Dream of Having a Good Life — Just Protect Your Data!

DATA GOBLINS
5 min readMar 31, 2021

Probably you have already read the previous articles by Data Goblins on the importance of the data security and the biggest data leaks in the history? If not, do not miss the chance to catch up now! 🤗 However, only know the fact your data is important is not enough. What you have to know additionally — is how to protect your data. There are many ways how to protect your data and there are even more ways how to steal your data, too. How to protect your data, how to minimize the potential damage for your personal safety after the data leakage occurs and how to have a good life — look for the answers to these questions below! 👇

First of all, let’s split the concept of data security into three different dimensions in which you have to take appropriate care and precaution. These are: physical or hardware, software and, the last but not least, human or psychological dimension. 👀 On the first two dimensions we can name specialized hardware and software, and that cover the whole range technical capabilities in order to protect data, these tools include secure phones, secure OS or encryption software, VPN (virtual private network) etc. However, today we are not going to go deeper in these two aspects — it will be covered in the next article. Nevertheless, what you should remember for now is that you can purchase a protected laptop, antivirus software or password manager service… but what you cannot purchase is your own consciousness and ability to resist against fraud, deception or traps of social engineering.

So, one of the easiest ways to protect yourself from data theft or leakage is to take care of daily data security hygiene. That includes so simply steps such as update software and apps on laptop or phone, use strong passwords (that means: do not use birthday dates, the names of your girlfriend or boyfriend, please do not set your password such as “123456789” — using STRONG passwords means something like that @!*!NvU3EfaDfmBfG*sp34Mkxg2VVZ5Nmz82*2s e3u?D^zb”), also change your passwords regularly, do not share your passwords with third party persons, do not write down your passwords on note book, but memorize them or save in specialized password managers. What’s more? 💁‍♂️ Do not browse unknown websites, do not open unknown emails and attachments, do not use one password for all the services and websites you are registered. What is common among all of these recommendations — each of them is really easy to implement. If you know what was mentioned and carry out this so-called data security hygiene regularly — congratulations, you are probably safe. But if you see a lack of action at least in one of the above mentioned steps… Oh you poor thing, it is time to take action right now and make sure every step is implemented properly. Do it now! Have you done it? If yes, you can continue reading. 📖

Now let’s talk about social engineering. Have you ever been exposed to that, huh? 🤓 We guess, yes, you have been even if you said no, you still have. Social engineering usually includes variety of tools and methods to get your data or other needed information without any physical action or sophisticated cyber-attack. What is usually done — social engineering specialists just ask you to provide some information and you give required data for them. You may ask how is that possible?! That happens and more often than you imagine. One of the most common and simplest examples of that is phishing emails. These emails usually look like ordinary email from your family member, bank, manager or colleague, and asks to open some link, log in to the bank account or provide your personal data. These emails are so similar to the emails that you receive everyday so you automatically trust them without any deeper analysis on who is standing behind it. 🚫 You may say, no, that is not me, you will not deceive me in such crazy way. Really, are you sure? Imagine the following situation: you receive an email supposedly from the HR department in the company you work for. The message tells you: congratulations, after the annual performance appraisal as a reward for your hard work and improvement, you are proposed for promotion to the account manager with annual increase in salary of 35%. Email also asks you to open certain link and provide personal information, such as bank account, address etc. Now, let’s make reality check: one month ago, you really had a performance appraisal, you are really hardworking employee and you believe you are deserved to be promoted. You definitely open a link and provide required information. That’s it, the data theft got your data and you were deceived, hopefully you did not provide any other sensitive personal or corporate information about the company you work for.

In conclusion, today we have covered the main aspects of the tools and methods how to protect your data. The possible outcomes of the lost data might be critical for your financial security, public image or even personal life. So, if you want to sleep well, have a good and calm life, make sure your data is safe.🔒 In a case the data leakage occurs and you were not able to prevent it, the sequence of actions is almost the same: change the passwords, be aware of the spam and phishing emails and, last but not least, be critical on what kind of emails, messages or phone calls you receive. More about the specific devices and software dedicated to ensure your data security we will tell you the next time. But before that we have a homework for you — go back to the beginning of the article and check the main security steps again. Take care not only of yourself but also about the data security of your family, friends and colleagues — tell them what you learned new. Because you are safe as long as your friends are safe, too. 💪

Stay secure!

--

--

DATA GOBLINS

Short story: J. K. Rowling wrote Harry Potter, Bryan Singer was director of X-Men, we created Data Goblins to help to save your data.