Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

7 Tips to Take Control of Your PII

7 Tips to Take Control of Your PII

It is remarkable how much trust people have in Internet-based companies. Not just that they will fulfill the expectations placed on them, but that people routinely provide extremely sensitive information to these companies without thinking for a second about what they do with it. We will take a look at data collection practices, what Internet companies want with that data, and how millions of people every year become victims because they entrust their PII (Personally Identifiable Information) to corporations that promptly lose it.

Your Average Website
Say you go to a company’s website and are interested in learning more about a service. You fill out an Internet form with your name, and often your address, your email address, and your phone number. When you hit submit on the form, you have entrusted a business with your personally identifiable information; and, most of these companies don’t just use it to reach out to you about the product or service you were interested in.

This information is valuable
The information you provide is bundled with the countless other people’s PII and sold to marketing agencies for sound profits. The company that you provided that information to looks at it as their right, as you have willingly provided it. But what happens if that company gets hacked? All of the information you’ve provided to that company is now publicly available to whomever wants to purchase it. So, who is responsible? Bad news, in most places in the U.S. there is absolutely no recourse for the consumer if presented with this situation. It’s not like they can turn back time.

It isn’t only willing participation that strips you of your data, either. Almost everything you do on the Internet--whether it be messaging, streaming media, shopping, or simply surfing the web--leaves a data trail right back to you. This goes for everyone. When each person that uses the Internet has a trail, and on that trail is all of their most personal information, it stands to reason that there would be people on the other side of this attempting to circumvent that data stream into their possession because they know they can profit from it. Data shapes the story of an individual online. A person that knows where to look can find out about people’s most intimate relationships, their financial situation, their political beliefs, just about anything they want to know. That is why it is important to have an idea about how to protect yourself online.

Protection
The first thing you have to understand about data protection is simple: you have value. Your name has value, your address and phone number have value, hell, your sexual preference and your favorite food has value. Everything about you has some kind of value to everyone looking to get their hands on it. But all that data has the most value to you. It may not seem like it, but nearly every company that deals in PII, while not clamoring to pay users for their data, do spend a lot of capital getting that information. Think about all the sales that got you to buy something. Think about all the discounts offered to get you to fill out that form. Think about the investment in website-connected software.

Knowing the value of your data should be the first sign that you need to protect it. That’s why we’ve put together these seven tips to help you protect your PII:

  • Make up creative security questions - Many accounts will want you to come up with a security question that only you would know the answer to. Unfortunately, people tend to use situations that other people could guess. You have to understand that hackers are sometimes fantastically crafty and outwitting them takes some consideration. By picking a question and answer that can’t be researched, you and you alone will have outside access to your accounts.
  • Read Apps Terms of Service - We know, we know, this suggestion is one of pure tedium. You don’t have to know every word of the Terms of Service agreements you agree to, but you should know what kind of data collection policy the app or service has before agreeing to give them access to your data.
  • Watch out for Phishing Scams - Knowing how to decipher when you are getting scammed is important. A phishing scam can come over social media, instant messaging, or most frequently, email. If you get an email from an organization that typically won’t send you an email for that purpose, you should confirm the legitimacy before you click on anything.
  • Monitor your financial activity - Today there are several services dedicated to helping people manage their finances more effectively. Finding one that you trust and provides you access to credit reports is very useful.
  • Use strong passwords - Passwords that are over twelve characters and feature symbols, numbers, and a mix of upper and lowercase letters are the most effective.
  • Don’t connect to public Wi-Fi (if you can help it) - We know that it is tempting to not use your data up, but you are opening yourself up to a lot of uncomfortable problems by accepting the user agreement on any publicly available Wi-Fi connection.
  • Be cautious when completing online forms - Is the webpage secure? Is their contact information readily available; address, phone? Are the questions they are asking relevant to what you're signing up for? What is their privacy policy? Take a moment and do your research before you submit.

If you would like more advice about keeping your PII safe, return to our blog regularly, or contact the IT professionals at FRS Pros at 561-795-2000 today.

How Automation Rejuvenates Productivity
Tip of the Week: New Password Recommendations by N...
 

Comments 4

Jaycie man on Sunday, 20 January 2019 08:33

I’m curious to find out what blog platform you have been utilizing? I’m having some small security problems with my latest site and I’d like to find something more risk-free. Do you have any suggestions? gestion de propiedades

I’m curious to find out what blog platform you have been utilizing? I’m having some small security problems with my latest site and I’d like to find something more risk-free. Do you have any suggestions? [url=http://fuerte-assist.com]gestion de propiedades[/url]
Jaycie man on Tuesday, 22 January 2019 06:08

It’s actually a cool and helpful piece of information. I’m happy that you just shared this useful information with us. Please keep us informed like this. Thank you for sharing. Murcia

