Ever wake up one morning and think to yourself:
“Jeepers self, if only I could ensure every bit of data that crosses my path… has an optimal cloak of security!”
If so you’re definitely not alone – so many people have gotten scammed because of social engineering (phishing, phone calls, etc.)
That’s why you’ll love the following (and be sure to return back once you’re done so you can benefit from the goodies I uncovered for you):
www.business2community.com/cybersecurity/top-16-tips-for-preventing-insider-data-theft-02366006
There, you’ll discover goodies like:
“…To help you start prioritizing what data to protect, consider the classes of data your company interacts with.
Public Data: Data that is intentionally publicly available and does not require access controls, such as details that are shared on your company website
Internal: Data that isn’t publicly available, but it’s also not likely to be sensitive so limited access controls are necessary to protect it. This includes acceptable use policies, employee handbooks, and internal memos.
Confidential: Potentially sensitive data that is used internally such as internal pricing documents and contact information. This class of data needs to stay within the company.
Restricted: Highly sensitive data such as trade secrets, personally identifiable information (PII), and credit card information. If you are in a regulated industry such as healthcare or finance you are likely to have industry-specific regulations for protecting this class of data. Access to restricted data needs to be limited to an as-needed basis, even amongst your team….”
and more!
Mastering even your own personal data is a topic that could make for a grand challenge, cheatsheet, tutorial and more. You could structure it like so:
Step 1.) Get familiar with the types of scams that exist
Need help with that? Consider:
www.consumerfinance.gov/ask-cfpb/what-are-some-common-types-of-scams-en-2092/
www.fbi.gov/scams-and-safety/common-scams-and-crimes
www.usa.gov/common-scams-frauds
Next, move to:
Step 2.) Secure your phone
Need resources for that? Consider:
www.youtube.com/watch?v=m_SN1CB3Kts
www.verizon.com/articles/8-common-sense-tips-to-keep-your-smartphone-secure/
onezero.medium.com/how-to-totally-secure-your-smartphone-48b7a85a5ed8
Finally, move to:
Step 3.) Secure your computer
Need resources for that? Consider:
home.sophos.com/en-us/security-news/2019/how-to-secure-home-computers.aspx
www.cybintsolutions.com/10-important-cyber-security-tips-users/
www.varonis.com/blog/cybersecurity-tips/
Good stuff!
Your takeaway?
Security starts, first and foremost… with you.
Why not take advantage of that today?
Enjoy!