Keeping your online data private has never been more important and that’s why we’re highlighting Data Privacy Week!
You can’t always control if each piece of data you generate is collected; however, you still have a right to data privacy and there’s a five key ways you can help responsibly manage your data.
1. Encrypt your data by using a Virtual Private Network (VPN) service.
These services protect your online identity by hiding your IP address and encrypting your data as you use the internet. This helps keep companies and people alike from gathering your information without your consent.
Find UWM’s VPN specification recommendations on our website.
To learn about UWM’s free GlobalProtect VPN, visit our website.
2. Avoid using public WiFi.
Most of the public Wi-Fi networks are unsecured and hackers can easily take control of the network to tap into devices connected to it. They can see what websites you visit, your accounts & passwords, and even install malware on your device to track your activity and steal your data. If you ever have to connect to a public WiFi network, make sure you enable your VPN beforehand.
3. Use a password manager to save all of your unique passwords.
Creating, storing and remembering passwords can be a pain, but passwords are your first line of defense against cybercriminals and data breaches. Making long, complex, passwords and regularly changing them is a strong data security practice.
To learn how to make a strong password or phrase, visit our website.
4. Never share personal information with anyone.
You may be giving out your personal information without even knowing it; sharing your location on social media, filling out surveys, and subscribing to email lists are just a few examples of ways you may be sharing your information unknowingly. Doing your best to research privacy policies is a great way to make sure no one is saving and or sharing your personal information without your knowledge.
5. Never click on unfamiliar links or email attachments.
A phishing scam’s goal is to try gaining access to personal information by posing as trustworthy companies or people in emails, phone calls, text messages and more. Most commonly seen as emails, the sender often asks you to reply quickly with specific information, click a link to fill out a form, or download an attachment.
Be on the lookout for:
- Unknown email addresses/phone numbers
- Random job offers
- Requests for personal information
- Requests for quick response
- Requests for MFA codes
- No personalization
- Poor spelling or grammar
For more information about how to avoid phishing scams, visit our website.