Privacy is also an individual responsibility.

Protecting your own privacy can be daunting, but we’ve heard from industry experts who offered some advice for the perplexed.

There is also an individual responsibility for data privacy.

Paul Bischoff, privacy advocate at Comparitech, sees a role for individual action on privacy (and that action isn’t that difficult, he says):

“Individuals must take steps to minimize our digital footprint and stay safe online. The basics are simple: don’t reuse passwords. Do not click on links or attachments in unsolicited messages. Block ads and trackers in your web browser. Don’t share too much on social media. Supports end-to-end encryption.

Geoff Bibby, senior vice president of small and medium business and consumer strategy at OpenText, urges individuals as well as organizations to examine how they handle their data:

“With data breaches becoming more frequent, Data Privacy Day is a great time for individuals and businesses to reflect on their current privacy practices and ensure they are adopting the best habits. safer ways to protect themselves and their business from cybercriminals. And because remote working is here to stay, it also reminds businesses and employees to assess how they share sensitive data online.

“Understanding how your data is being used is the first step, but actively securing your data is the most important step. Organizations and users should assess their current authentication practices to ensure they are adopting the habits to protect themselves and sensitive data from malicious actors It is essential that authentication controls are not only in place, but that organizations go even further by deploying two-factor authentication (2FA) Implementing 2FA provides an additional layer of security by requiring users to confirm their identity, most often via a unique code sent to the user’s device, email address, or via an app. authentication, after entering their user name and password.

Josh Rickard, Security Automation Architect at Swimlane, draws attention to the data lifecycle. Privacy threats can occur in several places:

“Data Privacy Day is an important annual reminder for organizations to assess cybersecurity best practices. Too often we see IT teams focusing their efforts on simple password protections, firewalls, scanning and multi-factor authentication, but failing to go beyond the basics and centralize their routine processes with automation. low-code security.

“To be successful, companies must first understand their data throughout its lifecycle, system classification for the environments that interact with data and the third parties involved to create a documented understanding of their data and systems. Once they have visibility, it’s time to focus on how to eliminate human error where possible. To do this effectively, organizations must implement comprehensive security platforms that centralize detection, response, and investigation efforts into a single program. These platforms provide complete visibility into IT environments and the ability to counter and thwart dangerous threats in real time.

“SOCs and IT departments already have a lot on their plate. By leveraging the power of low-code security automation, organizations can avoid placing an undue burden on their SOC and IT teams by creating workflows that handle most, if not all, of these process without requiring human actions.

Michael Primeaux, Chief Architect, Umo, Cubic Transportation Systems, sees new challenges in the way we as individuals increasingly lead our lives online and on the go;

“In this digital age where people are more mobile and distributed than ever, data privacy and the protection of their personal information are of paramount importance. In the field of mobility, in particular, public transport agencies forward-looking companies rely on mobile apps to modernize and simplify their passengers’ fare payment and rewards capabilities. transit and the technology providers involved protect this information to prevent potential fraud.

“Rewards programs via mobile transit apps offer a unique challenge in that riders have to give up some of their data in order to receive the benefits. Umo Rewards, for example, offers real-time incentives, fare discounts and loyalty rewards through the complementary mobility app. If passengers adopt these programs, they will benefit from a better overall travel experience, whether it is a smoother transit journey, discounts on merchandise or even money to use for future trips.

“To earn and retain rider trust, as we have done at Cubic, we recommend that organizations handling transit rider data hone their agility and focus on analyzing conflicting threats in every part of their business to detect and mitigate security events at a rapid pace.Often, transit agencies work with multiple technology partners to keep their fare payment systems and applications running for passengers. As such, supply chain security should be a key area of ​​attention at all times. We hope these tips will help transit agencies and the technology partners that support them on this Privacy Day. data and beyond.

And finally, Justyn Hornor, Chief Product Officer at Seeking, which describes itself as “the world’s largest premium dating site”, has some suggestions for those of you – you know who you are – who are looking for the love :

“On data privacy day and every day, online daters should prioritize their personal safety and the security of their online data. Before jumping onto a dating site, check the safety precautions by place. Does the dating platform verify identities? data and concrete evidence to strengthen the security of the platform? Is the latest technology, such as AI and bots, used to monitor profiles and identify any potential problems?Does the company block profiles that engage in illegal activity?If the answer is no to any of these questions, find a better site.

About Geraldine Higgins

Check Also

Delaware Investments® Dividend and Income Fund, Inc. Announces Distributions

PHILADELPHIA CREAM–(BUSINESS WIRE)–Today, Delaware Investments Dividend and Income Fund, Inc. (the “Fund”), a closed-end fund …