Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cloud
    • Cloud
    • Cybersecurity
    • IT Management

    Data Privacy Day Jan. 28: Reminding Us All to Be Vigilant

    Written by

    Chris Preimesberger
    Published January 26, 2018
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Since 2008, every Jan. 28—which comes around again this Sunday—has been designed as the official “Data Privacy Day,” or “Data Privvacy Day,” as pronounced in the UK.

      Data Privacy Day (known in Europe as Data Protection Day) is an international event whose purpose is to raise awareness and promote privacy and data protection best practices. It is currently observed in the United States, Canada, India and 47 European countries. The day commemorates the Jan. 28, 1981 signing of Convention 108, the first legally binding international treaty dealing with privacy and data protection.

      Designating a day like this is a good thing, because people need to be reminded about how best to keep their online data secure at least once a year, even though they should be aware of doing this every day on the calendar. It also is a day that storage and data protection professionals should recognize as a professional national holiday (okay, maybe take the day off on Monday, Jan. 29 this year).

      As eWEEK’s Sean Michael Kerner wrote two years ago: “Data privacy isn’t just about encryption and tracking, it’s about individual users. Vigilance is key.”

      “We are glad that Data Privacy Day exists,” NordVPN Chief Marketing Officer Marty Kamden said in a media advisory. “However, Privacy Day should be every day. There are simple things that are easy to maintain every day in order to avoid major hacks, system crashes, data loss and various snoopers.”

      Here are some simple online privacy rules for each of us as internet users, as suggested by NordVPN:

      Always update the software. Software manufacturers constantly find new bugs and fix them with each new update, but users need to keep their systems up to date. Bugged software might cause data leaks, putting user’s privacy at risk.

      Be cautious about what you share on social media. Have in mind that what you post online, stays online. If you are going on vacation, it’s wiser to post vacation photos after you come back; otherwise, thieves might know your house is empty. Also, don’t share any personal details, addresses or phone numbers.

      Switch to an encrypted email provider, such as ProtonMail. ProtonMail is a free encrypted email service provider, offering end-to-end encryption, meaning even the provider itself cannot decrypt and read subscribers’ emails. No personal information is required to create accounts, and the basic account service is offered free of charge. Other secure email providers include Tutanota and Countermail.

      Use strong passwords and a password manager. Perhaps the most basic requirement for any online account setup is using strong passwords (meaning longer and more complex than “qwerty123,” etc.) and choosing different passwords for different accounts. Weak passwords make it simple for hackers to break into an account. A reliable password has a minimum of 12 characters and includes a strong mix of letters, numbers and characters. It’s not easy to remember strong passwords for each site, so it’s recommended to use a password manager, though some, such as LastPass, have also experienced security breaches. In any case, password managers are still recommended for safety and security, such as truekey.com and 1Password.

      Turn on multi-factor authentication. Multi-factor authentication is a security system that requires a user to log in with their username and password and then take the second step of authentication: either through a fingerprint scan or by sending a code via text. Most sites, including email providers, already offer multi-factor authentication as an option.

      Use a VPN. AVPN encrypts all traffic between a user’s computer and a VPN server, adding privacy and security to their Internet browsing experience. The only information visible to anyone in between the user’s computer and VPN server is the fact they are connected to VPN, and nothing else. All other information is private as it is encrypted by the VPN’s security protocol.

      Enterprise Data Protection, Privacy is a Whole Other Ballgame

      eWEEK checked with some other data privacy folks about the enterprise side of this. One of them, Rob Perry, Vice-President of Product Marketing at Naples, Fla.-based workspaces and content management solution provider ASG Technologies, was asked how can enterprises keep personal financial information completely private and still comply with the upcoming GDPR (the EU’s General Data Protection Regulation).

      A lot of companies are concerned about this because the new regulation goes into effect May 25, and its repercussions will be global.

      “It’s worth noting that GDPR doesn’t require complete privacy,” Perry said. “GDPR compliance can be demonstrated without exposing personal data by showing how processes and tooling protects private data, and by demonstrating the ability to respond to EU residents’ requests in a timely fashion.”

      What are some good tools enterprises can use to ensure users’ personal information is secure? Perry was asked.

      “Before assessing which tools are best for ensuring information security, it’s important to understand what data is under management and how it’s being used,” Perry said. “There are tools on the market (like ASG’s Data Intelligence) that can identify personal data throughout the data estate and trace how it is used. This provides a map of where to focus on securing data access.”

      Data Not in Use Also Should Be Considered

      Tools can also identify data that is no longer in use so it can be deleted, providing the ultimate security, Perry said.

      “Information management tools also can provide means to limit access to personal data. Redaction, while not as secure as full deletion, can mask personal data in content such as account statements, applications and invoices, protecting it from unauthorized users,” Perry said. “Content services (such as ASG’s Mobius) can also apply privacy policies when content is ingested into the archive, and these policies can be triggered by events such as a protected individual requesting to be forgotten. In a case like that, the policy could trigger the deletion of that data, provided there were no legitimate reasons to refuse deletion (such as outstanding balances or current open accounts).”

      Perry offered another perspective on this for eWEEK readers.

      “Automation of data governance and understanding is the key here,” Perry said. “Tracking data and compliance manually will end up being too costly. While there are certain tasks that will need to be done manually–such as training and examining applications for minimal use of data–the ongoing data understanding and knowledge of changes is best provided through automated solutions.

      “Having a solid GDPR compliance program provides a great foundation for other data compliance programs (many organizations have to deal with multiple parallel initiatives). Using the three-phased approach ‘assess, support, sustain’ guides organizations to protect personal data all while laying the foundation of data understanding and trust that provides value above and beyond simple risk-avoidance.”

      Chris Preimesberger
      Chris Preimesberger
      https://www.eweek.com/author/cpreimesberger/
      Chris J. Preimesberger is Editor Emeritus of eWEEK. In his 16 years and more than 5,000 articles at eWEEK, he distinguished himself in reporting and analysis of the business use of new-gen IT in a variety of sectors, including cloud computing, data center systems, storage, edge systems, security and others. In February 2017 and September 2018, Chris was named among the 250 most influential business journalists in the world (https://richtopia.com/inspirational-people/top-250-business-journalists/) by Richtopia, a UK research firm that used analytics to compile the ranking. He has won several national and regional awards for his work, including a 2011 Folio Award for a profile (https://www.eweek.com/cloud/marc-benioff-trend-seer-and-business-socialist/) of Salesforce founder/CEO Marc Benioff--the only time he has entered the competition. Previously, Chris was a founding editor of both IT Manager's Journal and DevX.com and was managing editor of Software Development magazine. He has been a stringer for the Associated Press since 1983 and resides in Silicon Valley.
      Linkedin Twitter

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.