SHARE
Facebook X Pinterest WhatsApp

Data Privacy Day Should Be Every Day

Survey Highlights Serious Security and Compliance Problems Data Privacy Day was earlier this week. I can’t think of a time when data privacy was more discussed among businesses and individuals than right now, and yet, this day to focus on privacy went largely unnoticed. At least, I had no idea it was coming until a […]

Written By
SP
Sue Poremba
Jan 30, 2014
Slide Show

Survey Highlights Serious Security and Compliance Problems

Data Privacy Day was earlier this week. I can’t think of a time when data privacy was more discussed among businesses and individuals than right now, and yet, this day to focus on privacy went largely unnoticed. At least, I had no idea it was coming until a couple of people alerted me. Now I know it falls every January 28.

Of course, data privacy isn’t something we should be thinking about only one day a year. Nor should data privacy be seen only in relation to NSA spying and Edward Snowden. It is something that should be practiced regularly and improved upon whenever possible in order to keep information from getting into the wrong hands (and I don’t mean the government).

As Guidance Software’s Anthony Di Bello pointed out in a blog post, data privacy and security needs to be used everywhere for it to be effective. The best practices used at work should extend to home. The trick is making sure employees understand why instituting best practices for privacy is so important. Di Bello provided an example from a chief information security officer (CISO) with whom he works, and I think this advice should be shared:

This CISO knows that a single, annual 30-minute webinar on security awareness training will not be enough to establish best-practices data handling for the employees of this global company and the many third parties who are part of their information ecosystem. To interest employees in improving corporate data security, his team focuses a variety of courses year-round on the individual employee’s personal data privacy and security. People are naturally more invested in topics that improve their personal lives, and have found that that employees trained to appreciate data security will apply those same security principles when working with corporate and customer data at work.

Computer users should be encouraged to think about privacy choices the next time they create a new online profile, or load an app on a phone, or sign up for a frequent shopper card at their favorite retail establishment, Chester Wisniewski, senior security advisor at Sophos, told me in an email, adding:

And with the big data movement hell bent on collecting as much information about us whenever possible, apparently innocuous or unimportant details can be pieced together in new and surprising ways.

Wisniewski provided three very easy ways to protect user privacy. These steps encourage employees to not only protect their own data, but company information as well:

  1. Turn off geolocation, and leave it off. Geolocation data has been silently hoovered up and sent home by phone software as diverse as flashlights and mobile apps for kids.
  2. Turn off Wi-Fi. Turn it on when you need it. As Wi-Fi searches for networks to join, your phone will offer up the names of Wi-Fi networks you’ve used previously. Many Wi-Fi networks are named after the places where they’re located, so that your phone’s electronic greeting can read like a history of where you’ve been. Alongside the networks it’s joined, your phone will also broadcast its MAC address almost constantly. Commercial organizations have begun to show serious interest in that little unique ID because it can be used just like a cookie to track and profile your movement in the real world, according to Wisniewski.
  3. Log out when you have finished. Everything you’ve used but haven’t logged out of is an open back door that leaves your privacy at the mercy of click jacking attempts, cross-site referral forgery attacks, social media tracking beacons and people just sitting at your keyboard when you’re not there.
SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.