• Technologies
    • Networking
    • Cybersecurity
    • Collaboration
    • Edge Cloud
    • Managed & Professional Services
    • SASE
  • Customer Stories
  • Insights
    • Business Continuity & Disaster Recovery (BCDR)
    • Customer Experience
    • Data-Driven Business
    • Operational Efficiency
    • Tech Trends
  • Industries
    • Financial Services
    • Gaming
    • Healthcare
    • Manufacturing
    • Media & Entertainment
    • Public Sector
    • Higher Education
    • Retail
    • Technology
  • About Lumen
    • Black Lotus Labs
    • Leadership Perspectives
    • Newsroom
    • News Spotlights
  • Technologies
    • Networking
    • Cybersecurity
    • Collaboration
    • Edge Cloud
    • Managed & Professional Services
    • SASE
  • Customer Stories
  • Insights
    • Business Continuity & Disaster Recovery (BCDR)
    • Customer Experience
    • Data-Driven Business
    • Operational Efficiency
    • Tech Trends
  • Industries
    • Financial Services
    • Gaming
    • Healthcare
    • Manufacturing
    • Media & Entertainment
    • Public Sector
    • Higher Education
    • Retail
    • Technology
  • About Lumen
    • Black Lotus Labs
    • Leadership Perspectives
    • Newsroom
    • News Spotlights

New Year’s Resolutions: Exercise, Eat Healthy… Protect Your Data

Hugo Teufel Posted On January 22, 2021
0
6.8K Views


0
Shares
  • Share On Facebook
  • Tweet It

A person’s hands using a smartphone with various icons floating above it, representing digital services

We’ve all been there. Head down, staring at our smart phone waiting for a new app to install. You quickly swipe through the terms and conditions before hitting “accept,” excited and ready to use the latest technology.

Today’s applications offer incredible convenience and benefits to the people, businesses and governments who use them. But you very likely are giving up something in return—information about you.

Your personal information is like money—it has value. By knowing your views and interests, your spending habits, and places you go, companies can provide you with a more personalized online experience and free apps.

In addition to its intrinsic value in today’s information economy, your data is also vulnerable to hackers and other bad actors. When they get their hands on our information, the result often is lost funds, damaged credit or even months spent repairing your financial and personal reputation. Worse, bad actors sometimes will publicly share sensitive, sometimes embarrassing personal information to humiliate or intimidate.

With the recent start of the new year many of us made New Year’s resolutions. January is also when the National Cyber Security Alliance recognizes Data Privacy Week to empower people to act.

So why not resolve now to better protect your personal information? It doesn’t mean you have to sacrifice convenience or new technology. It means ensuring that your information is used only in ways you feel comfortable.

Here are four simple things you can do today to better control how your personal information is collected, used and shared online:

  1. Get back to the basics. Here, I’m talking about practicing good hygiene. Just like washing your hands or brushing your teeth, you can create daily data privacy habits to prevent larger issues. Habits like using multi-factor authentication and strong passwords, installing software updates right away and properly configuring privacy settings are a great start. These offer the first and best line of defense for protecting your personal information.
  2. Update your smart phone. Be sure to install and use the most current operating system, apps and web browsers to help defend your phone and its contents against malware and other online threats. Yes, this too is hygiene but it’s important enough to call out separately.
  3. Ask why. Your information, and your dignity, have value. Before completing a form or submitting any personal information online, ask yourself, “why do they need this information?” Then you decide how much information you want to share. For example, an online form that collects personal information might not require you to fill out every single data field. Use that power and leave some fields blank. Also, pay attention to the source of the request to avoid phishing attempts.
  4. Delete when done. Deleting an unused app or account with an online platform is a good security practice. Why? Because when you download an app or join a social media platform, it usually asks for permission to access and collect information from other areas of your life, like your photos, contacts and location. Often, you can obtain a copy of your information before deleting the app or account. And did I mention that you should keep your favorite apps updated with the latest version so they remain secure?

When the infamous Willie Sutton was asked by a reporter why he robbed banks, he replied, “because that’s where the money is.” Our personal data is a new form of currency and there are new criminals who see its value. Good data privacy habits can help you control who can access your personal information. As you consider resolutions around creating good habits and dropping bad ones, don’t forget one of the biggest parts of your life—your online actions.

This content is provided for informational purposes only and may require additional research and substantiation by the end user. In addition, the information is provided “as is” without any warranty or condition of any kind, either express or implied. Use of this information is at the end user’s own risk. Lumen does not warrant that the information will meet the end user’s requirements or that the implementation or usage of this information will result in the desired outcome of the end user. All third-party company and product or service names referenced in this article are for identification purposes only and do not imply endorsement or affiliation with Lumen. This document represents Lumen products and offerings as of the date of issue.

Post Views: 6,765

Related posts:

  1. Changing security mindsets for a changing threat landscape
  2. Ismdoor Malware Continues to Make use of DNS Tunneling
  3. Hacktivist Campaign Spreads Manifesto through Router Configuration Files
  4. What is Web Application Firewall (WAF)?
0
Shares
  • Share On Facebook
  • Tweet It


Application ProtectionCyberthreatsFirewall Protection


Author

Hugo Teufel

As Vice President, Deputy General Counsel and Chief Privacy Officer at Lumen Technologies, Hugo leads the legal aspects of cybersecurity and artificial intelligence and legal and operational aspects of privacy for a global technology company that delivers network, cloud, security and communication solutions.

Trending Now
Beyond the Finish Line: How Churchill Downs Racetrack Harnesses Advanced Network Solutions for Seamless Kentucky Derby® Operations
Lumen Customer Stories Team April 23, 2025
Announcing the Lumen strategic partnership with Google Cloud: Transforming the future of cloud and network solutions
Lumen April 9, 2025
You may also like
Bridging the Cybersecurity Communication Gap Between IT Directors and Business Leaders
March 19, 2025
From Security Scares To Network Nirvana: How Micro Center Supercharged Its Cybersecurity
February 26, 2025
Empowering Digital Transformation: Part 4 – Secure Your Future With A Sound Cloud and Edge Data Protection Strategy
February 19, 2025
Flexing Corporate Data Muscles Results in Stronger, More Data-Driven Organizations
Read Next

Flexing Corporate Data Muscles Results in Stronger, More Data-Driven Organizations

  • Categories

    Adaptive Networking

    Connected Security

    Hybrid Cloud

    Communications and Collaboration

    Edge Computing

    SASE


  • Lumen is unleashing the world’s digital potential. We ignite business growth by connecting people, data, and applications – quickly, securely, and effortlessly. As the trusted network for AI, Lumen uses the scale of our network to help companies realize AI’s full potential. From metro connectivity to long-haul data transport to our edge cloud, security, managed service, and digital platform capabilities, we meet our customers’ needs today and as they build for tomorrow.

Services not available everywhere. ©2025 Lumen Technologies. All Rights Reserved.
Press enter/return to begin your search