Data Security and Identity theft
When I was kid, my mother used to say whatever, you do it is known to your
consciousness and GOD. It is nothing but to caution from doing wrong things and
instill a fear in my mind that I am being watched by GOD always. It is believed
by many that your past, present, and future can be decoded though astrology. The above are myth and belief.
Let us come to the reality, are we being watched, or are we being
followed, is some decode our secrets, the answer is yes. It may be happening
with our knowledge or without our knowledge. Sometimes we are sharing your
information without understanding the implication; sometime it is through
unfair means by unscrupulous person either though stealing or purchased.
1. We are being tracked by Google about my movement and
it provide me a report covering the distance travelled, places/ cities visited
during a specific time frame. This is possible though tracking our mobile
phone. We gave all our information.
2. In our Facebook we are seeing advertisement on the
product we have purchased recently or browsed recently on the internet.
3. If we use credit for bigger purchase, we get call from
many other credit card providers for credit cards with big offers. Without our
asking, card limit is enhanced.
4. If we pay a hospital bill or purchase of medicines
though electronic payment, we are getting a call for insurance policy
5. If Our bank balance increased substantially, we are
getting call for investment option and if reduced substantially we are getting
loan offers
6.
But the bulk of the losses last year, $43
billion, stemmed from identity theft scams where criminals interact directly
with consumers to steal their information through methods such as robocalls and
phishing emails. Victims of these scams lost $1,100 on average, according to
Javelin.
7.
“Identity
fraud has evolved and now reflects the lengths criminals will take to directly
target consumers in order to steal their personally identifiable information,”
says John Buzzard, a lead fraud and security analyst with Javelin Strategy
& Research.
May be the day is not too far when we order a Pizza
online, we will be guided by the system, based on our previous order, health
conditions, and financial position, and payment options available with us, a
pizza which may be plain not spicy, without any cheese over it.
Data Security
Data security refers to the process of
protecting data from unauthorized access and data corruption throughout its
lifecycle. Data security includes data
encryption, hashing, tokenization, and key management practices that protect data across
all applications and platforms.
Ø
Cloud data security – Protection
platform that allows you to move to the cloud securely while protecting data in
cloud applications.
Ø
Data encryption –
Data-centric and tokenization security solutions that protect data across
enterprise, cloud, mobile and big data environments.
Ø
Hardware security module -- Hardware
security module that guards financial data and meets industry security and
compliance requirements.
Ø
Key management -- Solution
that protects data and enables industry regulation compliance.
Ø
Enterprise Data Protection – Solution
that provides an end-to-end data-centric approach to enterprise data
protection.
Ø
Payments Security – Solution
provides complete point-to-point encryption and tokenization for retail
payment transactions, enabling PCI scope reduction.
Ø
Big Data, Hadoop and IofT data protection – Solution that protects
sensitive data in the Data Lake – including Hadoop, Teradata, Micro Focus Vertica,
and other Big Data platforms.
Ø
Mobile App Security - Protecting sensitive data in native mobile
apps while safeguarding the data end-to-end.
Ø
Web Browser Security - Protects sensitive data captured at the
browser, from the point the customer enters cardholder or personal data, and
keeps it protected through the ecosystem to the trusted host destination.
Ø
eMail Security – Solution
that provides end-to-end encryption for email and mobile messaging, keeping
Personally Identifiable Information and Personal Health Information secure and
private.
In addition to the above, many countries has imposed
regulation that all the financial data should be kept in their own countries
and even if processing is done outside the country, it shall be transferred and
stored in the country within 24 hours.
Self-Protection
Despite all, are we safe or our information are safe
and secured, the answer is NO. The
information is wealth and it is being sold by money. If yes how to protect us in this e-world.
1.
The emails
account and mobile phone connected to financial transaction or your online
transactions shall distinct one and do not connect it with any social
media Never receive any calls on these
phone or answer any emails unless you are sure about the caller. May be
ordinary phone will do and if you use a smart phone do not download unnecessary
apps into it.
2. Use a separate email
for social media
3. Never share your
personal email address and phone to the public network unless you are sure
about the web page.
4. Never be greedy. In
this world nothing is free and no free lunch.
5. Destroy private records and
statements. Tear up – or, if you prefer, shred – credit cards statements,
solicitations, and other documents that contain private financial information.
6. Secure your mail. Empty
you mailbox quickly, lock it or get a P.O. box so criminals don’t have a chance
to snatch credit card pitches. Never mail outgoing bill payments and checks
from home. They can be stolen from your mailbox and the payee’s name erased
with solvents. Mail them from the post office or another secure location.
7. Safeguard your Social Security
number. Never carry your card with you, or any other card that may have
your number, like a health insurance card. Don’t put your number on your
checks. It’s the primary target for identity thieves because it gives them
access to your credit report and bank accounts.
8. Don’t leave a paper
trail. Never leave ATM, credit card or gas station receipts behind.
9. Never let your credit card out
of your sight. Worried about credit card skimming? Always keep an eye on
your card or, when that’s not possible, pay with cash.
10. Know who you’re dealing
with. Whenever anyone contacts you asking for private identity or
financial information, make no response other than to find out who they are,
what company they represent and the reason for the call. If you think the
request is legitimate, contact the company yourself and confirm what you were
told before revealing any of your personal data.
11. Take your name off marketers’
hit lists. In addition to the national Do-Not-Call registry you can also cut down on junk mail and opt
out of credit card solicitations.
12. Be more defensive with
personal information. Ask salespeople and other if information such as
Social Security or driver’s license number is absolutely necessary. Ask anyone
who does require your Social Security number about their privacy policy and
that you do not want your information given to anyone else.
13. Monitor your credit
report. Obtain and thoroughly review your credit report (check for a free
copy at www.Annualcreditreport.com or by calling 877-322-8228) at least once a
year to check for suspicious activity. If you find something, alert your card
company or the creditor immediately. You may also look into credit protection
services, which alerts you any time a change takes place with your credit
report.
14. Review your credit cards
statements carefully. Make sure you recognize the merchants, locations and
purchases listed before paying the bill. If you don’t need or use
department-store or bank-issued credit cards, consider closing the accounts.
Let us be safe and get
ourselves protected always.
******************************
Based on Data collected though various webpages
No comments:
Post a Comment