Mirror Mirror on the Wall, who is the Least Protected of them All?

Updated: Jun 18

There was a time where blackberry and apple were just fruits in a supermarket.

It’s true. The Internet has blurred the lines between the real world and the virtual one. People are spending more time online everyday. I mean, the first thing we see when we wake up is our phone, and the last thing we see before we sleep is our phone! (Don’t tell me that’s not true)

However, just as the digital world is becoming more important, it’s also becoming a bigger target for attacks. Yet, safeguarding our digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security.

The most important thing we should all safeguard is our personal data.

Personal data is anything that can be linked to you as an individual. It includes things like our name, address, date of birth, email address, NRIC or passport number, bank or credit card details, location and biometric data. Of course, this list is by no means exhaustive.

So let’s be clear on one thing: There is no privacy on the Internet.

There could always be someone watching where you go and what you do online. And if you think you don’t have anything to hide or are not important enough to be spied on, well let me tell you that you are wrong! In fact, whether you are a student, businessman or a celebrity, it honestly doesn’t matter who you are.

The base line is this: Once you open your web browser, you are putting your private information at risk of being exposed, or even worse, hacked.

And with hackers getting smarter and surveillance growing stronger, all Internet users should know how to protect their personal data privacy in the digital world.

#1: Use a Safe Password

I cannot stress this enough. Use a strong password!

The best passwords are more than 8 characters, and contain both uppercase and lowercase letters, with at least one numeric and one special character.

You should also avoid using easily guessed words or alphanumeric combinations, such as the names of children or pets, birth dates, addresses, and similar information that can be easily guessed by someone looking at your Facebook or LinkedIn profile.

#2: Enable 2-Factor Authentication when available

What if you could find a way to make your password all but useless to a hacker? That’s what two-factor authentication does.

Two-factor authentication adds an additional layer of protection by requiring an additional step in verifying a login. Basically, after verifying your password, it will require a verification code either from a text message sent to your phone or from a token. So even with a valid password, it is harder for hackers to access your account.

Tip: Two-factor authentication should at the very least be enabled on your e-mail account. Most account passwords can be reset using the forgot password feature, which sends a new password or link to reset the password to the e-mail address on file. If anyone has access to your e-mail account, they could get the new password for your account.

#3: Be overly cautious when sharing personal information.

The basic questions you should ask yourself is this:

Who is asking for your personal information? Why do they need it? How will they use it?

Basically, know who you’re giving out information to, and don’t share any information that’s not necessary. When in doubt, withhold information when possible.

Yet the truth is that it is impractical in the modern environment. Families need to share passwords to bank accounts, credit cards, and other online services with spouses, and many share a single login to services like Netflix. In the workplace, there are abundant reasons why co-workers may need to share login credentials.

The bottom line is: You shouldn’t give out passwords without concern; rather, determine when another person legitimately requires access to your personal information or account and grant access on a case-by-case basis.

If another person needs access for a single, isolated purpose, change your password when the task is completed and they no longer require access.


#4: Encrypt your Data

If you think you need to be a technology geek just to encrypt your data, well then, you are wrong! This is because modern tools have made it easy for ANYONE to encrypt emails and other information.

When sending confidential information over the Internet, such as usernames, passwords, or credit card numbers, remember to only send it securely. To verify this, look for a small lock (Internet browser security lock) icon in the bottom right corner of your browser window or next to the address bar, and make sure it is in the locked position.

While in the locked position, data is encrypted, which helps prevent anyone from understanding the data if intercepted. When no lock is visible or in the unlocked position, all information is plain text and could be read if intercepted.

So basically, if a web page is not secure, such as an online forum, use a password you wouldn’t use with protected sites, such as your online banking website.

Tip: Never transmit confidential data over email, such as passwords, credit card information, etc. E-mail is not encrypted, and if intercepted by a third-party, it could be read.

#5: Be cautious where you’re logging in from


Your place of work may have installed key loggers or use other methods of monitoring the computer while online. And someone who has access to this information could read these logs and gather usernames and passwords.

Wireless network

Working at the local coffee shop may have some appeal, but relying on a public Wi-Fi connection means your data can be intercepted by outsiders. Avoid conducting banking transactions and sending other sensitive information over a public Wi-Fi network. In addition, avoid using hotspots that are run by people you do not know or trust. This is because criminals can also set up hotspots known as ‘evil twins’ and ‘rogue hotspots’ to steal users’ information!

Always try and use encrypted (password protected) networks.

Friend’s house

Be concerned when logging into an account on a friend’s computer. A computer or network you are not familiar with could intentionally or unintentionally log usernames and passwords.

#6: Don’t save your passwords on your Web Browser

Let’s face it. We are all lazy people who likes to go on a website in our web browser without the constant need to always log in. For example, when we open Facebook on our laptops, how many of you are automatically already logged in?

However, this is not secure especially if you start getting into a habit of saving your passwords on random browsers. Moreover, if your laptop (touch wood) gets stolen, that means all your accounts are open and vulnerable to the thief or hacker’s perusal.

So whether it is your company’s shared computer, your friend’s laptop or your own personal laptop, do not store any passwords in your web browser!

#7: Don’t forget to sign out.

Signing in to online services is necessary when you need to access your personal accounts, but many users forget to sign out when they’re finished using a service. This is especially crucial for when you are using a public computer! And after you log out, remember to also clear the internet browsing data!


#8: Take care of Privacy Settings

When configuring a new device or operating system, configuring privacy settings should be the first order of business. This ensures that you’re not inadvertently sharing sensitive information as you set up your standard apps and services.

Most apps offer privacy settings for users, enabling you to determine how much and what types of information are shared or stored. Always choose the least amount of data-sharing possible.

#9: Be mindful of your Surroundings

How many of you are oblivious to your surroundings once your head is glued into your phone?

If you have time to kill on your morning commute to work, you might browse the virtual shopping aisles. However, be mindful of who is sitting beside you or behind you. Criminals can easily peep over your shoulder and watch as you enter passwords, credit card details, and other information.

So investing in a privacy screen or filter can significantly reduce the risk of these peeping thieves.