Online safety and security require us at a
minimum to learn and act on Access Protection, Data Protection and
Device Protection best practices
1. Access Protection:
In order to get access to a secure
application we need prove our identity through passwords, biometrics, tokens
or other methods. This process is called authentication. Highly secure applications
require more than one type of
authentication, generally called multi-factor authentication.
Passwords are widely used for
authentication. There are many password best practices available to
prevent bad actors from getting un-authorized access to our applications.
Password Manager tools
make it easy for everyone to apply password best practices for creating
managing strong passwords. DigiCoffer recommends open source password manager
Keepass. You can
download and use Keepass instructions
Biometrics (finger prints, iris
recognition, facial recognition) is used a method of authentication finger
print scanner of a smart phone is a good example
2. Data Protection:
Personally identifiable as well as
confidential data and documents need to be protected when it is stored,
viewed on a device and when it is traveling through the networks. Further it is
essential for individuals to have
control over their data. Generally, many businesses are required to comply with privacy
regulations across the
globe. Encryption, hashing and masking are the common data protection methods.
Through Masking the data
on a device screen is masked by special characters like asterisks (***) or dots
Hashing and encryption use hash functions and encryption
algorithms to convert readable text into an
unreadable output. It is impossible to turn hash back to the original text. But
encrypted text can be converted
to original text using key (s), this process is called decryption.
3. Personal Device Protection:
Protecting personal devices from viruses,
malware and other security threats is very important. This can be
accomplished by installing commercially available security software. Keeping the
security software up to date
is essential to get protection from latest security threats.