Categories: Mobile

The everyday things you do that risk your digital privacy #infographic

How good are you at protecting your privacy and your data online?  Well, no matter how good you think you are you might be surprised to see how it’s the small things that you do that might lead to your data being stolen.

Last week we spoke to David Gorodyansky (@AnchorFreeDavid), the co-founder and CEO of AnchorFree, the company behind Hotspot Shield, he said that while awareness is growing many smartphone users are still not as aware as they should be about their data security.  He said,

I think people in general are probably not as aware as they should be about the risks to their privacy; and the risks are pretty significant.  Last year there were 10 million identity theft victims in the United States alone.  Obviously if you are using an unencrypted Wi-Fi network it is extremely easy to sniff passwords, bank account details, your Facebook password, your identity, and all the sites you’re visiting.

The figures for data theft are astounding, and the risks from viruses are ever growing, but there are things that can be done to improve your personal digital security.  This infographic from backgroundcheck.org illustrates how using public Wi-Fi or a computer that isn’t your own (even in work or college) can be the weak link for you.

Click here for a larger view of the infographic.

Ajit Jain

Ajit Jain is marketing and sales head at Octal Info Solution, a leading iPhone app development company and offering platform to hire Android app developers for your own app development project. He is available to connect on Google Plus, Twitter, Facebook, and LinkedIn.

View Comments

Recent Posts

What sitting all day is quietly doing to your body and why you don’t even realize it (Brains Byte Back Podcast)

Adults today spend over nine hours a day sitting, according to national health data. On…

9 hours ago

Kryterion and Automattic partner to create a gold standard in WordPress developer credentials

The web has a WordPress problem – not the platform itself, but the people who…

20 hours ago

Consciousness computing tech exists, ‘whoever governs identity governs society’: World Forum

Neural rights was a hot topic during a session called "Approaching Singularity: Our Brains Interfacing…

2 days ago

Decision Points: The “Tiger” Methodology for Decisive Action

At some point in the last 10 years, I started viewing Colonel John Boyd as…

6 days ago

Architecting Zero-Click AI Eval Pipelines

When I started designing an AI Evaluation pipeline/framework at my organization, I had no idea…

6 days ago

Tech executive Bob Reisenweber named Director of Operations at Source Meridian

This week software firm Source Meridian announced that Bob Reisenweber was named its new Director…

1 week ago