Contact us today!

Network Solutions Unlimited Blog

7 Tips to Take Control of Your PII

7 Tips to Take Control of Your PII

It is remarkable how much trust people have in Internet-based companies. Not just that they will fulfill the expectations placed on them, but that people routinely provide extremely sensitive information to these companies without thinking for a second about what they do with it. We will take a look at data collection practices, what Internet companies want with that data, and how millions of people every year become victims because they entrust their PII (Personally Identifiable Information) to corporations that promptly lose it.

Your Average Website
Say you go to a company’s website and are interested in learning more about a service. You fill out an Internet form with your name, and often your address, your email address, and your phone number. When you hit submit on the form, you have entrusted a business with your personally identifiable information; and, most of these companies don’t just use it to reach out to you about the product or service you were interested in.

This information is valuable
The information you provide is bundled with the countless other people’s PII and sold to marketing agencies for sound profits. The company that you provided that information to looks at it as their right, as you have willingly provided it. But what happens if that company gets hacked? All of the information you’ve provided to that company is now publicly available to whomever wants to purchase it. So, who is responsible? Bad news, in most places in the U.S. there is absolutely no recourse for the consumer if presented with this situation. It’s not like they can turn back time.

It isn’t only willing participation that strips you of your data, either. Almost everything you do on the Internet--whether it be messaging, streaming media, shopping, or simply surfing the web--leaves a data trail right back to you. This goes for everyone. When each person that uses the Internet has a trail, and on that trail is all of their most personal information, it stands to reason that there would be people on the other side of this attempting to circumvent that data stream into their possession because they know they can profit from it. Data shapes the story of an individual online. A person that knows where to look can find out about people’s most intimate relationships, their financial situation, their political beliefs, just about anything they want to know. That is why it is important to have an idea about how to protect yourself online.

The first thing you have to understand about data protection is simple: you have value. Your name has value, your address and phone number have value, hell, your sexual preference and your favorite food has value. Everything about you has some kind of value to everyone looking to get their hands on it. But all that data has the most value to you. It may not seem like it, but nearly every company that deals in PII, while not clamoring to pay users for their data, do spend a lot of capital getting that information. Think about all the sales that got you to buy something. Think about all the discounts offered to get you to fill out that form. Think about the investment in website-connected software.

Knowing the value of your data should be the first sign that you need to protect it. That’s why we’ve put together these seven tips to help you protect your PII:

  • Make up creative security questions - Many accounts will want you to come up with a security question that only you would know the answer to. Unfortunately, people tend to use situations that other people could guess. You have to understand that hackers are sometimes fantastically crafty and outwitting them takes some consideration. By picking a question and answer that can’t be researched, you and you alone will have outside access to your accounts.
  • Read Apps Terms of Service - We know, we know, this suggestion is one of pure tedium. You don’t have to know every word of the Terms of Service agreements you agree to, but you should know what kind of data collection policy the app or service has before agreeing to give them access to your data.
  • Watch out for Phishing Scams - Knowing how to decipher when you are getting scammed is important. A phishing scam can come over social media, instant messaging, or most frequently, email. If you get an email from an organization that typically won’t send you an email for that purpose, you should confirm the legitimacy before you click on anything.
  • Monitor your financial activity - Today there are several services dedicated to helping people manage their finances more effectively. Finding one that you trust and provides you access to credit reports is very useful.
  • Use strong passwords - Passwords that are over twelve characters and feature symbols, numbers, and a mix of upper and lowercase letters are the most effective.
  • Don’t connect to public Wi-Fi (if you can help it) - We know that it is tempting to not use your data up, but you are opening yourself up to a lot of uncomfortable problems by accepting the user agreement on any publicly available Wi-Fi connection.
  • Be cautious when completing online forms - Is the webpage secure? Is their contact information readily available; address, phone? Are the questions they are asking relevant to what you're signing up for? What is their privacy policy? Take a moment and do your research before you submit.

If you would like more advice about keeping your PII safe, return to our blog regularly, or contact the IT professionals at Network Solutions Unlimited at 217-428-6449 today.

