Searching...

steps to protect information safely and securely


Protecting data from spy


Following few steps to protect our personal information:

         1.      Knowing our privacy rights.
         2.      Reading the privacy policies and notices.
         3.      Always thinking while giving the personal information out.
         4.      Avoiding access to our personal information.
         5.      Making sure that the information we provide to the organization is                  secure or not.
         6.      Destroy the hard copies properly.



   
There is lot of difference between keeping data safely and securely. The above mentioned steps are used to keep the data securely and privacy. The below following steps are keeping the data safely.
10 expert ways to keep your information safely:
1. STORE
ICO (Information Commissioner’s Office, an independent authority set up to uphold information rights in the public interest) advises to “store any documents carrying your personal details, such as your passport, driving licence, bank statements and utility bills in a safe place”.
2. SHRED
Shred or destroy the personal items that are throwing away, such as bills, receipts or bank statements,that show your name, address or other personal details.
3. SEND SAFELY
Posting the personal documents, by asking the post office for advice on the most secure method.
4. CHANGE PASSWORDS
Using different passwords and PINs for different accounts and take extra care when using public computers to access your personal information.
5. DON'T SHARE
Always think about who you are giving your information to. Be cautious about providing any personal details to unsolicited callers by phone, fax, post, email or in person, unless you are sure they person is who they say they are. If you are suspicious, ring the organisation back on an advertised number or visit their website.
6. STOP SPYWARE
“Buy a good anti-virus, firewall and anti-spam software package to protect your computer against viruses and any spyware software which can be used to obtain personal details.” says our expert.
7. PROTECT YOUR TEXTS
TigerText allows text-message senders to set a time limit from one minute to 30 days after which the text disappears from the company’s servers on which it is stored and therefore from the senders’ and recipients’ phones.
8. DESTROY DATA
Researchers at the University of Washington are developing a technology called Vanish that makes electronic data ‘self-destruct’ after a specified period of time. Instead of relying on Google, Facebook or Hotmail to delete the date on their servers, Vanish does the job.
9. GO OFFSHORE
Some companies, such as Connectinprivate.com, offer ‘anonymous and non-traceable offshore browsing’ for £5 a month. It’s done via a virtual private network, or VPN, which connects to the internet on your behalf so web services think you’re located in Canada, for example, rather than London. The VPN knows where you are, but in keeping with Canadian law, keeps no log of your activity.
10. UPDATE YOUR BROWSER

Microsoft plans to increase privacy options in the upcoming version of its Web browser Internet Explorer 9 (IE9), including the ability to prevent tracking by third-party websites