ADVERTISEMENT

How to protect your data from unauthorized access

Published Sep 7, 2019 12:00 am

Fortinet Email Security

After years of developing technologies for different companies, I have gained inside information about corruption, crimes, and other inappropriate behavior by people who present themselves as legitimate business owners. I have evidence of these malicious activities as data on my devices. It’s quite apt and timely for me to share a recent personal experience on how far people can go to steal your information.

A few days ago, two armed men broke into my apartment and stole my cellphone and laptop. They were very specific about those two things seeing as that I had other more valuable stuff laying around the house like my GoPro, smartwatches and other valuable gadgets. It was an odd coincidence, knowing that it all had happened the night before a legal proceeding, where the other party is filing for a motion for reconsideration against the dismissal of my case.

As the internet has become more and more integral to our everyday lives, data are extremely valuable pieces of information. Any data that we own, such as personal information, customer records, online conversations, location data, among others, are information that can be used by others for many different purposes. For businesses and organizations, unsecured data can lead to devastating financial losses. And for private persons, it could cost them everything: their money, identity, work, and their privacy. Securing your personal data is ensuring that your rights and freedom are not violated.

With the pace of technological advancement, cybersecurity is more crucial than ever. Nowadays, we should be more aware of the security of our data. We need to educate ourselves on how we can take steps to prevent any data breach. In my company, eGlobal Solutions, we promote the following best practices that help you protect your data:

  1. Encrypt your data - the first step to making your data difficult to steal is to encrypt them. For computers or laptops, you can easily find free downloadable encryption tools for your disk drive. I used LUKS for my stolen Linux laptop to encrypt all the data in the hard drive.
  2. Create Multiple Backups - once you’ve encrypted your data, make copies and store them in other places, preferably cloud storage. This can be particularly useful later if you lose your device or hardware. There are many available cloud storage options such as GitHub, Dropbox, and Google Drive.
  3. Enable Multi-factor authentication - lastly, make sure you enable multi-factor authentication on your online accounts. These additional log-in steps can help you prevent unauthorized access as you are notified every time a login attempt happens. Multi-factor authentication is available in most platforms that require online login. This extends the login process to other devices for stricter authentication.

These are steps that you can easily do right now to prevent your data from being hacked. Even though my devices have been stolen, I’m confident that they will have a hard time accessing my data. I made sure my laptop’s hard disk is encrypted, made backups in the cloud, and enabled multi-factor authentication on all my sensitive logins.

Protecting your data is protecting your right to privacy. And these steps may seem like additional work, but they will help add security layers to your valuable online information.

About the author:

Alvin is currently the Chief Technology Officer of eGlobal Solutions, an IT-BPO company based in Pasig City, Philippines, he is also the Cybersecurity and technology consultant for the technology section of the Manila Bulletin. He has over 20 years of experience in Information Technology and Engineering, with a focus on Internet-of-things (IoT). As a kid, Alvin has keen interest in reverse engineering technology which led him to be featured in Time Magazine at age 17, for exposing the vulnerabilities of Internet infrastructure in the Philippines.

He co-founded Wright Balance, based in California, USA, a company that specializes in Biomechanics. He holds patents for several product prototypes based on Arduino, OpenCV, and other open source machine learning libraries. In 2017, he came back to the Philippines with an advocacy to use and promote technology to help improve the lives of every Filipino.

ADVERTISEMENT
.most-popular .layout-ratio{ padding-bottom: 79.13%; } @media (min-width: 768px) and (max-width: 1024px) { .widget-title { font-size: 15px !important; } }

{{ articles_filter_1561_widget.title }}

.most-popular .layout-ratio{ padding-bottom: 79.13%; } @media (min-width: 768px) and (max-width: 1024px) { .widget-title { font-size: 15px !important; } }

{{ articles_filter_1562_widget.title }}

.most-popular .layout-ratio{ padding-bottom: 79.13%; } @media (min-width: 768px) and (max-width: 1024px) { .widget-title { font-size: 15px !important; } }

