{"id":1421,"date":"2019-01-22T03:36:10","date_gmt":"2019-01-22T03:36:10","guid":{"rendered":"https:\/\/www.fastmetrics.com\/blog\/?p=1421"},"modified":"2023-01-18T02:42:42","modified_gmt":"2023-01-18T02:42:42","slug":"personal-data-security","status":"publish","type":"post","link":"https:\/\/www.fastmetrics.com\/blog\/tech\/personal-data-security\/","title":{"rendered":"Data Security &#038; Personal Information"},"content":{"rendered":"<h3 style=\"text-align: center;\">Personal Data Security: Protect Important Details Online<\/h3>\n<p><span style=\"font-weight: 400;\">Being online is part of our daily lives. Unfortunately, cyber attacks and data breaches have also become commonplace in today&#8217;s connected world. With the growth of the Internet and the rise of digital technology, we often inadvertently share our information over the &#8216;net. This compromises our personal data security and leaves us open to identity fraud, hacking and other malicious online attacks. Identity fraud is now one of the most common white-collar crimes.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"http:\/\/www.pewinternet.org\/2017\/01\/26\/americans-and-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Recent studies<\/a>\u00a0show<\/span><span style=\"font-weight: 400;\"> that most Americans do not trust modern institutions to protect their personal data. Further, we neglect cyber-security best practises in our daily lives. In our modern interconnected world, it&#8217;s even more important for us to take care what personal information we share online. From email addresses to social media accounts, we leave digital footprints wherever we go.\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1424 aligncenter\" src=\"https:\/\/www.fastmetrics.com\/wp-content\/uploads\/sites\/5\/2019\/01\/red-backlit-keyboard-of-laptop-1024x577.jpg\" alt=\"red backlit keyboard of laptop\" width=\"600\" height=\"338\" srcset=\"https:\/\/www.fastmetrics.com\/blog\/wp-content\/uploads\/sites\/5\/2019\/01\/red-backlit-keyboard-of-laptop-1024x577.jpg 1024w, https:\/\/www.fastmetrics.com\/blog\/wp-content\/uploads\/sites\/5\/2019\/01\/red-backlit-keyboard-of-laptop-300x169.jpg 300w, https:\/\/www.fastmetrics.com\/blog\/wp-content\/uploads\/sites\/5\/2019\/01\/red-backlit-keyboard-of-laptop-768x432.jpg 768w, https:\/\/www.fastmetrics.com\/blog\/wp-content\/uploads\/sites\/5\/2019\/01\/red-backlit-keyboard-of-laptop-624x351.jpg 624w, https:\/\/www.fastmetrics.com\/blog\/wp-content\/uploads\/sites\/5\/2019\/01\/red-backlit-keyboard-of-laptop.jpg 1188w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">This article provides reasons why you should not give away personal details about yourself. It also states basic personal data that you should protect and safeguard.\u00a0<\/span><\/p>\n<h4 style=\"text-align: center;\">6 Basic Pieces Of Information Not To Be Shared Online<\/h4>\n<p><span style=\"font-weight: 400;\">There is a plethora of information that should not be shared online. 6 of the most important pieces of personal information to be protected for data security purposes include;\u00a0<\/span><\/p>\n<ol>\n<li><b>Personal Names: <\/b>Not easy to avoid. However, there isn&#8217;t always a need to use personal names on social media profiles, for example. Y<span style=\"font-weight: 400;\">our first, middle and last names are basic pieces of information, but also key to misuse by others. Never share your mother\u2019s maiden name or your own maiden name online.<\/span><\/li>\n<li><b>Personal Identity Numbers: <\/b><span style=\"font-weight: 400;\">All personal ID numbers like passport numbers, banking PIN codes or account details, social security numbers, and even your driver\u2019s license.\u00a0<\/span><\/li>\n<li><b>Residential &amp; E-mail Addresses:\u00a0<\/b><span style=\"font-weight: 400;\">Never share your residential or private email addresses online. Be aware that all of this data is often stored and hard to remove on social networks. \u00a0 \u00a0<\/span><\/li>\n<li><b>Bio metric data: <\/b>R<span style=\"font-weight: 400;\">etina and <\/span>iris scans<span style=\"font-weight: 400;\">, fingerprints, facial geometrical patterns and voice signatures.<\/span><\/li>\n<li><b>Vehicle Registration Numbers: <\/b>Y<span style=\"font-weight: 400;\">our automobile and or motorcycle registration numbers.<\/span><\/li>\n<li><b>Phone Numbers: <\/b>Personal landlines or cell phone numbers.<\/li>\n<\/ol>\n<h4 style=\"text-align: center;\">So why take personal data security so seriously?