Time
47 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:04
Our next topic is the protection of our identities on personally identifiable information.
00:11
So today, more than ever, we live in a world of information sharing. There is so much information out there through social media and other channels about about us today, so much more so than ever before.
00:27
So what we're doing kind of fighting this battle of keeping what we want to keep private and then sharing what we want to share. And a lot of times those two are mutually exclusive. Once we begin to open up this information about ourselves and put this information out of the Internet
00:43
than that tends to lend itself to further further compromises, um, personally identifiable information a lot of times refer to his p I. I
00:53
is information that could be used separately or in conjunction toe. Allow someone to locate an individual and to contact them.
01:03
So our concern here is that these individuals, but also Mia's data owners and our organization we have access to a lot of this information. So it's our responsibility at work to protect the p i ay of our customers.
01:18
But also it's our responsibility at home to protect their own personally identifiable information.
01:23
No, Um, 17 million people were victims of identity theft in 2014 and this number is on the rise and it continues to increase. Continues to increase in the way
01:37
that identity theft happens is through compromise a p I
01:41
maybe I get your name and address, and from that I'm able to access a little bit more information. Maybe based on me having access to your social media, I know where you were born.
01:56
So now maybe I can make a reasonable assumption of with the 1st 3 characters your Social Security number are. And maybe I can use those 1st 3 characters to gain access to banking information and so on. It's a lot. So basically, when it comes to identity identity theft, it often starts with just a little bit of information that leads to more and more
02:15
more
02:16
in social engineers and identity thieves. They're very good at just starting with that little tiny snowflakes that ultimately leads into a massive avalanche. So our job is to protect personally identifiable information of ourselves and of our customers.
02:36
So the way we do that is we make sure that we secure this information
02:39
not a good idea to carry your own Social Security card in your wallet. You don't wanna have that written down on cheques. I've seen where banks will put customer circle Social Security numbers
02:52
on their customers checks, which is just a horrible idea.
02:55
Keep that SS and keep it protected. That yours and a ton of compromise can happen just by me knowing the last four digits of your Social Security number. So don't allow that to happen
03:07
along that same line. Never, ever reveal a customer Social Security number or those last four digits.
03:15
Uh, just someone on the phone, and I know that kind of sounds like a no brainer. Why would I ever tell somebody a Social Security number,
03:23
Remember, Attackers are very, very close,
03:27
and you know, anybody can fall prey to some of their tricks. It's It's about just catching the right person at the right time.
03:36
So it's very, very essential that we do not divulge any sort of personally identifiable information.
03:42
The matter of fact, the people calling us should be the ones to verify.
03:46
You know, I had somebody,
03:50
uh, that I was dealing with on the phone.
03:52
Uh, you know, I gave him a little bit of information, and they said, Is your address one of three of four Silver Street? And I said yes.
04:00
And that should have been information that they asked me,
04:03
right? I don't say, Hey, is your Social Security one? 1225555
04:09
It should be told me. Your Social Security
04:12
right? I hope that makes sense, but it's always interesting to me how customer service representatives have all of this information at their disposal, and some people are well trained in some people.
04:25
Hey, make sure you don't respond to any sort of requests for personal information. That's never my decision as an end user to reveal that information we always follow company pumps,
04:40
shoulder surfers. Earlier in this course, we talked about the importance of physical security.
04:46
Letting someone into the building that shouldn't be here
04:48
might lead to a shoulder surfing attack, and you know it's got a dramatic to call it an attack. But essentially, if I walk behind you and I'm standing behind you while you're doing your work, I have access to what's going on on the screen.
05:01
That's why a lot of times in doctor's offices. We see those privacy screens that make it more difficult. So to shoulder, sir, very important idea.
05:11
You know, make sure that you found a clean desk policy. If you're processing sensitive information about individuals, customers patients than when you leave your desk, you need to put that material somewhere secure. Doesn't need to be out front where anybody passing by can see the information,
05:29
makes sure that you shred sensitive information or whatever your company's policy is made. You have incineration bags, whatever that is. But we want to make sure that the days of wanting up paper and tossing him in the trash can those days were going as faras sensitive information.
05:47
Make sure your personal information is stored in a safe place at home and it.
05:53
So again, we want to be very careful where we keep
05:58
any information on customers or on ourselves, and it won't with that. Also, be very, very conscious about your passwords. You know, today we have so many passwords, stacks as so many systems,
06:11
you know, I could probably name
06:13
15 or 20 different sites to which I have a password.
06:16
Very cautious about using passwords,
06:19
writing passwords down
06:21
it becomes very challenging, but we have to find a good solution to manage all those passwords. Ah, lot of the cell phone applications that are available, like password vaults and password protectors. Those may offer a good solution, but before you store your password in a file on your phone,
06:41
make sure you have information
06:42
about how well protected that information is. If it shared isn't encrypted, you know it's it's not necessarily that it's wrong, right? Passwords down.
06:54
It's all about how we protect the list of our passwords, and that's obviously an important part to any secure environment protecting the network. Protecting our data are again if he's whatever,
07:04
Uh, and then the last piece installing firewalls and virus detection software on a home computer?
07:11
Absolutely. My sumption would be that that's already installed on your work, he says. You also want to happen installed,
07:18
and your home computer says, Well, regardless of how frequently you connect to the Internet or not
07:24
a very important piece of security,
07:27
make sure you don't disable these applications and make sure that you do your best to help them up today.
07:32
And that's really, um, you know, the things that we have to do immediately. They're always additional steps, but these are some good basic starting points
07:43
for protecting the identity of yourself as well with your custom.

Up Next

Intro to Infosec

Cybrary's introduction to information security is intended for everyone interested in a career in cybersecurity. Learn the basics, then launch your new career by continuing with our CompTIA A+, Network+, or Security+ Courses.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor