This Wednesday, January 28, 2015 marks Data Privacy Day: an international effort centred on "Respecting Privacy, Safeguarding Data and Enabling Trust." It’s a day dedicated to helping the public better understand how to protect personal information and navigate the online world.
Looking back at 2014, we saw an alarming number of data breaches which showed no signs of slowing down throughout the year. High profile breaches included brands such as Domino’s Pizza, Dropbox, eBay. The Breach Level Index showed that in the first half of 2014, there were 559 breaches worldwide with 175m customer records stolen. Between July and September of last year, there were around 21 breaches recorded in the Middle East and Africa region. The hackers primarily targeted consumers identities increasing the number of data breaches.
Despite today’s fire-and-brimstone headlines about data breaches, the problem with cyber security is that nobody is feeling the pain of the problem. Consumers know their credit cards will be replaced and they will not be responsible for financial losses. Breached companies know their stock prices will bounce right back and consumers will continue shopping at their stores. And government regulations in this country speak for themselves – they simply are not a prescription for security.
The fact is, whether or not you’re feeling the pain of the problem, you will be better off staying safe online and avoiding security risks where possible. With that in mind, Jason Hart, VP Cloud Services, Identity and Data Protection @ Gemalto shares 3 areas to be cautious of:
2. Free Wi-Fi: You know the saying, there’s no such thing as a free lunch? I like to think it’s the same with Wi-Fi. I recently demonstrated in a 5 News investigation how easy it is to hack into a coffee shop’s free Wi-Fi and gain access to the devices connected to it and view their email addresses, bank account details and other locations they connect the internet to – be that home or work. All this, without their knowledge.
Definitive guide to social hacking and the threat it poses to business.
This is the link to the guide: http://www.twinsystems.com/