Listen to this article

Now, that we have seen the difference between security and privacy in our last post, let us see how we can implement security and privacy measures in our day-to-day life.

Simple security measures that can be adopted:

  1. Set strong passwords for all sites and much more robust passwords for critical sites
  2. Enable two factor authentication for critical sites like banking if it is not already enabled
  3. Do not reuse passwords
  4. If it is difficult to remember multiple passwords, enable to login with OTP received on mobile or enable two factor authentication
  5. Never share OTP with anybody
  6. Never share passwords with anybody either
  7. If you are using single sign on for several sites(as an example, using Google to sign to Canva or any online newspapers), take care to logout regularly and re-login back again
  8. Do not share location information as this will be misused as well

These are some security measures that can be adopted by all that will keep you safe online

Privacy measures that can be adopted:

With the mobile revolution rocking our world, your mobile phone probably knows more about you than you yourself! (face palm!) It shows how many steps you walked, how much you weigh, how many steps you climbed, where you went and what time you went and much more personal information like this.

Organizations can create a virtual persona of you with all this information (face palm! :() With so much information on our mobile, isn’t it time we take control of some of it? Here are some tips to minimize the privacy impact of our information.

  1. Do not download too many apps and share only the necessary amount of personal information when working with these apps
  2. Do not over share pictures of children online as they can be misused by miscreants and this invades their privacy as well
  3. Read the ‘Privacy Policy’ of all sites and apps. Do ensure that your information is not shared with other third party apps beyond what is needed
  4. Do not partake with any of your information beyond what is needed(as an example, your name and DOB may be needed in many cases, but asking for your phone number is totally unnecessary)
  5. By many laws, your personal information should be deleted after a month of requesting you to do it
  6. Learn other privacy concepts like “right to be forgotten”, “right to erasure”, “right to rectification”(in short, organizations should not have personal information of any individual beyond the required amount of time)
  7. You can delete your search history, location history and other personal information on your mobile and turn on location only when needed
  8. Read the fine print on all sites, check or uncheck the appropriate boxes and take control of your information

Privacy leaks are silently sitting on your phone. You do have to think and react accordingly.

These are some measures that will ensure your personal information is kept private.

This is the sixth post for BlogchatterHalfMarathon!

(Visited 33 times, 1 visits today)

Related Posts

One thought on “Security and Privacy implementation

Leave a Reply