How To Transmit Sensitive Information Over The Internet

Featured Editorial

We exchange confidential data with different recipients almost daily. In this article, you'll find simple and efficient tips on how to protect the private information that you share online.   By David Fisher

Almost daily, we need to share our confidential data online. We provide internet shops with our bank card numbers, we insert our passport data when buying insurance, we send to our closest friends photos and videos that should never appear in the public eye. If a person with malicious intentions gets hold of this information, we might lose our funds, jobs, reputation, and social connections.

Fortunately, it's quite easy to prevent such thefts even if you are not a geek.

Avoid typos

When you put down someone's email address or phone number, make sure that you make no mistakes. If possible, send a text to this person immediately to check if they receive it. Next time you'll try to send something to them, don't type their numbers or addresses manually but tap the name of the contact in your address book instead.

Use passwords wisely

If you send confidential data over a file sharing service, some of them will suggest you should protect it with a password. It's a wise idea — but only as long as you send the password separately from the link to the files. For instance, you can send the link via email and the password via Whatsapp. Otherwise, if a third party intercepts your message deliberately or by mistake, they will be able to insert the password just as smoothly as the target recipient.

Apply encryption

Feel free to choose among the diverse services that allow you to safely encrypt your data. For instance, File Camouflage encrypts your files and hides them within an image. If a third-party checks your inbox or that of your recipient, they won't notice any important files attached to the messages — just a casual picture. Another popular option is Sendinc that allows you to encrypt the message plus set time for its auto-destruction within the range of 1 to 365 days.

Install a secure browser

SRWare browser is based on Chromium but offers an advanced level of protection. The same can be said about Dell KACE based on Firefox. If you prefer to stick to your old browser, consider installing Lastpass add-on on it. It allows you to safely share secure notes and passwords with other Lastpass users, which comes especially handy when we need to share our financial credentials or passport scans. But again, please make sure in advance that you are sending the information to the right person, using the correct contact data.

Never share sensitive content via public networks

No matter how tempting it might seem to use the free wi-fi in a cafe, airport, shop, or another public space, such networks are in most cases not WEP or WPA encrypted. This means a third party can easily intercept your data. Instead of connecting to such a network, you should use your smartphone hotspot and enable a VPN.

Use only HTTPS sites

Unlike their HTTP counterparts, they encrypt all the information. Even if someone intercepts this data, they won't be able to decrypt it and make use of it. You can easily identify HTTPS sites by a padlock symbol that is located in their address bar.

Install and enable an antivirus

It will let you know if someone tries to hack you, if you're trying to enter a suspicious website, or if exchanging sensitive data via a particular channel might be hazardous. Modern antiviruses like MacKeeper app deal not only with viruses but with all sorts of threats and malicious programs. They identify a menace long before it attacks your device and efficiently ward it off, preventing financial losses and identity thefts.

Invent intricate passwords and regularly change them

An ideal password should contain a minimum of 16 characters, including small and capital letters, numbers, and special symbols. This combination should have no meaning and no connections to your real life or personality — that is, never use your pet's birth date or the name of your favorite band as your password. Never install the same password for two or more services. Download a password manager to safely store your account data for diverse services.

Review privacy policies and permissions

Social networks and other platforms allow users to fine-tune their settings and control which information about you becomes available to the public eye. Configure the settings for each network separately — for instance, allow other Facebook users to tag you on photos only with your permission or make your Instagram profile private.

Update your software to the latest versions

You should regularly update your operating system, apps, and programs. Even when you enable the auto-update option, some programs might automatically introduce only minor updates and wait for your manual permission for the major ones. Updates are essential because they improve the quality of the services. Also, they eliminate the vulnerabilities of the older versions that were prone to hacking attacks.

Protect your digital identity and prove it with a digital signature

In the real world, people are identified with the help of passports and IDs. In online space, we have virtual identities that are shaped by our age, gender, geographical location, the devices that we use to go online, and other factors. In case someone steals our digital identity, they might get access to our confidential information. Moreover, they will be able to send messages and requests to our contacts asking them to share their private information. If you want to convince the recipient that it was you who sent a message or a file, you can use a digital signature based on biometric data.

Conclusion

Now you know how to protect your confidential data when sharing it online and how to prevent your digital identity theft. You should remain cautious regardless of which device you use, be it a stationary computer, a tablet, a laptop, or a smartphone. When using someone else's gadget or a public network, you should become twice as prudent. You can start with downloading a password manager and an antivirus right now to take your online protection to the next level.

David Fisher is a cybersecurity enthusiast and Mac aficionado. He’s passionate about covering topics like Mac cybersecurity, Mac tips & hacks, Mac’s how-to guides. He is a contributor to Cyber Experts and Cybers Guards.  

You Might Also Read: 

Cyber Security: Take  Action:

 

« Cyber Security Companies Exposed On The Dark Web
Directors Must Understand Their Organisation’s Cyber Risks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Trust in Digital Life (TDL)

Trust in Digital Life (TDL)

TDL is a membership association comprising companies, SMEs, universities and research institutes who exchange experience and insights to make digital services in Europe trustworthy and safe.

Parsons

Parsons

Parsons has developed a converged security offering that combines cybersecurity, integrated network solutions, and critical infrastructure protection.

HudsonCyber

HudsonCyber

HudsonCyber, part of HudsonAnalytix, provides leading cyber risk management services for the global maritime transportation industry.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

Payatu

Payatu

Payatu Technologies is a security testing and services company specialized in Software, Application and Infrastructure security assessments and deep technical security training.

AaDya

AaDya

AaDya provide smart, simple, affordable and effective cybersecurity software solutions for small and medium businesses.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

CyberPeace Foundation

CyberPeace Foundation

CPF is a think tank of cybersecurity and policy experts with the vision of pioneering Cyber Peace Initiatives to build collective resiliency against CyberCrimes and global threats of cyber warfare.

Polygraph

Polygraph

Polygraph monitors the activities of click fraud gangs, including how they operate, who they target, the techniques they use, and how to detect their fraud.

Yotta Infrastructure Solutions

Yotta Infrastructure Solutions

Yotta Infrastructure, a Hiranandani group company, provide Datacenter Colocation and Tech Services such as Cloud services, Network & Connectivity, IT Security and IT Management services.

Resourcive

Resourcive

Resourcive is the first Value Added Sourcing “VAS” consultancy. We deliver strategic IT sourcing solutions to mid-market and enterprise clients.

Upstack

Upstack

UPSTACK - One partner, end-to-end expertise, helping develop the solutions you need – when you need them.

DESCERT

DESCERT

DESCERT offers you an extended IT, cyber security, risk advisory & compliance audit team which provides strategic guidance, engineering and audit services.

QEDIT

QEDIT

QEDIT is leading the standardization of Zero-Knowledge Proofs through the ZKProof.org Workshops, and builds production-grade ZKP systems for blockchain.

Yarix

Yarix

Yarix is the leading company in Var Group’s Digital Security division and one of the most recognised, innovative and authoritative Italian companies in the IT security sector.

Hack-X Security

Hack-X Security

Hack-X Security provide IT risk assessment and Digital Security Services. We are a trusted standard for businesses that must protect their data from cyber-attacks.