Monday, September 9, 2019
Research Paper PII Essay Example | Topics and Well Written Essays - 1000 words
Research Paper PII - Essay Example Cyber criminals use numerous technologies in forcing entrance into personal accounts thus obtaining valuable personal information most of which have financial value. It thus becomes prudent for users to understand the technologies effectively thus employing appropriate technology and measures to curb the spread of such costly vises. In order to cushion themselves from such risks, users must ensure to keep their personal information secure in both online and offline platforms. Online platforms refer to the platforms found on the internet. People often store their personal information on the cyber space on such media as emails, social media among other types of online accounts (Fafinski, 2009). Offline platforms on the other hand refer to the use of digital technology in storing data without necessarily connecting to the internet. Such media as smart phones, computers and media players have digital storage spaces. Storing data on such platforms do not require any internet connection but the information stored therein face eminent risk of destruction and unauthorized access features that require effective management in order to prevent. Disclosing personal information online is often the main cause of such loses. This implies that users of such technologies must use the technologies cautiously. Among the scenarios that often require disclosure of such information, include online shopping, online games, online competitions and subscribing to the numerous online services. Using such services therefor3e require extreme caution. In order to prevent the loss of personal information while taking part in such important online activities, users must always investigate the authenticity of both the services and the service providers. Users must take care and engage only the legitimate companies. Engaging legitimate companies and understanding their terms and conditions are important since it becomes possible to investigate cases of loss of personal information.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.