since the transfer in the public highway of laptops carries the risk of loss or theft of the same. With encrypted information, it is more difficult for a third party to access the information and files on the hard drive.
When making public comments on social media, always think before writing. If it is something that we would not say in front of several people, we should not write it on the Internet.
Remember always log out of the internet, be it email, social networks, messaging, etc.
After using a browser, delete the recent files (cache) of the images and contents that were visited.
Browse and download content only from trusted sites.
Review license agreements carefully when installing any application. By accepting these contracts without reading them we may be accessing a policy, where the company collects information that can be sold or exposed.
Have a security solution updated.
“A very common mistake made by many users is to believe that there is nothing important on their computer, the reality is that it is not, although one considers their information of little relevance to others, by gathering information an attacker can adopt the psychological profile of the victim, impersonate it and thus commit their criminal act ”, said Raphael Labaca Castro, Coordinator of Awareness & Research at ESET Latin America.
[+] Videos de nuestro canal de YouTube