top of page
Search

Data Privacy Day: Why we all play a cybersecurity role in protecting information

Celeste Shoot

We’re jumping on recognizing this day because it’s an important one… it’s National Data Privacy Day. 


On this day, January 28, National Data Privacy Day is a day dedicated to raising awareness about the importance of protecting personal data and safeguarding privacy. In this digital age where personal information is such a valuable commodity, Data Privacy Day serves as a reminder for us to play a cybersecurity role, whether as individuals or companies, to be more conscious of how this data is collected, used, and protected.

Playing a cybersecurity role on Data Privacy Day

The History Behind National Data Privacy Day

In 2008, National Data Privacy Day was a day that goes back to Europe’s Data Protection Day, which commemorates the signing of the Council of Europe’s Convention 108 on January 28, 1981. This treaty was the first legally binding international instrument protecting individuals’ personal data, laying the foundation for privacy laws that we see today.


In the United States, Data Privacy Day was introduced by the National Cyber Security Alliance (NCSA) and the Federal Trade Commission (FTC) as a way to encourage people to take control of their digital lives, understand the value of their personal information, and take steps to protect it.


The cybersecurity role you can play in Data Privacy

When data is left unprotected, it can be a playground for hackers on the web that are constantly trying to get this information. From phishing schemes to massive data breaches, these types of cybercriminals are constantly looking for ways to exploit vulnerable personal information.


So what can you do to make sure your personal information stays protected? Here are 10 practical steps you can take to protect your information:


  1. Privacy Setting for New Devices: If you have a new device, set up your privacy settings immediately. New applications, social media, whatever requires a login through your device, set it up!

  2. Say “no” to public Wi-Fi: Avoid using unsecured WiFi - especially for anything including transactional activities such as shopping or banking.  

  3. Be on alert for suspicious transaction activity: Double-check your bank and credit card statements. If something looks a slight bit off or is at all questionable, contact your bank immediately. It’s also always a good idea to check your credit report at least annually.

  4. Keep your software updated:  While it doesn’t seem like much, outdated software is more vulnerable to hackers...so update and restart your computer when you're prompted to.

  5. Don’t send information digitally: Never give personal information over the phone, email, or text.

  6. Online applications and questionable recruiter messages (this one especially hits home for us!): When you are applying for a job or receive a message about an opportunity, it is so important to trust your gut. If something feels off about either the kind of information you're being asked for or the type of form you are filling out seems "off", trust your instinct! While even the most reputable ATS platforms also are concerned about data privacy, try to ensure that the roles you are applying for are using these. Also, a great sign if companies are forthcoming about the email domain they use so if it's not from there, don't reply!

  7. Strong Passwords are the best: Use strong password phrases, ideally with a mixture of lower case, upper case, and special characters to make your password harder to break. Even better if you create a longer password.

  8. Remember your passwords and don’t save them (and try avoiding using the same one!): We know you have tons of applications you use daily. While it may be easier to use the same password for all of them, avoid saving them on your device, and even better if you create different passwords for each one.

  9. Enable Two-Factor Authentication (2FA): Whenever this is an option, two-factor authentication is a great way to add another layer of security. Even if someone gets hold of your password, by using 2FA, they would still need access to a second factor (like your phone or an authentication app) to gain entry to your account.

  10. Opt-Out of Data Sharing When Possible: While this sounds like a no-brainer, sometimes when you “Accept” a service's Privacy Policy, it states that they can collect and sell your data to third parties. If you notice this as part of the policy, see if you can opt-out or limit the data sharing.


The cybersecurity role companies play in Data Privacy

While protecting your own data is important, companies and organizations also have a responsibility to protect the personal information of their customers and users. Companies that collect data usually connect this type of information from web-to-lead forms to webinar registrations to critical and private information stored on their internal systems. Due to this type of information getting collected, it’s crucial to implement strict data protection measures, comply with privacy regulations (like the GDPR in Europe or CCPA in California), and be transparent about how they use and store data.]


Having teams that can help companies protect their customers’ and users’ data is not only a nice-to-have but a need-to-have in today’s digital world. Just as technology evolves, the ways to get data are also evolving. Now more than ever, companies need to prioritize data privacy practices to not only protect their customers and users but also build stronger, more trusting relationships with them.


Especially as it relates to staffing and recruiting, whether it be through external agencies or internal Talent Acquisition, ensuring best practices is crucial to protect candidate information.

Whether you're an individual or part of a broader company, be aware and take actionable steps every day that can help protect yourself and those around you. Stay informed, stay secure, and remember that your data is valuable!


Do you need help finding talent for your cybersecurity teams? Looking for a Chief Information Security Officer (CISO), Security Architect, Application Security Engineer, Cloud Security Engineer, Information security analyst, or even a Cybersecurity consultant? Here at Nimble Technology Partners, we take pride in our ability to quickly fill any of your team needs! Direct-hire or contract, our team uses their hands-on experience in the roles you’re looking to fill. Let us help find the exact talent you need by partnering with us today!

5 views0 comments

Comentários


bottom of page