24hoursworld

Do we protect our data?

Globally, work is being done on various regulations to adapt the laws in force to the new times. Not only because of their adoption, but also because they provide a higher level of effectiveness and efficiency. Let’s imagine, why expose the elderly to procedures such as proof of life, if with an audio or the detection of their face we can solve it? Why fill in thousands of data when you start a new job if they can recognize your gestures and access using identity authentication? And so, hundreds of examples.

Let’s remember when, pre COVID, we traveled and connected to any available Wi-Fi network to be able to navigate. The much-needed scrolling through Instagram or the message that yes or yes had to be sent was payment, nothing more and nothing less, than with your data. And now many realize that bargaining chip and its true value. But, few know, that this personal information is protected by the National Constitution.

That is why it is essential to increase social awareness on how to protect them. Very few, sadly, have two-factor authentication (or two-step, in some applications) enabled. Something as simple as this, which sends a code on each unacknowledged access, can prevent a vulnerability from becoming a headache. Many times, this is learned when the worst is over: when the attacker achieved his mission and entered the virtual wallet, when he no longer has access to social networks (something that can become directly losing accounts), and even when the owners of other people’s things take our electronics and want to enter the systems.

Every day I try to contribute my grain of sand in this titanic task, both personally and professionally. But for such a crusade it is necessary the alliance of public and private, of the third sector and any organization that has an impact or uses technology in their day-to-day life. Data and information is the new oil, and, as George Orwell said, “In an age of deception, telling the truth is a revolutionary act.”

Sales Director South Cone de VU Security

Leave a Reply

Your email address will not be published. Required fields are marked *

Latest Posts