<\/h4>\n<p style=\"text-align: left;\"><b>Prevent Identity Theft:<\/b><strong>\u00a0<\/strong><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.usa.gov\/identity-theft#item-206115\" target=\"_blank\" rel=\"noopener noreferrer\">Identity theft<\/a> is when somebody steals uses your personal credentials for their benefit (typically financial gain), leaving you in a vulnerable position. This mainly relies on taking your personal information and pretending to be you online. This might mean getting access to your personal finances. Even committing cyber criminal activities, which you will be held responsible for. Avoid this by limiting the personal information you share over the internet.\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1422 aligncenter\" src=\"https:\/\/www.fastmetrics.com\/wp-content\/uploads\/sites\/5\/2019\/01\/identity-theft-and-personal-data-security-breach-1024x664.jpg\" alt=\"identity theft and personal data security breach\" width=\"600\" height=\"389\" srcset=\"https:\/\/www.fastmetrics.com\/blog\/wp-content\/uploads\/sites\/5\/2019\/01\/identity-theft-and-personal-data-security-breach-1024x664.jpg 1024w, https:\/\/www.fastmetrics.com\/blog\/wp-content\/uploads\/sites\/5\/2019\/01\/identity-theft-and-personal-data-security-breach-300x194.jpg 300w, https:\/\/www.fastmetrics.com\/blog\/wp-content\/uploads\/sites\/5\/2019\/01\/identity-theft-and-personal-data-security-breach-768x498.jpg 768w, https:\/\/www.fastmetrics.com\/blog\/wp-content\/uploads\/sites\/5\/2019\/01\/identity-theft-and-personal-data-security-breach-624x405.jpg 624w, https:\/\/www.fastmetrics.com\/blog\/wp-content\/uploads\/sites\/5\/2019\/01\/identity-theft-and-personal-data-security-breach.jpg 1072w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p style=\"text-align: left;\"><b>Protect Financial Data:\u00a0<\/b><span style=\"font-weight: 400;\">It\u2019s obvious you should not share your financial data with just anybody online. There are many ways in which you can safeguard your financial details. Some of these include not sharing your banking details, using <\/span><a href=\"https:\/\/www.portalguard.com\/blog\/2015\/12\/28\/8-tips-for-creating-a-strong-password\/\">strong and multi-faceted passwords<\/a><span style=\"font-weight: 400;\"> to make it difficult for hackers to crack and using internet banking only when you are on a secure network.\u00a0<\/span><\/p>\n<p><b>Prevent Home Burglaries: <\/b>Would be t<span style=\"font-weight: 400;\">hieves want to break into your house when you are not there. If you spread the news of your vacation on social media, you are literally giving an open invitation to others to enter your house and steal.<\/span><\/p>\n<p style=\"text-align: left;\"><b>Enhance Employ-ability:\u00a0<\/b><span style=\"font-weight: 400;\">Your online image can make or break employ-ability. Many companies conduct thorough background checks on potential employees. Not discussing too much of your personal life in public (online) ensures you take your personal information seriously and will do so in the workplace too.<\/span><\/p>\n<p style=\"text-align: left;\"><b>Enhance Business Reputation:\u00a0<\/b><span style=\"font-weight: 400;\">Owners of businesses need to also keep data private from prying eyes. This is very important for maintaining corporate security as well as safeguarding trade secrets. Your business will suffer if you lose all your data at the hands of a malicious hacker. In case you do, consider this business reputation repair services.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1423\" src=\"https:\/\/www.fastmetrics.com\/wp-content\/uploads\/sites\/5\/2019\/01\/man-wearing-red-hoody-representing-a-hacker-with-neon-light-face-mask.jpg\" alt=\"man wearing red hoody representing a hacker with neon light face mask\" width=\"600\" height=\"400\" srcset=\"https:\/\/www.fastmetrics.com\/blog\/wp-content\/uploads\/sites\/5\/2019\/01\/man-wearing-red-hoody-representing-a-hacker-with-neon-light-face-mask.jpg 751w, https:\/\/www.fastmetrics.com\/blog\/wp-content\/uploads\/sites\/5\/2019\/01\/man-wearing-red-hoody-representing-a-hacker-with-neon-light-face-mask-300x200.jpg 300w, https:\/\/www.fastmetrics.com\/blog\/wp-content\/uploads\/sites\/5\/2019\/01\/man-wearing-red-hoody-representing-a-hacker-with-neon-light-face-mask-624x416.jpg 624w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p style=\"text-align: left;\"><b>University Admissions:\u00a0<\/b><span style=\"font-weight: 400;\">Even renowned <a href=\"https:\/\/www.princetonreview.com\/college-advice\/social-media-and-college-admissions\">universities are checking social media profiles<\/a>\u00a0(old and new) in their admissions processes. Ensure you are on the safe side and don\u2019t divulge too many details about yourself. Getting involved in controversial arguments can mar your chances of university admission.<\/span><\/p>\n<p style=\"text-align: left;\"><b>Insurance Purposes:\u00a0<\/b><span style=\"font-weight: 400;\">Even insurance companies check claims based on personal online data that is available.