How To Transmit Sensitive Information Over The Internet

Featured Editorial

We exchange confidential data with different recipients almost daily. In this article, you'll find simple and efficient tips on how to protect the private information that you share online.   By David Fisher

Almost daily, we need to share our confidential data online. We provide internet shops with our bank card numbers, we insert our passport data when buying insurance, we send to our closest friends photos and videos that should never appear in the public eye. If a person with malicious intentions gets hold of this information, we might lose our funds, jobs, reputation, and social connections.

Fortunately, it's quite easy to prevent such thefts even if you are not a geek.

Avoid typos

When you put down someone's email address or phone number, make sure that you make no mistakes. If possible, send a text to this person immediately to check if they receive it. Next time you'll try to send something to them, don't type their numbers or addresses manually but tap the name of the contact in your address book instead.

Use passwords wisely

If you send confidential data over a file sharing service, some of them will suggest you should protect it with a password. It's a wise idea — but only as long as you send the password separately from the link to the files. For instance, you can send the link via email and the password via Whatsapp. Otherwise, if a third party intercepts your message deliberately or by mistake, they will be able to insert the password just as smoothly as the target recipient.

Apply encryption

Feel free to choose among the diverse services that allow you to safely encrypt your data. For instance, File Camouflage encrypts your files and hides them within an image. If a third-party checks your inbox or that of your recipient, they won't notice any important files attached to the messages — just a casual picture. Another popular option is Sendinc that allows you to encrypt the message plus set time for its auto-destruction within the range of 1 to 365 days.

Install a secure browser

SRWare browser is based on Chromium but offers an advanced level of protection. The same can be said about Dell KACE based on Firefox. If you prefer to stick to your old browser, consider installing Lastpass add-on on it. It allows you to safely share secure notes and passwords with other Lastpass users, which comes especially handy when we need to share our financial credentials or passport scans. But again, please make sure in advance that you are sending the information to the right person, using the correct contact data.

Never share sensitive content via public networks

No matter how tempting it might seem to use the free wi-fi in a cafe, airport, shop, or another public space, such networks are in most cases not WEP or WPA encrypted. This means a third party can easily intercept your data. Instead of connecting to such a network, you should use your smartphone hotspot and enable a VPN.

Use only HTTPS sites

Unlike their HTTP counterparts, they encrypt all the information. Even if someone intercepts this data, they won't be able to decrypt it and make use of it. You can easily identify HTTPS sites by a padlock symbol that is located in their address bar.

Install and enable an antivirus

It will let you know if someone tries to hack you, if you're trying to enter a suspicious website, or if exchanging sensitive data via a particular channel might be hazardous. Modern antiviruses like MacKeeper app deal not only with viruses but with all sorts of threats and malicious programs. They identify a menace long before it attacks your device and efficiently ward it off, preventing financial losses and identity thefts.

Invent intricate passwords and regularly change them

An ideal password should contain a minimum of 16 characters, including small and capital letters, numbers, and special symbols. This combination should have no meaning and no connections to your real life or personality — that is, never use your pet's birth date or the name of your favorite band as your password. Never install the same password for two or more services. Download a password manager to safely store your account data for diverse services.

Review privacy policies and permissions

Social networks and other platforms allow users to fine-tune their settings and control which information about you becomes available to the public eye. Configure the settings for each network separately — for instance, allow other Facebook users to tag you on photos only with your permission or make your Instagram profile private.

Update your software to the latest versions

You should regularly update your operating system, apps, and programs. Even when you enable the auto-update option, some programs might automatically introduce only minor updates and wait for your manual permission for the major ones. Updates are essential because they improve the quality of the services. Also, they eliminate the vulnerabilities of the older versions that were prone to hacking attacks.

Protect your digital identity and prove it with a digital signature

In the real world, people are identified with the help of passports and IDs. In online space, we have virtual identities that are shaped by our age, gender, geographical location, the devices that we use to go online, and other factors. In case someone steals our digital identity, they might get access to our confidential information. Moreover, they will be able to send messages and requests to our contacts asking them to share their private information. If you want to convince the recipient that it was you who sent a message or a file, you can use a digital signature based on biometric data.

Conclusion

Now you know how to protect your confidential data when sharing it online and how to prevent your digital identity theft. You should remain cautious regardless of which device you use, be it a stationary computer, a tablet, a laptop, or a smartphone. When using someone else's gadget or a public network, you should become twice as prudent. You can start with downloading a password manager and an antivirus right now to take your online protection to the next level.

David Fisher is a cybersecurity enthusiast and Mac aficionado. He’s passionate about covering topics like Mac cybersecurity, Mac tips & hacks, Mac’s how-to guides. He is a contributor to Cyber Experts and Cybers Guards.  

You Might Also Read: 

Cyber Security: Take  Action:

 

« Cyber Security Companies Exposed On The Dark Web
Directors Must Understand Their Organisation’s Cyber Risks »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

REVI-IT

REVI-IT

REVI-IT is a Danish state-owned audit firm focusing on enterprise IT business processes and compliance,

bwtech@UMBC

bwtech@UMBC

The bwtech@UMBC Cyber Incubator is an innovative business incubation program that delivers business and technical support to start-up and early-stage cybersecurity/IT products and services companies.

Bowbridge

Bowbridge

Bowbridge provides anti-virus and application security solutions for SAP systems.

LSoft Technologies

LSoft Technologies

LSoft Technologies is a leader in data recovery software technologies.

New Enterprise Associates (NEA)

New Enterprise Associates (NEA)

As one of the world’s largest and most active venture capital firms, NEA has developed deep domain expertise and insight into our industries of focus - technology and healthcare.

Global Incubator Network Austria (GIN Austria)

Global Incubator Network Austria (GIN Austria)

GIN Austria is the connecting link between Austrian and international startups, investors, incubators and accelerators with a focus on selected hotspots in Asia.

Netizen

Netizen

Netizen is an award-winning company that develops and leverages innovative solutions to enable a more secure cyberspace for clients in government and commercial markets.

N-able

N-able

N-Able deliver simple and sophisticated monitoring, security, and business solutions that empower you to solve your toughest IT challenges.

risk3sixty

risk3sixty

Risk3sixty are information and cyber risk management craftsmen helping build business-first security and compliance programs.

Yarix

Yarix

Yarix is the leading company in Var Group’s Digital Security division and one of the most recognised, innovative and authoritative Italian companies in the IT security sector.

HTX (Home Team Science & Technology Agency)

HTX (Home Team Science & Technology Agency)

HTX brings together science and engineering capabilities to transform the homeland security landscape and keep Singapore safe.

Resmo

Resmo

Resmo is an all in one platform for SaaS app and access management for modern IT teams.

IndoSec

IndoSec

IndoSec is an annual cybersecurity summit that powers an in-person gathering of cybersecurity leaders from Indonesia’s major corporations, leading businesses and key government entities.

SecureCyber

SecureCyber

Secure Cyber Defense offers industry-leading technology and managed detection and response solutions.

Shepherd

Shepherd

Shepherd's mission is to empower IT teams with solutions that simplify endpoint management, enhance security, and adapt to the evolving complexities of modern work environments.

Koop

Koop

Koop’s trust management platform helps navigate the complexities of regulatory compliance, security reviews, and liability insurance in a single place.