Confidentiality of Information and How to Protect It – Cyber Safety #6

Confidentiality of Information and How to Protect It

Heelo Guys, In this part 6 of Cyber safety series we will know about confidentiality of Information and How to Protect It.


The information which cannot be shared with others due to security concerns is known as confidential information.
Information such as bank account statements, credit card numbers,business documents,identity proofs, etc. are very
Important and personal. Protecting this information from unauthorized access comprises a major part of confidentiality
of information as leaking of this information can cause financial loss, identity loss of privacy loss. Confidentiality of information ensures that only authorized users can access the sensitive data.


The best practices used to protect the confidential information, which will help you to safeguard your information include:

1.Build strong passwords

It is important to create strong passwords for all your online accounts. A strong password:

  • Should contain both uppercase and lowercase characters, as well as digits and punctuation.
  • Should be at least eight characters long.
  • Should not be a word in any language, slang, dialect, or jargon.
  • Should not be based on personal information, names of family members, and so on.
  • Should be hard to guess but easy to remember

2.Use multifactor authentication

A user ID and strong password alone are not sufficient to secure web accounts Multifactor authentication is one of the simplest and the most effective ways to secure data, which adds an extra layer of protection.

For example, when a user enters a UserID and Password, the website sends an OTP to the user’s mobile device.

3.Be Suspicious of unsolicited email

Be aware of nuisance ads and unsolicited e-mails from unknown sources. Try not to open any attachments that are along with such messages and do not reply to such messages.

There are sites that seem to be legible but are not the original ones. These sites may ask us for our personal and confidential data. At times there are sites that send wrong messages and befool us that it originated from an organization we work with or from a companion we deal with. Always confirm to protect yourself from this situation by calling the source specifically to validate from whom it was sent. Remember, the primary motivation behind sending such mails/messages is to track your private information.

4.Be Aware of your Online Posting

One should be very careful in what one is sharing online.One should never post any personal details or one’s location online. Sometimes, people have the habit of sharing the location every now and then. This would lead to risk in location tracking and can even lead to serious mis-happenings. If possible, keep the mobile tracking or location tracking feature off. This will not allow anyone to know your current location.

5.Protect your mobile devices

Outdated software can leave your mobile devices open to security vulnerabilities. Remember, to protect our device from an external attack, keep updating the mobile software on a regular basis. This will mitigate the risk of a cyber criminal exploiting a hole in your system. Most devices simplify this process for us by offering automatic update options for apps, as well as notification systems that let us know as soon as an operating system update is available.

6.Engage in safe web browsing

Just like your phone requires updates on a regular basis, so does our web browser. An outdated browser can open up security gaps that cyber criminals may take advantage of in accessing our data. Do not open any link from unknown sources or any pop up that appears. Both could be spyware used to plant tracking cookies on our machine, which can steal our information, direct us to bogus phishing sites, and pound us with pop-ups.

7.Use safe sites to surf the internet

Always use the sites that start with ‘https:\’. The letter ‘s’ specifies that it is a safe site to be browsed. This should be taken into consideration, especially when online transactions are to be made. This helps in checking the credibility of the website.

8.Use firewall

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall may be implemented using hardware, software or a combination of both. It safeguards our computer system and data from any unauthorized external source.

9.Avoid using computers In public

Avoid using computers in public places like cyber café or labs, to access private data like e-mails or sharing the private information like credit/debit.card details. In case, you have to use the public systems, make sure that:

  • Private browsing option is used.
  • Always log out properly after the work is done.
  • Remove the account from the system after logout.
  • Never Share any personal information.
  • Never save any personal passwords on the system.
  • Delete the browsing history,

Short facts:

  1. CAPTCHA is Completely Automated Public Turing test. It is used to differentiate between Computers and Humans.
    Computers or bots are not capable of solving a captcha. CAPTCHA is mainly used as a security check to ensure, only human users log in to a system.
  2. OTP refers to One Time Password sent to the user’s device to cross check his/her authenticity.
  3. Web indexing refers to adding the web page information to search engine’s database that can be used by them to display in search results for relevant queries.
  4. The creeper virus was the first malware which was developed in 1971. To stop this malware from spreading, a program called “Reaper” was developed. Reaper was the first anti virus program.

Hope, you liked this article

Stay tuned for part 7

You Might Also Like

Leave a Reply

Your email address will not be published. Required fields are marked *