How To Transmit Sensitive Information Over The Internet

Featured Editorial

We exchange confidential data with different recipients almost daily. In this article, you'll find simple and efficient tips on how to protect the private information that you share online.   By David Fisher

Almost daily, we need to share our confidential data online. We provide internet shops with our bank card numbers, we insert our passport data when buying insurance, we send to our closest friends photos and videos that should never appear in the public eye. If a person with malicious intentions gets hold of this information, we might lose our funds, jobs, reputation, and social connections.

Fortunately, it's quite easy to prevent such thefts even if you are not a geek.

Avoid typos

When you put down someone's email address or phone number, make sure that you make no mistakes. If possible, send a text to this person immediately to check if they receive it. Next time you'll try to send something to them, don't type their numbers or addresses manually but tap the name of the contact in your address book instead.

Use passwords wisely

If you send confidential data over a file sharing service, some of them will suggest you should protect it with a password. It's a wise idea — but only as long as you send the password separately from the link to the files. For instance, you can send the link via email and the password via Whatsapp. Otherwise, if a third party intercepts your message deliberately or by mistake, they will be able to insert the password just as smoothly as the target recipient.

Apply encryption

Feel free to choose among the diverse services that allow you to safely encrypt your data. For instance, File Camouflage encrypts your files and hides them within an image. If a third-party checks your inbox or that of your recipient, they won't notice any important files attached to the messages — just a casual picture. Another popular option is Sendinc that allows you to encrypt the message plus set time for its auto-destruction within the range of 1 to 365 days.

Install a secure browser

SRWare browser is based on Chromium but offers an advanced level of protection. The same can be said about Dell KACE based on Firefox. If you prefer to stick to your old browser, consider installing Lastpass add-on on it. It allows you to safely share secure notes and passwords with other Lastpass users, which comes especially handy when we need to share our financial credentials or passport scans. But again, please make sure in advance that you are sending the information to the right person, using the correct contact data.

Never share sensitive content via public networks

No matter how tempting it might seem to use the free wi-fi in a cafe, airport, shop, or another public space, such networks are in most cases not WEP or WPA encrypted. This means a third party can easily intercept your data. Instead of connecting to such a network, you should use your smartphone hotspot and enable a VPN.

Use only HTTPS sites

Unlike their HTTP counterparts, they encrypt all the information. Even if someone intercepts this data, they won't be able to decrypt it and make use of it. You can easily identify HTTPS sites by a padlock symbol that is located in their address bar.

Install and enable an antivirus

It will let you know if someone tries to hack you, if you're trying to enter a suspicious website, or if exchanging sensitive data via a particular channel might be hazardous. Modern antiviruses like MacKeeper app deal not only with viruses but with all sorts of threats and malicious programs. They identify a menace long before it attacks your device and efficiently ward it off, preventing financial losses and identity thefts.

Invent intricate passwords and regularly change them

An ideal password should contain a minimum of 16 characters, including small and capital letters, numbers, and special symbols. This combination should have no meaning and no connections to your real life or personality — that is, never use your pet's birth date or the name of your favorite band as your password. Never install the same password for two or more services. Download a password manager to safely store your account data for diverse services.

Review privacy policies and permissions

Social networks and other platforms allow users to fine-tune their settings and control which information about you becomes available to the public eye. Configure the settings for each network separately — for instance, allow other Facebook users to tag you on photos only with your permission or make your Instagram profile private.

Update your software to the latest versions

You should regularly update your operating system, apps, and programs. Even when you enable the auto-update option, some programs might automatically introduce only minor updates and wait for your manual permission for the major ones. Updates are essential because they improve the quality of the services. Also, they eliminate the vulnerabilities of the older versions that were prone to hacking attacks.

Protect your digital identity and prove it with a digital signature

In the real world, people are identified with the help of passports and IDs. In online space, we have virtual identities that are shaped by our age, gender, geographical location, the devices that we use to go online, and other factors. In case someone steals our digital identity, they might get access to our confidential information. Moreover, they will be able to send messages and requests to our contacts asking them to share their private information. If you want to convince the recipient that it was you who sent a message or a file, you can use a digital signature based on biometric data.

Conclusion

Now you know how to protect your confidential data when sharing it online and how to prevent your digital identity theft. You should remain cautious regardless of which device you use, be it a stationary computer, a tablet, a laptop, or a smartphone. When using someone else's gadget or a public network, you should become twice as prudent. You can start with downloading a password manager and an antivirus right now to take your online protection to the next level.

David Fisher is a cybersecurity enthusiast and Mac aficionado. He’s passionate about covering topics like Mac cybersecurity, Mac tips & hacks, Mac’s how-to guides. He is a contributor to Cyber Experts and Cybers Guards.  

You Might Also Read: 

Cyber Security: Take  Action:

 

« Cyber Security Companies Exposed On The Dark Web
Directors Must Understand Their Organisation’s Cyber Risks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

Spirion

Spirion

Spirion offers data discovery, classification, and protection tools for your business's privacy, security, and compliance program to avoid gaps and risks.

Cybellum

Cybellum

Cybellum provides software risk assessment for DevOps and security executives, by detecting vulnerabilities automatically, without source code.

Information Technology & Cyber ​​Security Service (STISC) - Moldova

Information Technology & Cyber ​​Security Service (STISC) - Moldova

STISC is a public institution whose purpose is to ensure the administration, maintenance and development of the information technology infrastructure in Moldova.

Repulsa

Repulsa

Repulsa provides state-of-the-art, patented, fast filtering with over 700 million malicious IP addresses and over 30 million categorized site listings updated daily.

CYSEC Academy

CYSEC Academy

CYSEC Academy offer cyber certifications, cyber assurance and cyber defense training, hands-on learning training modules, public, private and bespoke training courses.

Kingsley Napley

Kingsley Napley

Cyber crime is an area of growing legal complexity. Our team of cyber crime lawyers have vast experience of the law in this area.

CNA Insurance

CNA Insurance

CNA offers a market-leading suite of cyber liability insurance products and risk control resources for businesses of all sizes.

Barikat Cyber Security

Barikat Cyber Security

Barikat is a provider of information security solution and services including security analysis and compliance, security testing, managed security services, incident response and training.

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

VikingCloud

VikingCloud

VikingCloud (formerly Sysnet Global Solutions) offers organizations an integrated cybersecurity and compliance solution to make informed, predictive, and cost-effective risk mitigation and prevention

Cybaverse

Cybaverse

Cybaverse (formerly North Star Cyber Security) was founded to create the perfect blend of a Managed Security Service Provider (MSSP) and a Cyber Security Consultancy in one.

Chartered Institute of Information Security (CIISec)

Chartered Institute of Information Security (CIISec)

CIISec is dedicated to helping individuals and organisations develop capability and competency in cyber security.

Moonlock

Moonlock

Cybersecurity tech for humans. At Moonlock, we make software that seamlessly protects you and has your back as you live your life.

Code First Girls

Code First Girls

Code First Girls are on a mission to close the gender gap in the tech industry by providing employment through free education.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.