\u00a0<\/span><\/p>\n<p style=\"text-align: left;\"><b>In Court:\u00a0<\/b><span style=\"font-weight: 400;\">Your online image can also be used in conducting legal proceedings against you. This can hold as evidence in a court of law.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The above are just some of the many reasons to keep on top of our personal data security.\u00a0There are always new and unknown threats online. As technology evolves, so do attacks. As do options for better online security, such as a free\u00a0<a href=\"https:\/\/www.fastmetrics.com\/blog\/tech\/top-use-vpn-private-browsing\/\">VPN<\/a> for private browsing or <a href=\"https:\/\/www.fastmetrics.com\/blog\/internet-services\/managed-routers\/\">managed routers and firewalls<\/a>. The only diligent way to maintain high levels of data security, are to remain vigilant and follow best practises as best as we can. It is also recommended to invest in <a href=\"https:\/\/www.udemy.com\/courses\/it-and-software\/network-and-security\/\" target=\"_blank\" rel=\"noopener\">network security training<\/a> so you have all necessary knowledge to keep data secure. <\/span><\/p>\n<h4 style=\"text-align: center;\">About Fastmetrics, Inc. Building &amp; Business ISP<\/h4>\n<p>Since 2002, Fastmetrics is the Bay Area&#8217;s only dedicated <a href=\"https:\/\/www.fastmetrics.com\/\">business ISP<\/a>. We provide telecommunication services in California and the San Francisco Bay Area. Reliable service &#8211; backed by better live and local support. From install to 24-7 proactive monitoring, get treated like a VIP customer. Not a number by a faceless call center. We specialize in managed <a href=\"https:\/\/www.fastmetrics.com\/internet-phone-bundles.php\">business internet and phones<\/a>, dedicated high speed <a href=\"https:\/\/www.fastmetrics.com\/fiber-optic-internet.php\">business fiber internet<\/a>, <a href=\"https:\/\/www.fastmetrics.com\/managed-business-wifi-service.php\">business WiFi<\/a>, <a href=\"https:\/\/www.fastmetrics.com\/metricvoice\">SIP voice<\/a> solutions \/ UCaaS and managed network services. We are a Microsoft and <a href=\"https:\/\/www.fastmetrics.com\/blog\/managed-services\/cisco-meraki-partner\/\">Cisco Meraki<\/a> Partner. Our team are Certified Cisco Specialists, Ubiquiti Enterprise Wireless Accredited and Polycom Authorized Solution Advisors. We take care of your business network, so you can focus on growth.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone \" src=\"https:\/\/www.fastmetrics.com\/assets\/images\/microsoft-partner-black.webp\" alt=\"Microsoft Partner logo - Fastmetrics\" width=\"142\" height=\"64\" \/>\u00a0 \u00a0 \u00a0 <img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" style=\"margin: 0 15px;\" src=\"https:\/\/www.fastmetrics.com\/assets\/images\/cisco-certified-specialist.webp\" alt=\"Cisco Certified Specialist \" width=\"136\" height=\"84\" \/> \u00a0<img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" style=\"margin: 0 15px;\" src=\"https:\/\/www.fastmetrics.com\/assets\/images\/Ubiquiti-Enterprise-Wireless-Admin-Training.png\" alt=\"Ubiquiti Enterprise Wireless Admin (UEWA) Accredited \" width=\"131\" height=\"72\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Personal Data Security: Protect Important Details Online Being online is part of our daily lives. Unfortunately, cyber attacks and data breaches have also become commonplace in today&#8217;s connected world. With the growth of the Internet and the rise of digital technology, we often inadvertently share our information over the &#8216;net. This compromises our personal data [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1422,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[27,1],"tags":[],"class_list":["post-1421","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-tech"],"_links":{"self":[{"href":"https:\/\/www.fastmetrics.com\/blog\/wp-json\/wp\/v2\/posts\/1421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fastmetrics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fastmetrics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fastmetrics.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fastmetrics.com\/blog\/wp-json\/wp\/v2\/comments?post=1421"}],"version-history":[{"count":0,"href":"https:\/\/www.fastmetrics.com\/blog\/wp-json\/wp\/v2\/posts\/1421\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fastmetrics.com\/blog\/wp-json\/wp\/v2\/media\/1422"}],"wp:attachment":[{"href":"https:\/\/www.fastmetrics.com\/blog\/wp-json\/wp\/v2\/media?parent=1421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fastmetrics.com\/blog\/wp-json\/wp\/v2\/categories?post=1421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fastmetrics.com\/blog\/wp-json\/wp\/v2\/tags?post=1421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}