Risk is the chance that a threat will exploit the vulnerability of an information asset and thus harm an organization. Thus, managing risks is essential to manage information security efficiently and responsibly.
These data, being private, can become susceptible, not having proper management of them can bring great risks such as identity theft, theft, fraud, among other crimes.
Vulnerabilities that affect information security
- Lack of security controls or weaknesses in these controls.
- Outdated systems and applications.
- Complicated user interface.
- Unchanged default passwords.
- Deletion of storage media without previously deleting data.
Tips to take care of your digital privacy on the Internet
- Check the privacy settings on your networks.
- Do not use public storage for private information.
- Avoid tracking.
- Use messaging apps with end-to-end encryption.
- Disable lock screen notifications.
Robbery: If they get your location and know your routine, you may be a victim of robbery. Identity theft: with all the information and personal images that you give on social networks, anyone who wants to can impersonate you.
DATA WE SHOULD NOT SHARE
Our Number or a photo of the document-, the driver's license, an employment contract or bank details are very sensitive data.
If we reveal any of them, we expose ourselves, for example, to identity theft and the fraudulent use of our data.