Privacy is now in danger of no longer being considered an intrinsic right as long as surveillance becomes common in our daily lives. In such surveillance generation, privacy is a luxury of the few, other than the right of the many. As vendors may have ever-changing surveillance rules, we cannot ensure our privacy and personal security relating to everything from web browsing to mobile devices and IoT products installed around us are intact. Therefore, we must take some measures to safeguard our personal privacy. In order to protect privacy, data management is the most important part. In each area relating to privacy and security, there are different collections can be broken down.
Personally Identifiable Information
PII includes name, physical home address, email address, telephone numbers, date of birth, marital status, Social Security numbers/National Insurance numbers, and other information relating to your medical status, employment, and education. Once this information is lost in data breaches or got stolen by criminals, identity theft and unauthorized loans under your name can be conducted.
Browsing Habits & Website Visits
Internet activity is monitored by an Internet Service Provider (ISP), and the web pages you visit can also be tracked by cookies. Both ISP and cookies can be hijacked by criminals and leak the personalize internet experiences stored n Cookies. Furthermore, such tracking can show when the unique identifiers added to a cookie are then used across different services and on various marketing platforms.
Message & Email Content
Email and message are the pathways for us to communicate with our friends, families, clients, and colleagues. As we link to these pathways with valuable accounts, the record of our communications is attractive to criminals. Once our accounts act as a singular hub for other services, a single compromise can snowball into the hijack of many accounts and services.
Online Purchases & Financial Information
Online purchases involve information like credentials for financial services such as PayPal, or credit card information including card numbers, expiry dates, and security codes.
Thus, phishing and fraudulent websites can be efficient tools for criminals to conduct Man-in-the-Middle attacks and card-skimming malware. With this stolen information, unauthorized transactions can be made.