The real value of your data
Over and over, you’ve probably been advised that you should protect your private data. This typically means that, in addition to updated application and internet security software, you should use a trusted VPN that doesn’t rely on ads and blocks online tracking. Be password smart and use two-factor authentication everywhere that you can. You should also stick to trusted, well-reviewed apps from official app stores, refrain from posting personally identifiable information and pre-travel information on social media, and lock up all your devices when not in use.
Complete privacy is, unfortunately, difficult to attain online, but you should protect what you can and know why you’re protecting your data. Here are three reasons why you should do your best to keep your private data safe:
- Protecting your identifiable data and your financial identity is of utmost importance. Phishing scams that lure you into providing your private data are often created to resemble a legitimate communication from your bank or other financial institutions. You do not want this information to be used to access your accounts or create false identities in your name.
- Posting your travel schedule in advance could make it easier for thieves to find an empty house to burgle. The more personal information you make public, the easier it is for a stranger to invade your personal life.
- Even if you don’t share everything with your friends on Facebook, you will no doubt be shocked to learn what you’re actually sharing with Facebook itself. Facebook tracks your geographical location through GPS, Bluetooth or Wi-Fi signals. And Snapchat doesn’t just allow itself access to the photos and videos you post online but the entire contents of your device’s media library. And you agreed to this, of course, when you ticked the box for their terms and conditions!
Before too long your washing machine will likely have a web server in it and your toaster will connect to the internet, as will almost anything you can plug in. This gives manufacturers new ways to track how their products are used. That data may well end up being an asset that could be used to sell to another company. Would a hacker take control of your aircon and demand a ransom payment to turn up the heat? Could your dishwasher be used as an entry point to invade your home network? What’s more attractive to hackers: the device itself or the server behind it where the data is stored?
Now is the time for defenders to stop asking “What happens if we’re hit?” and start asking “What happens WHEN we’re hit? What happens when our plans fail?”.
F-Secure’s RADAR is the answer. It allows you to identify and manage both internal and external threats and report risks. It gives you visibility into shadow IT – to map your full attack surface and respond to critical vulnerabilities associated with cyber threats. Knowing what your vulnerabilities are is a great way to prepare for the unexpected.