Three Important Steps When Personal Data Is Leaked


 Hackers are violators of the law and the perpetrators are clearly breaking the law and facing criminal penalties. Moreover, disseminating data obtained from hacking actions and seeking to profit from such data. The owner of the data in this case is actually the victim.
The problem is, in this digital age where data is de facto the most valuable commodity in the world and targeted by many bad actors who want to profit from this data, data managers who use internet networks accessible to anyone to run their services should be aware of these risks and take additional security measures to obtain the data it manages.



Appropriate and appropriate (mandatory) data managers who are responsible for the security of the data they manage. Don’t just want to enjoy using Big Data and benefit from managing data, but don’t run data security properly and when a leak occurs, instead of quickly identifying the source of the leak and taking action to prevent the same thing from happening again, you’re busy denying it.





If hackers can be identified and caught, this is certainly appreciated and hopefully can provide a deterrent effect so that they do not hack and commit illegal acts. But the problem is, once data is leaked and spread on the internet, this means that data has been leaked and will be there forever as the saying goes "once it's on the internet, it's there forever"



And who bears the biggest loss from data leaks?

What is a data manager? Data managers are clearly embarrassed and suffer a loss of reputation as this reflects their inability to obtain data that should be the largest and most valuable asset they should protect.



   



However, the party that bears the biggest loss from a data leak is the owner of the data whose information is leaked. If it were true that two hundred million population data was leaked, that would be the entire population whose data was leaked.



People will fall victim to identity forgery, making asphalt identification cards (genuine but fake) where the blank is fake but the data is genuine: these asphalt identification cards will be a powerful weapon to support and launch many other evils. Example:



Borrow money from Pinjol using a fake identity

Falsifying someone’s identity to change a SIM card to commit other financial crimes such as taking a phone number to perform a financial transaction

Opening a fake bank account that will be used as a collection account for other crime / fraud, such as 'Mama Minta Pulsa'

Seize a WA account and ask a friend to transfer money to a fake account

Scams win lottery prizes and reach out to fake online stores

It is illogical if a data manager intentionally leaks data where it is clear that this will endanger himself. However, not taking care of data properly and resulting in data leakage and ultimately endangering data owners is clearly something that data managers must take responsibility for.



Just like in the event of a road accident, no party wants to intentionally injure and cause a road accident. For example, not maintaining a vehicle causes the brakes to malfunction and in turn causes an accident.



This simple logic also applies where if the data manager already clearly knows that they are managing the Big Data Complex and providing this data over the internet network.



This is potentially a target for hackers from all over the world and lacks accurate and disciplined data security methods, resulting in data leaks and the owners of the data they manage suffer losses as a result of data leaks.

What to do?

Data leakage is also the same principle. Security activists are not at all interested in finding out who is to blame for the data leak and punishing the perpetrators as this is unproductive and the leaked data cannot be retrieved even if punishing the perpetrators, there is no point in crying over spilled milk.



The important thing is to identify why this data could be leaked and what action should be taken to prevent this from happening in the future. The fact is that data leaks always happen and will recur again.



The important thing is that if there is a data leak, the data manager should not hide this information, especially for the owner of the leaked data because the effect will be systemic if the data owner is not aware of the leaked data and does not take any anticipated action.



In fact, data managers are obligated to notify data owners that data is leaked so that they can anticipate the systemic effects of data exploitation.



For example, MC Donalds branches in South Korea and Taiwan experienced theft of customers ’personal data and the company immediately took steps to notify regulators and customers listed in the leaked data.



Call Uncle Onetime



If you fall victim to where your data is leaked, Vaccine provides some tips for protecting your digital assets with the “Call Uncle Onetime” method.

What is Call Uncle Once? These are the three steps that must be taken in this digital age to acquire digital assets and face the exploitation of leaked data.



1. Call, True Caller

Use crowdsourcing applications to filter out SMS spam and tele marketing that exploit our mobile phone numbers where all Truecaller users act as a data source where if one user receives a spam SMS / phone call and marks / marks the number as a spammer, the information will automatically sent. updated to the Truecaller server and automatically all Truecaller users will get an update of this information and will automatically block this spammer number.



2. Password Manager

Use Password Manager to store and manage your credentials Currently where you have to manage dozens maybe hundreds of important account credentials such as email, social media, digital wallets, bank accounts, internet and others.



It is not possible to create good and unique passwords for all services without the help of a reminder app. If you are using conventional storage such as Excel or MS Word, this is good enough but not ideal as it is impractical, there is a risk of leakage and is not encrypted.



Use a trusted Password Manager program where the program will manage and store all your credentials no matter how complicated and you only need to remember one password to open this Password Manager.



A good Password Manager can even be stored in the cloud encrypted so that it is quite technically secure and can be accessed and synchronized between various devices such as Mobiles and computers.



3. One Time, One Time OTP / TFA Password

In fact, eligibility protection for accounts is no longer secure and is not the gold standard for account security. This is caused by trojan (key logger) malware that can steal the credentials you type on your device even if you change them periodically or make it as complicated as anything else that will still be stolen.



Also, if you have secured your credentials data properly, but if a leak occurs on the part of the service provider as experienced by Linked In, then you are once again a victim of a data leak.



To anticipate this, Vaccine recommends that you enable One Time Password (OTP) / Two Factor Authentication (TFA) in all your digital services, especially digital / financial services which are important as this security is very effective and can help secure your digital account from exploitation. if it occurs.A qualification leak has occurred.
Previous Post Next Post

Contact Form