Our lives have never been more connected online than ever before with more than 3.5 billion Internet users worldwide, making it just under half the population on earth. That includes, 6 billion email accounts, 2 billion smartphones, 1 billion apple users, 1 billion Gmail accounts, 1.7 billion Facebook accounts, and 300 million Twitter accounts who tweet 7,350 times per second, send 2.5 million emails per second, and transfer 1.5 billion GB of data per day through the internet. All of which are strong opportunities of attack for hackers to exploit.
To date we have downloaded 140 billion apps from the Apple store to our devices so that we can record and share every aspect of our lives online with our family, friends as well as many people we do not know or have not even met (potentially cyber criminals).
We use those apps to control everything around us from choosing you favorite song, open doors, change the TV station, the temperature of the room to even starting the car. With almost 9 billion devices of Internet of Things (IoT) around us that are collecting billions of data points monitoring our every move, our health, the weather, traffic, environment, and so much more.
With so many smart devices and connectivity the question is now are we never disconnected from the Internet and how dependent are we on its pure existence? The introduction of health trackers and smart wearable’s people are now connected 24 * 7 so we are online even when we are sleeping. The data collected is continuously uploaded and shared to the cloud (just another computer somewhere in a data center).
It is important to know what data is more critical than others; data known as personal identifiable information (PII) are those pieces of data that uniquely identify you when you are online. Personal information like the following below:
• Full name (if not common)
• Home address
• Email address
• National identification number
• Passport number
• IP address or Mac Address
• Vehicle registration plate number
• Biometric Information
• Driver’s license number
• Face, fingerprints, or handwriting
• Credit card numbers
• Digital identity
• Date of birth
• Genetic information
• Telephone number
• Login name, screen name, nickname
When connected online you should always be cautious about sharing the information above and where possible limit the exposure. Cyber criminals are looking for this information and the more available the more cyber crime they can do from identity theft, impersonation, and financial fraud. The commonality between all of the recent major data breaches in the news including Yahoo, LinkedIn, and Dropbox is that the information stolen is personal information.
What is your ‘App’-titude for sharing personal data online? Are you always connected online and what PII have you made available already to potential cyber criminals? Check today and find out what personal identifiable information (PII) is public, try to remove it where possible and avoid becoming the next victim of cyber crime. Stay safe online, Stop. Think before you Click.