It’s actually a cool and helpful piece of information. I’m happy that you just shared this useful information with us. Please keep us informed like this. Thank you for sharing. [url=https://www.azull.be]Murcia[/url]
Jaycie man on Friday, 01 February 2019 06:44

dj equipments that are built by Sennheiser are the best in my opinion, we always use them when we have a gig, 사설토토

dj equipments that are built by Sennheiser are the best in my opinion, we always use them when we have a gig, [url=https://www.totojikim.com]사설토토[/url]
Jaycie man on Saturday, 09 February 2019 13:33

Bless you for this specific tips I was basically researching all Google in order to find it! MST wheels for sale

Bless you for this specific tips I was basically researching all Google in order to find it! [url=https://www.aspiremotoring.com/collections/mst-wheels-performance-alloys]MST wheels for sale[/url]
Already Registered? Login Here
Guest
Wednesday, February 20 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Computing Google Cloud Business Management User Tips Productivity Tech Term Hackers Software Hardware Microsoft Data Backup Computer Malware Mobile Devices Cybersecurity Browser Efficiency Smartphone Hosted Solutions Windows Windows 10 Office 365 IT Services Data Recovery Data Security Internet of Things Android Innovation Cybercrime Data Email Upgrade Smartphones Apps Outsourced IT Backup Business Continuity VoIP Operating System IT Support Small Business Communications Money Saving Money Business Mobile Device Management Vulnerability Alert Disaster Recovery Server Law Enforcement Ransomware Phishing Microsoft Office Chrome Spam Virtualization Managed IT Services Passwords IT Support Miscellaneous Collaboration Network Workplace Tips Users Best Practice Employer-Employee Relationship Applications Google Drive Managed IT Networking Managed IT Services Unsupported Software Windows 10 Holiday Communication App Artificial Intelligence Cloud Computing Computers Information Technology Information Bring Your Own Device Social Media Telephone Systems OneNote Blockchain Tech Support Two-factor Authentication Gadgets Facebook Router Automation Managed Service Provider Encryption Hosted Solution IT Management Safety Avoiding Downtime Business Technology Mobility Cost Management Cortana Search Hacking Augmented Reality WannaCry Gmail Word Commerce Save Money Risk Management Patch Management Wireless Charging Google Docs Project Management Devices Government Proactive IT SaaS Budget Wi-Fi Update Data Breach Managed Service Wireless Technology Robot Access Control Politics Data Management Shortcut Touchscreen Data Storage The Internet of Things Travel Mobile Security WiFi Excel Mobile Device Productivity BDR VPN iPhone Sports Fraud Google Assistant Audit Data Protection Evernote Health Password Application User Error Quick Tips Antivirus Retail Websites Amazon Settings Downtime Computer Fan NFL eWaste Data Privacy Windows 7 Wireless Upgrades Hard Disk Drive Uninterrupted Power Supply Identities Gamification Keyboard Shortcuts Charger Laptop Software as a Service Data Loss Ciminal Transportation Accessory Marketing BYOD Conferencing Data Theft Virtual Assistant E-Commerce Hacker Device Security Hard Drive Private Cloud Display Memory Human Resources IT Solutions Adobe Emergency Workers Testing Legislation Language DDoS Touchpad Bandwidth Files Point of Sale Going Green Computer Forensics Social Peripheral Webinar Recovery Entertainment Gifts Computing Alexa for Business Payment Cards Disaster Windows Ink Chromebook Co-Managed Services Consultant Financial Payroll Licensing Updates Camera Remote Monitoring Comparison Identity Theft Outlook Humor Microsoft Excel IT budget Management IT solutions Administrator Credit Cards App store Employee Google Maps Spyware Printing Telephone Security Cameras iOS WIndows Server 2008 Lithium-ion battery Microsoft Word Projects Personal Information Streaming Media Specifications Vendor Management Virus HBO Vendor File Sharing Scam PowerPoint Admin Windows 10s Access Computer Care Nanotechnology Apple Reputation Hyperlink Screen Mirroring Sales Samsung Proactive Data storage Hybrid Cloud Machine Learning Tablets Maintenance Identity History Unified Threat Management Chromecast Solid State Drive Telephony Sync Employee-Employer Relationship Meetings Storage Social Engineering Remote Computing Wireless Internet Saving Time Internet Exlporer Legal FAQ Root Cause Analysis Edge Value Wasting Time Emails Cast Save Time Computer Accessories Flexibility Music Office tips Battery Smart Technology Twitter Advertising Instant Messaging Cache Scalability Analytics Training Monitors Keyboard End of Support Black Market Cleaning HaaS Big Data Television CrashOverride Automobile Office Relocation Company Culture Managing Stress USB Worker Thank You How To Books es Video Games Experience Compliance PDF Education Hiring/Firing Virtual Reality Printers Mobile Computing Work/Life Balance Congratulations Current Events Electronic Medical Records Crowdsourcing Employer Employee Relationship Phone System Regulation Text Messaging Benefits