{"id":31184,"date":"2021-06-02T20:10:55","date_gmt":"2021-06-02T20:10:55","guid":{"rendered":"https:\/\/www.dvirc.org\/insights\/maintaining-your-online-privacy\/"},"modified":"2023-03-08T14:01:30","modified_gmt":"2023-03-08T14:01:30","slug":"maintaining-your-online-privacy","status":"publish","type":"post","link":"https:\/\/www.dvirc.org\/insights\/maintaining-your-online-privacy\/","title":{"rendered":"Maintaining Your Online Privacy"},"content":{"rendered":"

Written By: Marcus Steele<\/p>\n

It might not be the most important subject on your mind when running your business, but online privacy is becoming increasingly important as we move closer to a fully internet-connected world.<\/p>\n

What is Privacy?<\/h2>\n

Simply speaking,\u00a0privacy<\/a>\u00a0is withdrawal from company or public view.\u00a0Since at least 1890<\/a>, there has been discussion about a person\u2019s right to keep their personal matters secret. Privacy is closely related to information security, which is about protecting the confidentiality, integrity and availability of information. Privacy is more concerned with how data is collected, stored, processed and used. Guarding your online privacy can involve protecting any form of personal information such as photos, videos, drawings or documents.<\/p>\n

In most cases, you cannot maintain your online privacy without keeping your information secure. This is why it\u2019s important to consider both security and privacy to keep your business\u2019s information safe.\u00a0Getting Started with the NIST Privacy Framework\u00a0describes the relationship between security and privacy in more detail, but for simplicity, this blog will only focus on the overlapping part of the relationship.<\/p>\n

What Are Common Online Risks?<\/h2>\n

As we become more connected, the chances of personal information being leaked onto the internet increases. Data breaches, theft and information leaks often result from a lack of security on the user\u2019s end. According to the\u00a02020 Verizon Data Breach Report<\/a>, 22% of breaches in 2019 were due to simple human error \u2014 things like an email being sent to the wrong person or an employee accidentally revealing their login credentials. These risks need to be assessed when dealing with personal and sensitive information.<\/p>\n

In the business world, you have to balance the amount of information that you release to the public with advertising what your business does. Does something you\u2019re about to send out or publish on social media reveal anything that it shouldn\u2019t about the business?<\/p>\n

For example, say an intern releases a photo of himself at the entrance of your business. That seems innocuous, but if the intern\u2019s badge or your company\u2019s security system is visible, an attacker could use that information to gain unauthorized access. It\u2019s important to be aware and to carefully screen the information you release about yourself and your business.<\/p>\n

Tracking Cookies and Digital Fingerprinting<\/h2>\n

Another thing to consider is the data collected about you and your employees on the internet. Tracking cookies and digital fingerprinting track your online activity. Cookies are small files with identifiable information placed on a website to track site data, record configuration files and identify users. Digital fingerprinting is a process that tracks everything from the movement of your mouse cursor to the size of your screen.<\/p>\n

Cookies and fingerprinting can track your online movements and information, allowing criminals to more easily plan an attack. For example, if your customers are tracked on your company\u2019s website, an attacker could use that information to send targeted emails, called spear phishing, that appear to be from your business. The links in these emails to fake websites can trick people into entering their login credentials, which can be used to break into your network.<\/p>\n

Social Media Risks<\/h2>\n

Engaging with social media also presents a risk. Employees may share information about your company that you would rather keep private. For example, employees may share photos of their surroundings at work without realizing that the photo contains business-sensitive information in the background. Information leaked online can be used in a social engineering attack, where people are tricked into giving confidential information, or a physical attack like a break in. Your security protections may be excellent, but if an employee posts a picture with a password showing in the background, your security system will have little effect.<\/p>\n

Businesses that operate a social media presence or website should also be aware whether their system is tracking people through cookies or fingerprinting. Many\u00a0states have laws<\/a>\u00a0about how such information may be collected or used, and laws about when that information must be destroyed.<\/p>\n

Guard Your Privacy<\/h2>\n

Consider what information should be shared. Before sending out images or messages, consider whether they contain sensitive information including:<\/p>\n