{{ articles_filter_1563_widget.title }}

{{ articles_filter_1564_widget.title }}

.mb-article-details { position: relative; } .mb-article-details .article-body-preview, .mb-article-details .article-body-summary{ font-size: 17px; line-height: 30px; font-family: "Libre Caslon Text", serif; color: #000; } .mb-article-details .article-body-preview iframe , .mb-article-details .article-body-summary iframe{ width: 100%; margin: auto; } .read-more-background { background: linear-gradient(180deg, color(display-p3 1.000 1.000 1.000 / 0) 13.75%, color(display-p3 1.000 1.000 1.000 / 0.8) 30.79%, color(display-p3 1.000 1.000 1.000) 72.5%); position: absolute; height: 200px; width: 100%; bottom: 0; display: flex; justify-content: center; align-items: center; padding: 0; } .read-more-background a{ color: #000; } .read-more-btn { padding: 17px 45px; font-family: Inter; font-weight: 700; font-size: 18px; line-height: 16px; text-align: center; vertical-align: middle; border: 1px solid black; background-color: white; } .hidden { display: none; }
function initializeAllSwipers() { // Get all hidden inputs with cms_article_id document.querySelectorAll('[id^="cms_article_id_"]').forEach(function (input) { const cmsArticleId = input.value; const articleSelector = '#article-' + cmsArticleId + ' .body_images'; const swiperElement = document.querySelector(articleSelector); if (swiperElement && !swiperElement.classList.contains('swiper-initialized')) { new Swiper(articleSelector, { loop: true, pagination: false, navigation: { nextEl: '#article-' + cmsArticleId + ' .swiper-button-next', prevEl: '#article-' + cmsArticleId + ' .swiper-button-prev', }, }); } }); } setTimeout(initializeAllSwipers, 3000); const intersectionObserver = new IntersectionObserver( (entries) => { entries.forEach((entry) => { if (entry.isIntersecting) { const newUrl = entry.target.getAttribute("data-url"); if (newUrl) { history.pushState(null, null, newUrl); let article = entry.target; // Extract metadata const author = article.querySelector('.author-section').textContent.replace('By', '').trim(); const section = article.querySelector('.section-info ').textContent.replace(' ', ' '); const title = article.querySelector('.article-title h1').textContent; // Parse URL for Chartbeat path format const parsedUrl = new URL(newUrl, window.location.origin); const cleanUrl = parsedUrl.host + parsedUrl.pathname; // Update Chartbeat configuration if (typeof window._sf_async_config !== 'undefined') { window._sf_async_config.path = cleanUrl; window._sf_async_config.sections = section; window._sf_async_config.authors = author; } // Track virtual page view with Chartbeat if (typeof pSUPERFLY !== 'undefined' && typeof pSUPERFLY.virtualPage === 'function') { try { pSUPERFLY.virtualPage({ path: cleanUrl, title: title, sections: section, authors: author }); } catch (error) { console.error('ping error', error); } } // Optional: Update document title if (title && title !== document.title) { document.title = title; } } } }); }, { threshold: 0.1 } ); function showArticleBody(button) { const article = button.closest("article"); const summary = article.querySelector(".article-body-summary"); const body = article.querySelector(".article-body-preview"); const readMoreSection = article.querySelector(".read-more-background"); // Hide summary and read-more section summary.style.display = "none"; readMoreSection.style.display = "none"; // Show the full article body body.classList.remove("hidden"); } document.addEventListener("DOMContentLoaded", () => { let loadCount = 0; // Track how many times articles are loaded const offset = [1, 2, 3, 4, 5, 6, 7, 8, 9, 10]; // Offset values const currentUrl = window.location.pathname.substring(1); let isLoading = false; // Prevent multiple calls if (!currentUrl) { console.log("Current URL is invalid."); return; } const sentinel = document.getElementById("load-more-sentinel"); if (!sentinel) { console.log("Sentinel element not found."); return; } function isSentinelVisible() { const rect = sentinel.getBoundingClientRect(); return ( rect.top < window.innerHeight && rect.bottom >= 0 ); } function onScroll() { if (isLoading) return; if (isSentinelVisible()) { if (loadCount >= offset.length) { console.log("Maximum load attempts reached."); window.removeEventListener("scroll", onScroll); return; } isLoading = true; const currentOffset = offset[loadCount]; window.loadMoreItems().then(() => { let article = document.querySelector('#widget_1690 > div:nth-last-of-type(2) article'); intersectionObserver.observe(article) loadCount++; }).catch(error => { console.error("Error loading more items:", error); }).finally(() => { isLoading = false; }); } } window.addEventListener("scroll", onScroll); });

Sign up by email to receive news.