Navigating the internet certainly hasn’t gotten simpler over the years. That rise in complexity has made it increasingly hard to look at your digital life and online activities and understand—without an advanced degree—whether or not your data is secure and private.
So when Data Privacy Day rolled around this year, we decided to hand over the reins to our Instagram account to one of our experts—Head of IT, Jay Leaf-Clark—to answer your burning questions about data privacy practices and pitfalls.
Below, we’re sharing short clips of Jay answering some of our favorite questions we got from our followers, as well as some answers to more of your questions that Jay crafted off camera. If you want your digital privacy advice served up by and for a human, you’ll see why we asked him to staff our virtual helpdesk for the day!
Want more chances to pepper expert Dashlaners with questions? Let us know you’d like to hear more by finding us on social @Dashlane and using #DataPrivacyDay.
What are some simple steps I can implement to increase security?
How do I know if my company is prepared for a data breach?
1. You’ve gone through some semblance of security and compliance training, and are continuously required to update your knowledge of common threats.
2. Your company carries out audits testing the security vulnerability annually. These are in-house exercises to see how susceptible they are to a data hack, phishing, etc.
3. There are written policies, procedures, and clear documentation on what happens if a breach were to happen, and they are widely known.
What kind of activity can my IT department access from my computer?
Can you explain encryption in simple terms?
Leaf-Clark: Imagine a bank. Your money in this scenario is sensitive data you want to protect. So, you place it in a vault. The vault in this scenario is encryption, which is using a specific algorithm to scramble or encrypt your data. The only way to access that data (your money in this case) is with a “key” that you received, which will unscramble / decrypt your data so you can access it.
What are the top 3 tools a small business can use to protect itself from a data breach?
Want to learn more about protecting your small business using a password manager like Dashlane? Get our free Practical Guide to Cybersecurity with a Password Manager.
In your opinion, what is the “ultimate party foul” when it comes to password habits?
Leaf-Clark: Using the same password or variation of a password for ev.ery.thing. Imagine having your email and password breached on one site, and those credentials are now on the dark web? Now, every other set of credentials you hold are at immediate risk and must be changed.