{"id":1296,"date":"2015-10-15T11:47:27","date_gmt":"2015-10-15T15:47:27","guid":{"rendered":"https:\/\/huangshizhaopin.com\/its\/?page_id=1296"},"modified":"2016-02-12T16:21:57","modified_gmt":"2016-02-12T21:21:57","slug":"online-safety","status":"publish","type":"page","link":"https:\/\/huangshizhaopin.com\/its\/resources\/online-safety\/","title":{"rendered":"Cyber Security: Don’t Go It Alone"},"content":{"rendered":"

1. Know your enemy, know yourself.<\/h3>\n

Anyone can use the internet \u2013 it\u2019s very different from, say, driving a car, which requires authorization from a governing body, familiarity with the rules of the road, and standard automotive safety procedures. A lot of security issues occur because of general lack of knowledge. We hope you use this guide wisely, to protect yourself, your data, and make the internet a safer place for everyone.<\/p>\n

It\u2019s a dangerous world out there. The virtual world holds information about everyone and everything it seems, and where there\u2019s information, there\u2019s people attempting to profit from it, by any means necessary.<\/p>\n

You may think \u201cWhy would I be a target? How is my information worth so much?\u201d Consider this \u2013 in addition to bank account and financial information, every aspect of what you do online could be considered valuable. For example, if you attend a university and you have a digital transcript, with your name, password, email address, contact information, school information, subjects, and grades – that information would be valuable to marketing companies to add you to mailing lists without your consent. Identity thieves could use your information to spoof their way into financial transactions using your credentials and negatively affect your credit.<\/p>\n

If you are a college student, don\u2019t have much credit history, or are a parent, you should be especially aware of cyber security. The most valuable information hackers can get is PII (Personally Identifiable Information) from someone who has no or very little credit history, since there\u2019s little data that would bring up red flags to lenders or creditors.<\/p>\n

If you\u2019re using a computer or smartphones that has malware, a keylogger might be recording your keystrokes and web sites, sending that information back to hackers. If you have a Trojan virus, hackers could be accessing your files directly or launching programs on your computer directing it to spam others. If you open a phishing email, a virus could download that re-sends out that malicious email to everyone on your contacts list.<\/p>\n

Lists of passwords and IDs can be bought and sold on the black market, and you may not ever find out about this until you want to buy a house, or take out a loan, and the bank turns you down. When you use a credit or debit card to purchase goods and services, companies keep a digital record of your purchase, and if their security has been compromised, that information may be available to anyone who wants to buy it.<\/p>\n

So, should you start storing money under the mattress, shut down the computer permanently, and withdraw from society? Of course not \u00a0\u2013 but you should take active steps to make sure you are aware of what information you\u2019re giving out, where, be aware of signs that you may have been compromised, and have a plan on what to do if you are compromised.<\/p>\n

2. Mind your PII!<\/h3>\n

Personally identifiable information (PII)<\/strong> is any data that could potentially identify a specific individual. Any information that can be used to distinguish one person from another and can be used for de-anonymizing anonymous data can be considered PII. This includes your name, address, date of birth, social security number, user ID, password, or even information about your family or life. Basically, this information is what\u2019s most valuable to criminals, because it sets you apart from everyone else in the world.<\/p>\n

Don\u2019t give out PII to just anyone who asks \u2013 you will need to make a determination if it is for a legitimate or malicious purpose. For example, when you want to take money out of an ATM, you put in your credit card, and you are asked for your PIN number \u2013 that PIN number is PII, and it is being given for a legitimate purpose. If you call a doctor\u2019s office to make an appointment and they ask for your date of birth and address \u2013 that\u2019s a legitimate reason to give PII. If you receive a call from a company and they ask for your full social security number \u2013 that is NOT a legitimate purpose to give PII \u2013 treat this and similar situations with caution.<\/p>\n

Valuable PII would be:<\/strong><\/p>\n