Urgent @Parents: Information security alarm has been sounded, please accept the protection strategy! | Digital Literacy

Urgent @Parents: Information security alarm has been sounded, please accept the protection strategy! | Digital Literacy

Review expert: Liu Xiangquan, Director of the Robotics Engineering Department of Beijing Information Science and Technology University

Can you get red envelopes by registering on WeChat and scanning the QR code?

“Place an order” to get cash back and receive gifts?

Can idle bank cards “make money”?

Forward the QR code to receive a gift? …

Why did you receive this information? How was your information exposed? How can you protect yourself? These questions are enough to read this article!

In this era of information explosion, personal information is like an intangible asset with extremely high value. However, the risk of information leakage is always there, bringing many hidden dangers to our lives. It has become a top priority to understand the harm of information leakage and take effective protective measures.

Copyright images in the gallery. Reprinting and using them may lead to copyright disputes.

What are the ways of information leakage?

1. Network applications and platforms

Various mobile applications and websites are common channels for information leakage. When registering an account, we often need to fill in a lot of personal information, such as name, phone number, address, etc. Some bad platforms or application developers may not properly store user data, resulting in data being hacked or illegally sold by insiders.

2. Social Networks

Social media is a platform for us to share our lives, but it can also be a source of information leakage. The photos and statuses we post inadvertently may contain personal sensitive information, such as location, work unit, etc. In addition, the friendships on social media may also be used by criminals to carry out targeted fraud.

3. Public wireless networks

Connecting to free wireless networks in public places may seem convenient, but it also carries great risks. Criminals may set up fake wireless network hotspots to steal data transmitted by users during the connection process, including account passwords, bank information, etc.

4. Waste electronic equipment

If the personal information stored in obsolete mobile phones, computers and other electronic devices is not completely cleared before disposal, it may cause information leakage once it is obtained by others.

The dangers of information leakage!

1. Property loss

The leakage of personal information may lead to bank account theft and credit card malicious overdraft, causing direct economic losses.

2. Privacy Invasion

The exposure of personal life privacy, such as home address, whereabouts, etc., brings great trouble and anxiety to life.

3. Identity theft

Criminals use stolen personal information to apply for loans and documents in other people’s names, causing victims to bear inexplicable debts and legal responsibilities.

4. Damaged credit

Information leakage may lead to the tampering of personal credit records, affecting future credit, employment, etc.

5. May violate the crime of "assisting in the act"

The crime of aiding and abetting information network crimes: that is, the crime of assisting and abetting information network criminal activities.

What measures are there to protect the security of personal information?

1. Enhance safety awareness

Increase the level of attention paid to the protection of personal information and do not provide sensitive information on unreliable platforms.

2. Set a complex password

Use complex passwords that include letters, numbers, and special characters, and change them regularly. (If parents can't remember them, they can send them to their children as a backup!)

3. Use public networks with caution

Try to avoid performing operations involving sensitive information on public wireless networks, such as logging into important accounts, making payments using Alipay or WeChat, etc.

4. Clean your electronic devices regularly

Delete files and apps you no longer use, and perform professional data sanitization on old electronic devices.

5. Pay attention to the privacy policy

Before using an app or platform, read the privacy policy carefully to understand how your personal information is used and protected. (If there is a privacy policy, be sure to read it carefully and don’t take it lightly!)

6. Enable two-factor authentication

Enable two-factor authentication for important accounts to increase account security.

Personal information security is the line of defense we must defend in the digital age. Only by being vigilant at all times and taking effective protective measures can we protect our personal information from the threat of leakage and allow us to enjoy a safe and convenient digital life. Let us act together to protect the security of personal information.

Some sources: People's Daily Science, Ping An Beijing Chaoyang, etc.

The cover and text images are copyrighted images of the gallery. Reprinting and using them may cause copyright disputes

<<:  I had a herniated lumbar disc and after doing traction, I was almost paralyzed because of this...

>>:  High temperature and thunderstorms cause flight delays, here is a summer flight attendant safety guide →

Recommend

The rise of HTML5: rejecting aloofness and niche

Shikhir Singh is currently working at Sencha as a...

SiriOS may be released soon to help Apple's smart home ecosystem

Following iOS, MacOS, watchOS and iPadOS, Apple&#...

APP operation indicators and promotion and marketing suggestions!

How to do a good job in App operation and promoti...

More than 70% of flashers prefer the pure version of the system

The mobile phone flashing market, which has exist...

This museum "reshapes life" for 20 million pieces of imperial kiln porcelain

During the Qingming Festival holiday, a total of ...

Case Analysis | 6 Strategies to Unravel the Addictive Gameplay of Pinduoduo

Did you shop on Double Eleven? Is your shopping c...

49 popular tools that new media operators must know!

Tools 1. Data Index 1. Baidu Index : a very usefu...

Is it true that crying can eliminate toxins from the body?

gossip "Shedding tears can expel toxins from...

Bidding Models in Internet Advertising - Alliance, RTB, RTA

In (Part 1 - Basic Bidding) and (Part 2 - Smart B...

Complete operation and promotion plan steps!

Operations are basically a process of constantly ...

Why is the altitude of 10 kilometers chosen for reusable rocket tests?

(Picture from the Internet) Why do everyone choos...