Page 128 - Reclaim YOUR DIGITAL GOLD (with DesignLayout Dec3) (Clickable) (Dexxi-FLIP-Audio)_Neat
P. 128

RECLAIM YOUR DIGITAL GOLD




                           Chapter Summary






          Cyber identity theft and data breaches are two of the
          most common and negative consequences of Internet
          use,as well as the greatest threat to the current state of
          the Internet. Furthermore,our lax security and password
          management practices contribute to this threat by
          allowing easyaccess to our personal information and,in
          some cases, the intellectual property of our business or
          employers, including one of their most valuable assets,
          their data.
          Indeed, the fact that we can access the Internet
          from virtually anywhere and at any time complicates
          cybersecurity, as criminals can break into government
          agencies, corporations, your home or business network
          from virtually anywhere and at any time, so lax personal
          security management on various networks, regardless
          of location and access points, can create critical
          opportunity for cybercriminals.

          To avoid becoming a victim or a contributor, you must
          take every precaution to safeguard your data, such
          as protecting your personal data on all your devices with
          virus protection software andusing encryption software.
          Also, be sure to take note of your social media footprint
          as well, as you may be unknowingly giving away personal
          identityinformation to unsuspectingcriminals lookingfor
          such innocence. In addition, if you receive a notification
          from one of your accounts, instead of clicking on the
          provided links, use your browser to check your account
          to verify the information.


          108
   123   124   125   126   127   128   129   130   131   132   133