This Wednesday, January 28, 2015 marks
Data Privacy Day: an international effort centred on "Respecting Privacy, Safeguarding Data and Enabling Trust." It’s a day dedicated to helping the public better understand
how to protect personal information and navigate the online world.
Looking
back at 2014, we saw an alarming number of data breaches which showed
no signs of slowing down throughout the year. High profile breaches
included brands such as
Domino’s Pizza, Dropbox, eBay. The Breach Level Index showed that in the first half of 2014, there were 559 breaches worldwide with 175m customer records stolen.
Between July and September
of last year, there were around 21 breaches recorded in the Middle East
and Africa region. The hackers primarily targeted consumers identities
increasing the number of data breaches.
Despite
today’s fire-and-brimstone headlines about data breaches, the problem
with cyber security is that nobody is feeling the pain of the problem.
Consumers know their
credit cards will be replaced and they will not be responsible for
financial losses. Breached companies know their stock prices will bounce
right back and consumers will continue shopping at their stores. And
government regulations in this country speak for
themselves – they simply are not a prescription for security.
The
fact is, whether or not you’re feeling the pain of the problem, you
will be better off staying safe online and avoiding security risks where
possible. With that in mind,
Jason Hart,
VP Cloud Services, Identity and Data Protection @ Gemalto
shares 3 areas to be cautious of:
2. Free Wi-Fi: You know the saying, there’s no such thing as a free lunch? I like to think it’s the same with Wi-Fi. I recently demonstrated in a 5 News investigation how easy it is to hack into a coffee shop’s free Wi-Fi and gain access to the devices connected to it and view their email addresses, bank account details and other locations they connect the internet to – be that home or work. All this, without their knowledge.
Definitive guide to social hacking and the threat it poses to business.
This is the link to the guide: http://www.twinsystems.com/