From the course: Cybersecurity Awareness: Identifying Personally Identifiable Information

Unlock this course with a free trial

Join today to access over 22,400 courses taught by industry experts.

Summary of best practices: Individuals

Summary of best practices: Individuals

- [Instructor] Based on the amount of spilled PII, it is clearly up to us as individuals as PII owners to protect our PII. It is easy for me to store files on Dropbox, yes, thanks for that breach that pawned my email address, I will continue using it but change my password. I like to connect with others via LinkedIn, my other pawned account. I am not willing to give up the convenience of using credit cards nor my travel mile awards. I don't want to carry a lot of cash around with me. That just introduces another element of risk. So, how can we reduce our PII exposure? Value your PII. If it's on your smartphone, password protect your phone. If it's on your laptop, password protect it and use a password that is difficult to guess even if you are limited to four characters as on a smartphone. 1111 and 1234 are really easy to guess. A strong password does not use dictionary words and is 12 or more characters long, alphanumeric, mixed upper and lowercase, and interspersed with special…

Contents