10. PKI, IPsec and RMSPublic key infrastructure (PKI) use a third party to issue keys and digital certificates, while Internet Protocol Security encrypts data for confidentiality. Luckily, Windows 2000 and later software versions have this sort of built-in support. Windows Rights Management Services (RMS) are also great tools to control what the recipients are able to do with regard to your data. 6. File PermissionsOnce you have backed up your data on a device on a regular basis, it’s important to set permissions so that certain people cannot access your files via networks you are part of. 2. Encryption crackedAll encryption technologies ( such as https, SSL, VPN and 4G encryption) routinely used to protect online transactions. However, even encryption of various tech companies such as Google, Microsoft, Facebook and Yahoo can be cracked, which means our data is not as secure as we always believe it to be. WebsiteWebsiteWebsite WebsiteWebsiteWebsite WebsiteWebsiteWebsite 4. Encryption servicesEncryption is the name of the game when it comes to protecting your data privacy. Many years ago, it seemed like rocket science, but today there are plenty of open source applications. These include GPG for Mail, an open source plug-in for the Apple Mail programme. These programmes however cannot prevent the government from demanding your encryption key under the Regulation of Investigatory Powers Act (2000). There are nevertheless many disk encryption third-party products available that will allow you to encrypt an entire disk. 1. Your Data TrailAlmost everything we do with modern technology leaves a digital trail, and there’s no real way of escaping it as long as it’s connected to the internet. If there are no passwords or certain encryption in place within your devices, your data is less secure and easier to infiltrate. 9. SteganographyYou can hide data within data using steganopraphy, which for example, can hide a text file within another text file, or mp3 within an mp3. The data is encrypted first and then hidden inside another file through steganography software. 3. EmailsIts safe to assume that all free web email services are not 100% secure, including Gmail, Yahoo etc. Fastmail is a secure and recommended choice by many, but be prepared to pay for a more secure email service. 5. BackupThere are plenty of cloud services and physical devices to backup your data. However, US, France and UK-based cloud services like Dropbox, iCloud and Evernote have been known to be hacked into by NSA and similar bodies. A number of big companies and Hollywood celebrities can also attest to major hacks into their cloud accounts. 8. Wireless TransmissionProtect your data while in transit, and only send or store data through encrypted wireless networks, preferably those with Wi-Fi Protected Access (WPA), which is stronger than Wired Equivalent Protocol (WEP). The World Wide Web has over the years become a literal giant web that almost two billion people around the world inhabit daily. We have greater access to information but at the expense of sacrificing certain private details. While it can be said that privacy is dead, here are 10 things you need to know about data privacy and how to protect yourself and your devices while online. 7. Password ProtectHaving a good password that you change over time is a necessary step in trying to protect your data. South African data users are known to be quite relaxed about password, which makes them vulnerable to people decrypting emails and files. Setting a strong password phrase that you can build on and make stronger as you go will help secure your data. Change your password for different accounts and keep changing it (obviously while remembering it).
Related posts:Slothy Sundays: A topsy-turvy world Slothy Sunday: Sloths, sloths everywhere Slothy Sunday: A baby sloth is born Slothy Sunday: High-tech backpacks key to saving baby sloths Sloths have little reason to leave the safety of the rain forest canopy, but once a week the sluggish mammals descend to the base of their favorite tree in order to defecate. This puts them at risk of being attacked by predators.The exact reason why sloths make this dangerous journey is still a mystery, but researchers believe that it may help maintain the algae gardens in their fur.Check out 11 other lesser known sloth facts.This story was made possible thanks to The Tico Times 5 % Club. If only 5 percent our readers donated at least $2 a month, we’d have our operating costs covered and could focus on bringing you more original reporting from around Costa Rica. We work hard to keep our reporting independent and groundbreaking, but we can only do it with your help. Join The Tico Times 5% Club and help make stories like this one possible.Support the Tico Times Facebook Comments