No data leaks any more
With the widespread use of internet applications and people's reliance on the internet, internet security issues are becoming increasingly prominent. Malware, phishing, and fraud continue to grow rapidly, and at the same time, hacker attacks and large-scale personal information leaks occur frequently. Along with the significant increase in various network attacks, there is also a continuous increase in the disclosure of a large amount of personal information and property losses. According to public information, from 2011 to now, 1.127 billion users' privacy information has been leaked, including basic information, device information, account information, privacy information, social relationship information, and online behavior information. The four major ways of personal information leakage currently are human trafficking of information, phone leaks, PC computer infections, and website vulnerabilities. The harm of personal information leakage is enormous. In addition to individuals raising awareness of information protection, the country is also actively promoting the legislative process of protecting personal information security.
I. Personal information mainly includes the following categories:
1. Basic information. In order to complete most online activities, consumers will submit personal basic information, including name, gender, age, ID number, phone number, email address, and home address, as required by service providers. Sometimes relatively private personal basic information such as marriage, belief, occupation, work unit, and income will also be included.
2. Device information. It mainly refers to the basic information of various computer terminal devices (including mobile and fixed terminals) used by consumers, such as location information, Wifi list information, Mac address, CPU information, memory information, SD card information, and operating system version.
3. Account information. It mainly includes online banking accounts, third-party payment accounts, social accounts, and important email accounts.
4. Privacy information. It mainly includes contact information, call records, text message records, IM chat records, personal videos, photos, etc.
5. Social relationship information. This mainly includes friend relationship, family member information, work unit information, etc.
6. Online behavior information. It mainly refers to the online behavior records, such as personal information on various online activities, such as online time, online location, input records, chatting, website visiting behavior, online game behavior, etc.
II. How to prevent personal information leakage
1. Do not casually link to public WiFi in public places, and do not use such wireless networks for online shopping and other activities. If necessary, use your own mobile 3G or 4G network.
2. Install security software on mobile phones, computers, etc., scan for Trojan programs at least once a day, especially before using important account passwords. Conduct a virus scan and kill at least once a week and update the security software in a timely manner.
3. Do not install software from unknown sources. When using a smartphone, do not modify system files in the phone, and do not participate in network activities that require registration information to receive gifts.
4. Set high-security strength passwords, and it is best to set different passwords for different websites. It is best to change the payment password for online banking and online shopping regularly.
5. Try not to use the "remember password" mode, and pay attention to personal usage records after logging in.
6. Shop on regular websites. When viewing messages or browsing videos, be sure to go to regular websites. Sometimes even if antivirus software is installed, it cannot guarantee that the computer will not be infected with a virus. Especially when shopping, use regular and guaranteed websites for higher security.
7. Do not open strange emails casually. Do not receive or open strange emails casually. When opening the mailbox, do not easily open emails sent by strangers, especially those with tempting information such as winning prizes or claiming prizes.
8. When handling express delivery orders, various bills, and transportation tickets, it is best to first black out personal information before throwing them away, or to collect them and dispose of them regularly.
9. When filling in the address for online shopping, you can consider using the address of your workplace, so that the courier can deliver the goods to your workplace instead of your residence. Single women in particular should be careful about this.
10. When using public network tools, make sure to clear your browsing history before logging off. For example, when printing materials at a copy shop, make sure to log out of your email and change the login area settings for computers that have "remember password" settings for QQ accounts.
11. When commenting on friends' Twitter, blogs, and pictures online, do not casually leave personal information about your friends, and do not intentionally disclose others' personal information.
12. When leaving your phone number online, you can use "-" to separate the numbers to avoid being easily found by search engines.
13. Documents with personal information such as identity cards and household registration books must be kept safe.