Archives - Personal Information


Don’t let Cortana collect your information

If you’re using Windows, you might be familiar with Cortana – Microsoft’s adaptive virtual assistant. You probably wouldn’t be surprised that Cortana collects data about you. But did you know that it also collects speech and handwriting patterns, typing histories and more? Here’s how you can restrict the type of data that Cortana collects: Go […]

Opt out of data sharing agreements

Some devices – especially IoT devices – give you the choice to share data with the manufacturer. This is typically for the purpose of collecting information that might improve system performance in the future. Opting out of this agreement is a good way to ensure your information is out of harm’s way if the manufacturer […]

Classify your corporate data by sensitivity

Data classification is a staple part of data security. It helps your organization determine where they should focus their efforts and which types of data are better left unattended. Classifying data by sensitivity – that is, how damaging the information could be if it were destroyed or exposed – is a great way to prioritize […]

Allow common sense to guide your online posting

It’s a good idea, before you post something online, that you think about what value it provides and consider the consequences of having the information available to the public. Identity theft is an increasing problem, and the more information an attacker can gather about you, the easier it is to pretend to be you. Act […]

Beware of sharing personally identifiable information

Whether you’re a business or a consumer, it’s important to keep personally identifiable information (PII) secure. PII is any type of data that could be used to identify, locate or contact an individual, such as name, date of birth or place of residence. PII is often targeted by hackers because it can be sold for […]

Use a zero-trust approach to network security

If you manage an enterprise-grade network, you’re likely responsible for keeping sensitive corporate data under lock and key. When employees and outsiders access your corporate network, they could also potentially access unprotected data. Zero-Trust Network Access verifies the identity of a user before allowing them entry into the network – thus preventing unauthorized users from […]