How Automation Rejuvenates Productivity
Tip of the Week: New Password Recommendations by N...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, March 20 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Browser Cache Charger Scam intranet Rootkit Project Management Tech Support Data Theft FAQ IT Support Gadgets Emails Cybercrime Hackers Data Wireless Charging Projects Virtualization Employee Small Business Office Tips Business SaaS Tablets Shadow IT Apps Two Factor Authentication Internet Exlporer Data storage Application Alert Alexa for Business Hiring/Firing Humor Hybrid Cloud Cleaning PDF USB Financial Technology Password Workers Credit Cards Hard Disk Drive Management Robot Memory Financial Government Google Gifts Bring Your Own Device Augmented Reality Marketing Cloud Computing Identity Server Virtual Private Network Virus Meetings Transportation Microsoft Update Employer Employee Relationship Licensing Wasting Time File Storage Retail Operating System Flexibility The Internet of Things Bandwidth Two-factor Authentication Company Culture Managing Stress E-Commerce Microsoft Office Cybersecurity Adobe Vendor Managed IT Service Excel How To Identities Spam Efficiency Windows Mobile Instant Messaging Techology Windows 10 Money Communications Budget Saving Money Remote Monitoring Troubleshooting Backup Utility Computing History Hard Drive Personal Information App store Wasting Money Technology Social Engineering Computers Computer Care Legal Upgrades hacker Entertainment Google Docs Legislation Hosted Solution Data Privacy Email Sync HBO Monitors Artificial Intelligence Privacy How to Firewall Health SMB Loyalty Going Green Internet Keyboard Shortcuts Safety IT Services Blockchain Information Technology Nanotechnology Human Resources Administration Laptop Keyboard Wireless Internet Twitter Data Storage Unified Communications Co-Managed Services Cortana Monitoring Mobility iOS Wireless Payment Cards Audit Evernote Microsoft Excel Internet exploMicrosoft HIPAA Computer Fan Avoiding Downtime Peripheral Network OneNote Automation Spam Blocking Router Language Workplace Tips MSP Miscellaneous Managed IT Services Best Practices Chromebook Employee-Employer Relationship Telephone Students File Sharing Data Protection Data Recovery Cast Office 365 Save Money End of Support Public Computer Bluetooth Innovation Spyware Business Computing Passwords Outlook Commerce Microsoft Word Antivirus Windows 7 Vendor Management Gamification Google Maps Managed Service Provider Business Technology Hard Drives Sports Websites Content Data Management Big Data Camera Redundancy WannaCry Virtual Reality Sales Hacking Printers Root Cause Analysis Phishing Telephone Systems Data Loss Customer Social Media Display Printing Worker Productivity Education Smartphones Mobile Device Management Outsourced IT Connectivity Books Backup and Disaster Recovery Monitor Samsung Best Practice Streaming Media Storage Wireless Technology Vulnerability IT Management Google Assistant User Error Managed IT Television WPA3 Tech Term Internet of Things Automobile Physical Security VoIP Quick Tips Law Enforcement Shortcut Webinar Data Backup Computer Accessories Smart Tech Business Continuity iPhone Ciminal Chromecast Windows Ink Value Public Cloud Risk Management Network Security Disaster Recovery Computer Forensics Malware Mobile Devices PowerPoint Search Networking Unsupported Software Touchpad Hyperlink Comparison Updates Save Time Security Accessory Data Security Maintenance Business Management Compliance Assessment Paperless Office Files Productivity Mobile Device Managed Service Lifestyle WIndows Server 2008 Business Intelligence App Smart Technology Users Remote Computing Identity Theft Amazon Phone System Android Work/Life Balance Edge Congratulations Scalability Electronic Medical Records Downtime Private Cloud Computing Employer-Employee Relationship Cost Management Gmail Video Games Computer WiFi Unified Threat Management Mobile Security Professional Services Testing IT solutions Consultant Proactive IT Service BDR Remote Workers Conferencing eWaste Software Analysis Payroll Virtual Assistant Content Filtering Device Security Data Breach Travel User Tips Break/Fix Business Owner Analytics Encryption IT budget Benefits Settings HaaS Document Management IoT Information Machine Learning Wi-Fi Ransomware Solid State Drive Admin Upgrade Cloud Hosted Solutions Proactive IT Content Filter Collaboration Relocation Applications Patch Management Hardware Worker Commute Tip of the Week Emergency Medical IT NFL Software as a Service Touchscreen Colocation Screen Mirroring Chrome Black Market Holiday Windows 10 Saving Time Thank You Dark Web CrashOverride Office IT Solutions Fraud Experience IT Support Smartphone Regulation Training Apple Access Control Battery Politics Advertising BYOD VPN Security Cameras Windows 10s Managed IT Services Devices Audiobook Specifications Computing Infrastructure Recovery Word Facebook Communication Reputation Google Drive