Data leakage incidents are increasing in Indonesia. The latest information is surprising, coming to a remarkable figure, the alleged data leak of 1.3 billion SIM card registration data which includes personal data such as NIK and phone numbers.
The incident adds to the long list of data leaks that have occurred in the country, ranging from the alleged leak of bank data in January 2022, and medical records of patients in a number of hospitals, to 26 million browsing history data or a user search for one. Internet service provider.
Cyber security expert and director of ITSEC Asia, Andrey Hotama Putra, said personal data is now increasingly important because it is vulnerable to misuse. Therefore, it is necessary to understand how personal data is protected by all elements of society.
“Protection of personal data really needs to be an important pillar for organizations or companies that collect personal data of people in carrying out their activities. However, the protection of personal data must start with yourself,” Andrey said.
Andre added that a lot of data leaks also occur at the individual level due to negligence in digital activities. It is therefore necessary to pay attention to how we carry out digital activities to protect our personal data in cyberspace.
In this regard, ITSEC Asia as a cybersecurity company offers many tips to the public to protect personal data in cyberspace at the individual level, in order to avoid the potential risk of data leakage. Here are the tips:
- Different email addresses for different needs
There are still many people who use one email address for all their needs ranging from banking, transactions, social media, subscriptions, and more. This will be very dangerous for each other’s personal data when email is attacked.
All information contained in these emails can be subject to theft and abuse. Therefore, use email addresses for their respective purposes, for example using different email addresses between transaction and social media needs.
- Use strong passwords and change them regularly
Use strong passwords and avoid using easy-to-guess passwords like your name or birthday. Combine passwords with uppercase letters, numbers, or punctuation marks so that they are not easy to guess.
Regarding the use of passwords for any need, change the password periodically. This is one of the most powerful ways to prevent personal data from being easily stolen by irresponsible people.
- Do not click on suspicious links and do not download apps carelessly
Do not carelessly open suspicious links or links when browsing in cyberspace or the Internet. This is to avoid phishing attacks that usually target important information we have such as account data or other personal data.
Also, do not download suspicious or untrusted applications from websites. Always check the addresses of the websites we visit, because criminals often fake websites to lure users.
- Use app security and antivirus features
Don’t say “no” to using antivirus software on the device you’re using, such as a PC, laptop, or smartphone. As we all know, an antivirus installed on the device can protect the device from malware infection.
In addition, also take advantage of security features on apps or devices already provided, such as two-factor authentication (2FA), one-time password (OTP), end-to-end encryption, privacy settings, account login alerts, and more. .
- Update apps and delete unused apps
Always pay attention to the applications on the device. If there is an update to the latest version, update it immediately, because the updated version is often intended to strengthen security holes from existing findings. Also remove unused apps, especially apps that are not launched by the developer to avoid hacking risks.
- Don’t share important information in the digital world
Don’t just share important information like ID cards, airline ticket photos, passports, QR codes, or personal information like your biological mother’s name and personal phone number when browsing the internet or when accessing social media.
This is important because there are many ways in which cybercriminals can do identity theft or important information that is eventually manipulated for various crimes in the digital world such as account theft and fraud of stolen identities.
If there is a hack, immediately identify the source, such as an email or an app. Then immediately identify and secure the compromised data, for example by connecting to the application to reset the password or change confidential information in the authentication system.