How To Transmit Sensitive Information Over The Internet

Featured Editorial

We exchange confidential data with different recipients almost daily. In this article, you'll find simple and efficient tips on how to protect the private information that you share online.   By David Fisher

Almost daily, we need to share our confidential data online. We provide internet shops with our bank card numbers, we insert our passport data when buying insurance, we send to our closest friends photos and videos that should never appear in the public eye. If a person with malicious intentions gets hold of this information, we might lose our funds, jobs, reputation, and social connections.

Fortunately, it's quite easy to prevent such thefts even if you are not a geek.

Avoid typos

When you put down someone's email address or phone number, make sure that you make no mistakes. If possible, send a text to this person immediately to check if they receive it. Next time you'll try to send something to them, don't type their numbers or addresses manually but tap the name of the contact in your address book instead.

Use passwords wisely

If you send confidential data over a file sharing service, some of them will suggest you should protect it with a password. It's a wise idea — but only as long as you send the password separately from the link to the files. For instance, you can send the link via email and the password via Whatsapp. Otherwise, if a third party intercepts your message deliberately or by mistake, they will be able to insert the password just as smoothly as the target recipient.

Apply encryption

Feel free to choose among the diverse services that allow you to safely encrypt your data. For instance, File Camouflage encrypts your files and hides them within an image. If a third-party checks your inbox or that of your recipient, they won't notice any important files attached to the messages — just a casual picture. Another popular option is Sendinc that allows you to encrypt the message plus set time for its auto-destruction within the range of 1 to 365 days.

Install a secure browser

SRWare browser is based on Chromium but offers an advanced level of protection. The same can be said about Dell KACE based on Firefox. If you prefer to stick to your old browser, consider installing Lastpass add-on on it. It allows you to safely share secure notes and passwords with other Lastpass users, which comes especially handy when we need to share our financial credentials or passport scans. But again, please make sure in advance that you are sending the information to the right person, using the correct contact data.

Never share sensitive content via public networks

No matter how tempting it might seem to use the free wi-fi in a cafe, airport, shop, or another public space, such networks are in most cases not WEP or WPA encrypted. This means a third party can easily intercept your data. Instead of connecting to such a network, you should use your smartphone hotspot and enable a VPN.

Use only HTTPS sites

Unlike their HTTP counterparts, they encrypt all the information. Even if someone intercepts this data, they won't be able to decrypt it and make use of it. You can easily identify HTTPS sites by a padlock symbol that is located in their address bar.

Install and enable an antivirus

It will let you know if someone tries to hack you, if you're trying to enter a suspicious website, or if exchanging sensitive data via a particular channel might be hazardous. Modern antiviruses like MacKeeper app deal not only with viruses but with all sorts of threats and malicious programs. They identify a menace long before it attacks your device and efficiently ward it off, preventing financial losses and identity thefts.

Invent intricate passwords and regularly change them

An ideal password should contain a minimum of 16 characters, including small and capital letters, numbers, and special symbols. This combination should have no meaning and no connections to your real life or personality — that is, never use your pet's birth date or the name of your favorite band as your password. Never install the same password for two or more services. Download a password manager to safely store your account data for diverse services.

Review privacy policies and permissions

Social networks and other platforms allow users to fine-tune their settings and control which information about you becomes available to the public eye. Configure the settings for each network separately — for instance, allow other Facebook users to tag you on photos only with your permission or make your Instagram profile private.

Update your software to the latest versions

You should regularly update your operating system, apps, and programs. Even when you enable the auto-update option, some programs might automatically introduce only minor updates and wait for your manual permission for the major ones. Updates are essential because they improve the quality of the services. Also, they eliminate the vulnerabilities of the older versions that were prone to hacking attacks.

Protect your digital identity and prove it with a digital signature

In the real world, people are identified with the help of passports and IDs. In online space, we have virtual identities that are shaped by our age, gender, geographical location, the devices that we use to go online, and other factors. In case someone steals our digital identity, they might get access to our confidential information. Moreover, they will be able to send messages and requests to our contacts asking them to share their private information. If you want to convince the recipient that it was you who sent a message or a file, you can use a digital signature based on biometric data.

Conclusion

Now you know how to protect your confidential data when sharing it online and how to prevent your digital identity theft. You should remain cautious regardless of which device you use, be it a stationary computer, a tablet, a laptop, or a smartphone. When using someone else's gadget or a public network, you should become twice as prudent. You can start with downloading a password manager and an antivirus right now to take your online protection to the next level.

David Fisher is a cybersecurity enthusiast and Mac aficionado. He’s passionate about covering topics like Mac cybersecurity, Mac tips & hacks, Mac’s how-to guides. He is a contributor to Cyber Experts and Cybers Guards.  

You Might Also Read: 

Cyber Security: Take  Action:

 

« Cyber Security Companies Exposed On The Dark Web
Directors Must Understand Their Organisation’s Cyber Risks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Certification Europe

Certification Europe

Certification Europe (now Amtivo Ireland) is an accredited certification body which provides ISO management system certification, including ISO 27001.

TraceSecurity

TraceSecurity

TraceSecurity, a leading pioneer in cloud-based security solutions, provides IT governance, risk and compliance (GRC) management solutions.

Microsoft Security

Microsoft Security

Microsoft Security helps protect people and data against cyberthreats to give you peace of mind. Safeguard your people, data, and infrastructure.

CYBERSEC Forum

CYBERSEC Forum

CYBERSEC Forum is an annual European Public Policy Conference dedicated to strategic aspects of cybersecurity.

RunSafe Security

RunSafe Security

RunSafe Security is the pioneer of a patented cyberhardening transformation process designed to disrupt attackers and protect vulnerable embedded systems and devices.

Think Cyber Security (ThinkCyber)

Think Cyber Security (ThinkCyber)

ThinkCyber is a Tel Aviv-based Israeli company with a team of cybersecurity professionals who are experts in both information and operations technology.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

Shift Technology

Shift Technology

Shift Technology provides insurance companies with an innovative SaaS solution to improve and scale fraud detection.

Applied Science and Technology Research Institute Company Limited (ASTRI)

Applied Science and Technology Research Institute Company Limited (ASTRI)

ASTRI's mission is to enhance Hong Kong’s competitiveness in technology-based industries through applied research in areas including Security & Data Sciences which encompasses cybersecurity.

Thomsen Trampedach

Thomsen Trampedach

Thomsen Trampedach offers a tailored-made brand protection solution to each customer using a proprietary enforcement automation and reporting tool and a multilingual enforcement team.

Yellow Brand Protection

Yellow Brand Protection

Yellow Brand Protection operates 24/7 to protect brands' Intellectual Property (IP) from infringements on all kinds of online distribution channels.

Security Management Partners (SMP)

Security Management Partners (SMP)

Security Management Partners (SMP) is a trusted partner to financial services, healthcare and businesses that need to manage their information, securely.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

Quantum Squint

Quantum Squint

Quantum Squint is a cutting-edge cybersecurity company specializing in the use of advanced regression management techniques to detect, analyze, and prevent vulnerabilities in digital systems.

P3M Works

P3M Works

P3M Works delivers Cyber Security and Digital Transformation projects across both private and public sector clients.