Each year, Data Privacy Day (or Data Protection Day) is honored on the 28th of January in the United States, Canada, Israel, and 47 European countries. Its purpose is to raise awareness and promote best practices for data privacy and protection in the digital age. In the weeks prior and after the anchor day, it’s good to take time to reeducate yourself on what you can do on a regular basis to help to keep your data private.
So, what’s the scope of the data in question? What best practices can help to keep it private? And what tools can you use to assist you in the tasks? We examine these questions here—and provide some tips and tools to address them.
What’s the private data in question?
When we talk about keeping your data private, you first need to remind yourself about the kind of data typically gathered about you in the course of your digital life—and where it resides:
- Identity data. This is core data about your body and mind. It includes your physical characteristics, including gender and race, as well as the biometrics that are used by various systems to track or identify you. It also includes the data that defines your knowledge or beliefs, your preferences and orientations, as well as data comprising your life history, ethnicity, location, social and professional connections, and family.
- Extra-sensitive data. This is data about your national and state identity, as well as health data, finance, and commercial transactions. It includes your social security, driver’s license (aka Real ID in the US), and passport numbers; your mental and physical health history; your savings, debit, credit, retirement, and investment cards and accounts; and all the other online accounts (and identity access data) you use to transact business, to buy and to sell.
- Where the data resides. And here’s the crux of the matter. All this data is continually at rest or in motion in many locations. It exists on home and mobile devices, in apps and in transit across networks, and in online repositories. All along the way, you need to protect the privacy of the data—when you set your devices up; when you download and install your apps; when you receive or send it in emails, messages, or via banking apps; and when you agree to store it with the hospitals, government agencies, and private companies you conduct your business with. It’s a tall order to keep track of all this, and it requires knowledge and diligence!
12 Tips to keep your data private
Best practices can become good habits along the way as you use and monitor your private data. Here are some tips to help you do so.
- Protect your IDs and passwords. Create and manage account IDs and strong passwords with a secure password manager.
- Don’t overshare on social media. Use the privacy tools on Facebook, Twitter, LinkedIn, and other social media to restrict the sharing of your personal data to only those who need to see it.
- Watch for data-stealing events or processes. These include phishing attempts in email, text or multimedia messages, in ads and on websites that ask to you enter your identity data, to click on malicious links, or to download malicious files.
- Take note of app data privacy issues! Download apps from reliable sources, pay attention to desktop and mobile app permissions for privacy policies and unwarranted data collection when you install them, and uninstall unused apps.
- Maximize the privacy settings in your accounts. Include multi-factor authentication whenever possible, to force accounts to make sure it’s really you that’s logging in.
- Protect your device privacy with anti-theft hardware and software. If your device is lost or stolen, you need to be able to lock or wipe it.
- Close accounts you no longer use. Unused accounts contain private data that can soon become unsafe when you’re no longer monitoring them.
- Keep your software and applications up to date. Updates contain security and vulnerability fixes that can keep you safe.
- Turn off network services when not in use. WiFi, Bluetooth, GPS are typically enabled all the time on most people’s mobile devices. This invites cybercriminals to connect to your device in public places. Disable the services when you’re not using them.
- Use a VPN on public WiFi. Public WiFi is unsafe when there’s no password for access—and even then, WiFi hotspots can be used by nearby hackers to steal your data. Always use a personal VPN when you’re on public WiFi.
- Do secure data backups and deletions. Back up your data on a timely basis to a secure, encrypted and password-protected external drive or cloud service to ensure you can recover accidentally deleted data or data held hostage by criminals via ransomware. Note too, that when you delete sensitive files, use a data deletion program to securely overwrite the file sectors on your disk, so they can’t be recovered.
- Install reliable security apps on all your devices. The best security apps have multiple tools you can use to help keep your data private—whether it’s at rest or in motion, in use on your PC or Mac, or on your tablet or smart phone.
Which Trend Micro apps can help?
Trend Micro Premium Security Suite provides a family of products that include strong features to help you manage your data privacy across Windows, Mac, Android, iOS, and Chromebook devices. The suite provides security for up to 10 devices, includes Premium Service for technical support, and includes the following apps and data protection features:
Trend Micro Security for Windows and Mac include the following privacy-related tools (check which platform applies):
- Trend Micro Toolbar and the Real-Time Scan. Protects you against web threats and malicious downloads.
- Privacy Scanner for Facebook, Twitter, and LinkedIn, and ensures Web browser privacy.
- Social Networking Protection. Protects you against malicious links on social networks.
- Pay Guard. This is a secure browser to protect your online financial transactions.
- Fraud Buster. Protects you from webmail scams in Gmail and Outlook.
- Folder Shield. Nowadays, cybercriminals want to both steal your data and hold it hostage in one fell swoop. This feature protects you from both.
- Data Theft Prevention. Filters out data you don’t want to inadvertently send online, to stop hackers and spyware from stealing sensitive data.
- Vault. Keeps sensitive data in a secure, password-protected vault.
- Secure Erase. Erasing files just removes their header. To fully erase the data and overwrite the sectors, use Secure Erase.
Trend Micro Mobile Security for Android and iOS share some of the same privacy tools given above, for smartphones and tablets.
- Web Guard. Blocks spying and websites containing malicious software or identity-stealing scams using a private network (VPN). Works with your preferred browser.
- SafeSurfing (iOS). A built-in secure browser, to protect you from website threats.
- Fraud Buster. Avoid scams shared through instant messages and images, which can steal your identity data.
- Social Network Privacy. Scans Facebook and Twitter privacy settings, to ensure optimal privacy. Helps automate the editing of privacy settings.
- Wi-Fi Checker. Checks the safety of your WiFi connection and notifies you of security risks.
- Pay Guard Mobile (Android). Checks finance and shopping apps for security risks.
- Lost Device Protection. Lock or wipe your lost or stolen mobile device.
- Device Access Status (iOS). Check iCloud for two-factor authentication.
- Full password management. Securely stores and manages your account IDs and passwords for all your online accounts. Change weak passwords to strong ones with the password generator. Syncs across all your PCs, Macs, Android, and iOS devices.
- Identity monitoring. Monitors your online identity data for leaks on the Dark Web. Monitors email addresses and passwords, credit card numbers, bank account numbers, and your passport number, and alerts you if they’ve been leaked, so you can take steps to remediate the problem. Available on Android and iOS
- Secure, Private VPN. Protects your data from prying eyes when connecting to unsecured WiFi hotspots with a Virtual Private Network (VPN); on PCs, Macs, Android and iOS devices.