Page 128 - Reclaim YOUR DIGITAL GOLD (without audio)
P. 128

RECLAIM YOUR DIGITAL GOLD





                          Chapter Summary





          Cyber identity theft  and  data  breaches  are two of the
          most common and negative consequences of Internet
          use, as well as the greatest threat to the current state of
          the Internet. Furthermore, our lax security and password
          management  practices  contribute  to  this  threat  by
          allowing easy access to our personal information and, in
          some cases, the intellectual property of our business or
          employers, including one of their most valuable assets,
          their data.

          Indeed,  the  fact that  we can access the  Internet
          from  virtually  anywhere and at any time  complicates
          cybersecurity, as  criminals  can break  into government
          agencies, corporations, your home or business network
          from virtually anywhere and at any time, so lax personal
          security management  on various networks, regardless
          of location  and  access  points,  can  create  critical
          opportunity for cybercriminals.

          To avoid becoming a victim or a contributor, you must
          take  every precaution  to safeguard  your data, such
          as protecting your personal data on all your devices with
          virus protection software and using encryption software.
          Also, be sure to take note of your social media footprint
          as well, as you may be unknowingly giving away personal
          identity information to unsuspecting criminals looking for
          such innocence. In addition, if you receive a notification
          from one  of your  accounts,  instead  of clicking on the
          provided links, use your browser to check your account
          to verify the information.



          108
   123   124   125   126   127   128   129   130   131   132   133