On the internet, there are many websites that require various permissions to be used, including the handling of personal data.
When you enroll in school, carry out a procedure at a bank or public institution, apply for a job, or make a reservation, you are often asked for your name, address, or even more sensitive personal data. But have you ever stopped to think about where your personal information is, especially that which is online? It’s likely that it’s in places you didn’t know about.
On this point, Jaquelina López Barrientos, a computer engineer and specialist in data networks and IT security from the National Autonomous University of Mexico (UNAM), stated that we share “personal data at every moment,” whether it's when applying for a credit, watching videos or movies, playing or downloading games online, making shipments, or booking a service, etc.
In this regard, the expert noted that personal data is found not only in workplaces, government bodies, or financial institutions but also in healthcare systems, mobile applications, social media, and even courier services. This demonstrates that people often share their information “indiscriminately,” which makes them vulnerable.
For example, many websites on the internet require various permissions to be used, including the use of personal data. However, users do not read these terms and accept them without knowing how their information will be managed or what access will be granted.
Places Where You Expose Your Personal Data Without Knowing It
López Barrientos pointed out that we constantly share our personal data, for example, when we post videos or photos on social media about our vacation spots, activities, meals, family, pets, or work. This includes sensitive information like our image and voice, which links us to specific locations and times.
“Conducting a search reveals information about us. Searching for domestic or international flights indicates our willingness to travel and potential spending capacity. Booking accommodation or buying tickets for events shows our preferences and interests, which can make us interesting targets and expose us to potential crimes,” warned the computer engineer.
On July 29, 2024, the UNAM specialist emphasized that voice is a unique identifier that can be recorded in phone calls. Likewise, handwriting, medical data such as X-rays or dental records are sources of personal information that, if they fall into the wrong hands, can be harmful to the data owner.
All this shows that personal information is at constant risk, as it is exposed at any time and place, whether for purchasing, selling, sharing, signing up, etc.
While Jaquelina López Barrientos warned that thanks to the internet, information is now at greater risk, this does not mean one should “fall into paranoia.” However, it is essential to be cautious and ensure that all sites we visit are secure, and avoid entering suspicious emails or links and ads that promise unrealistic benefits.
Given that technologies like social engineering allow some individuals to access users' activities, visited sites, relationships, and even favorite colors—information that can later be used to access passwords and hack accounts—it is recommended that passwords be at least 10 characters long and include a mix of letters, numbers, and special characters.
Protective Measures Against Information Exposure
To safeguard our information from being compromised, the UNAM expert recommended the following measures:
- Use Strong and Secure Passwords: Ensure passwords are complex and not easily guessable.
- Verify Website Security: Check that websites are secure before entering personal information.
- Enable Two-Factor Authentication: Add an extra layer of security to your accounts.
- Have a Good Antivirus System: Install and maintain reliable antivirus software on all browsing devices.
- Avoid Public Networks: Refrain from connecting to public Wi-Fi and disable automatic connections.
- Do Not Open Unknown Messages or Download Attachments: Be cautious with unsolicited messages and attachments.
- Disable Read Receipts: Turn off read receipts on platforms like WhatsApp to maintain privacy.
- Avoid Suspicious Calls: Do not answer calls from unknown or suspicious numbers.
- Verify the Authenticity of Requests for Money: Confirm the legitimacy of messages from acquaintances asking for money.
- Keep Operating Systems and Applications Updated: Regularly update your software to protect against vulnerabilities.
- Stay Informed About New Scams and Social Engineering Techniques: Educate yourself about the latest fraud tactics and social engineering methods.
Comments