We live in an age where at all times, most of us are within feet of some sort of smart device. Whether it’s a smartphone using GPS to track our location or a smartwatch tracking our movement and providing real time health information, most of us live in a constant state of information gathering and monitoring. Even our TVs are using algorithms to suggest the next best movie or series and our Kindles suggesting what novels we’ll enjoy next. Traffic cameras are monitoring real time movement, photographing license plates and intersections, and storing information in the cloud. Websites use cookies and tracking features to show you an ad for something you mentioned weeks ago…or maybe you didn’t mention it at all and only thought it might be something you need? Whatever the case, if you’re using modern technology, your personal information, habits, schedule, and lifestyle are all being tracked, monitored, and stored for future use.
It’s no wonder that cyber attacks have grown exponentially, targeting financial institutions, government agencies, and medical databases. Large-scale breeches leave thousands, if not millions vulnerable to identity theft, monetary theft, and exposure of protected private information. There are numerous safeguards that have been implemented to avoid these types of vulnerabilities and potentially safeguard your information.
There are numerous ways to protect your information from malicious use and these are just some examples. Educate yourself, your family, your coworkers, and employees on the risks associated with improper or lax cyber protections and keep personal information safe and secure. With so much at risk, it’s up to us to keep our information safe and make access as difficult as possible for potential attackers. For more information on protecting your personal information, visit https://www.CISA.gov. If you would like information on cybersecurity grant opportunities, please visit the Department of Homeland Security’s website.