Cybersecurity Spring-Cleaning: How To Tidy Up Your Digital Footprint To Help Avoid Data Breaches

(NAPSI)—Similar to how dust collects in the nooks and crannies of homes during the winter, many people have accumulated years of data from old devices, e-mail accounts and online profiles. All this available information creates a digital footprint that could leave them exposed to unnecessary <span class=”SpellE”>cybersecurity</span> risks.

As many people look to refresh their living spaces each spring with a deep cleaning, <span class=”SpellE”>cybersecurity</span> experts also recommend that people take the time to clean their digital presence.

“In today’s world of connected devices, we often overlook the volume of data available online. All this information creates a digital footprint that <span class=”SpellE”>cybercriminals</span> can use to hack devices and accounts,” said Dennis Bonilla, executive dean, University of Phoenix<sup>®</sup> College of Information Systems and Technology, School of Business and College of Security and Criminal Justice. “It is a good practice to periodically purge old data to help reduce that footprint and decrease the likelihood of <span class=”SpellE”>cyberattacks</span>.”

According to a University of Phoenix survey,* nearly half (43 percent) of U.S. adults have experienced a personal data breach in the past three years. As a result, 85 percent have adjusted their online habits, such as deleting suspicious e-mails (61 percent)<span class=”GramE”>,</span> avoiding <span class=”SpellE”>clickbait</span> (49 percent) and limiting personal information shared online (43 percent).

To help decrease data breaches, Bonilla suggests the following three steps to tidy up your digital footprint.

<strong style=”mso-bidi-font-weight:normal”>1. Create a secondary e-mail account<o:p></o:p></strong>

Many websites may require an e-mail address to register or access information. These sites can be hacked and allow <span class=”SpellE”>cybercriminals</span> access to login credentials that are shared with other websites. Bonilla uses a primary work e-mail but creates secondary e-mail accounts for mailing lists and profile-protected websites to help avoid spam or <span class=”SpellE”>phishing</span> attempts.

He warns not to use secondary e-mail accounts to sign up for things like social media sites or applications with companies or people who may share your information with third-party sites.

<strong style=”mso-bidi-font-weight:normal”>2. Remove unused social networks and mobile apps<o:p></o:p></strong>

Social media sites possess a wealth of personal information that can be stolen without proper security measures in place. Unused or old accounts should be deactivated and personal information should be removed.

Additionally, Bonilla encourages mobile users to delete apps they do not frequent from their <span class=”SpellE”>smartphones</span>, as these often collect and share data. Make sure to check the security settings before installing apps. If they require access to contacts, locations or other data, decide if the app is worth sharing that information.

<strong style=”mso-bidi-font-weight:normal”>3. Manage financial accounts <o:p></o:p></strong>

Similar to social media accounts, Americans should remove financial information from online vendor accounts. If you do not frequent an online retailer, Bonilla says to check out as a guest to reduce the number of websites that store your financial information.

While many companies have fraud and security settings in place, data can be at risk if a company experiences a breach. Using more-secure payment options like <span class=”SpellE”>PayPal</span> can also help keep your data secure.

These steps can help limit data breaches, but Bonilla said that Americans must be aware that any data shared online could be stolen.

“We can never truly remove content about us that is available online, nor can we fully prevent criminals from attempting to breach our data,” Bonilla said. “Consider limiting the amount of personal info you share online. The less information available, the safer you can be.”

<em style=”mso-bidi-font-style:normal”><span style=”font-size:10.0pt”>*This poll was conducted from May 25−30, 2017, among a national sample of 1991 registered voters. The interviews were conducted online and the data were weighted to approximate a target sample of registered voters based on age, race/ethnicity, gender, educational attainment, and region. Results from the full survey have a margin of error of plus or minus 2 percentage points.<o:p></o:p></span></em>

<p class=”MsoNormal” style=”mso-pagination:none;mso-layout-grid-align:none; text-autospace:none”><em style=”mso-bidi-font-style:normal”><a href=”https://ctt.ec/CK2bP” target=”_blank”><span style=”color:windowtext; text-decoration:none;text-underline:none”><img border=”0″ width=”87″ height=”19″ src=”http://www.napsnet.com/articles/clicktotweet.jpeg” /></span></a> <span style=”color:#0099CC”>”<span style=”mso-bidi-font-style:italic”>”Consider limiting the amount of personal info you share online. The less information available, the safer you can be,” said Dennis Bonilla of the University of Phoenix College of Information Systems and Technology. <a href=”http://bit.ly/2FJCL6R”><span style=”mso-bidi-font-size:15.0pt;mso-bidi-font-family:Helvetica-Bold; color:#0099CC;text-decoration:none;text-underline:none”>http://bit.ly/2FJCL6R</span></a></span>”</span></em><strong><span style=”font-size:15.0pt;font-family:Helvetica-Bold;mso-bidi-font-family:Helvetica-Bold; color:#343434″><o:p></o:p></span></strong>

On the Net:<a href=”http://www.napsnet.com”>North American Precis Syndicate, Inc.(NAPSI)</a>

Free News Delivery by Email

Would you like to have the day's news stories delivered right to your inbox every evening? Enter your email below to start!

Leave a Reply

Your email address will not be published. Required fields are marked *

For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

I agree to these terms.

This site uses Akismet to reduce spam. Learn how your comment data is processed.