[ad_1]
Security and IT experts share three tips for advising Gmail, Yahoo, and other free mailbox users.
Excessive information and lack of time to visualize them is a common problem for our time. She eclipsed another: the security of information security. Experts point out that secure archiving of information and proper processing must become our daily habit.
"Many important and confidential data flows through e-mail and other platforms, so a secure transfer of information must be a routine habit of intelligent security hygiene." better to develop this habit now, because in the future, the flow of information will only increase, "said Edward Steck, a lawyer at law firm AAA Law, specializing in intelligent security.
Filter the information sent for free e. letters box
The most popular free e in the world The mailbox service is provided by Google and its Gmail product is used by more than one billion users. Half of the users have Microsoft Outlook e. postal service. The third most popular e. The messaging service is provided by Yahoo, with over 255 million users.
According to the security expert of the blue bridge, Kęstutis Meškonis, these e. Postal service providers invest more in security than their usual activities or organizations, with these services generating significant profits. However, e. the sensitivity of the information transmitted by the post office, the confidence of the supplier and the country in which its activity is recorded are the main criteria to take into account when choosing a communication tool.
K. Meškonis adds that the first and the main question of every free email. The mailbox of the user – for what purpose I use this correspondence. If you have Gmail, Yahoo or any other free email. The mailbox is only used for personal correspondence, security is enough. If these popular mailboxes are used for business purposes, they may become the target of threatening actors. It is strictly forbidden to use such systems if these are intended to convey secret information of the state or service.
"Free e Mailboxes are exchange-based, consumers provide trust and legal authority to use all their personal data, and the provider is a huge data warehouse." By accepting the terms of use of Gmail, we grant the Google licensee a worldwide license to use, store, store, restore, modify, create derivative works, transmit, publish, publicly perform, display and publicly distribute the content we download.The validity of this license continues even after the end of the use of services, "said E. Steckis.
In addition, we agree with Google's acceptance that the vendor's automated systems will badyze our email. letters (sending, receiving and storing). Google applies this badysis for security reasons, provided in three ways.
First, it uses encryption to ensure the privacy of data being transmitted and security features such as secure browsing, security verification, and two-step verification. Second, it examines ways to collect, store and process information to prevent unauthorized access to systems. Third, limit the access of Google employees, contractors, and intermediaries to personal information collected for the purpose of processing.
"Mailbox administrators badyze e-mail using automated systems, which in itself does not guarantee complete confidentiality.On the one hand, automated systems are designed to provide security rather than recovery. On the other hand, by performing an badysis, the automated system tracks the behavior of the mailbox users and stores specific data about it, so the system owner's information about the users is impressive. that consumers, we will not change anything here, but it is useful to understand what we are talking about by means of free mailboxes ", adds E. Steckis.
Clear and archive data
The security expert at Blue Bridge Computer Group points out that as much data as possible is available on the e. In the mailbox, the "noise" is not useful to the user or the controller. The most recent information in the daily traffic flow is weak. For information to gain value for e. For the owner of the mailbox, it must be treated – in other words, organized. So personal internet e. Mailboxes must be cleaned manually at regular intervals.
Lawyer Edward Steckis adds that more data is available e. The more you handle the mailbox. The more processed, the more risk. The scope and outgoing data of the e-mail allows you to compile a sufficiently detailed view of the e-mail. User Behavior and Mailbox Business (if the free email is used for business purposes and it contains data for a few years).
Practices Recommended by Practitioners – Weekly From e. mailboxes to delete unnecessary data and make copies of the necessary information. Copies of vital data are also needed because mailbox managers do not accept responsibility for "using, destroying or not backing up customer data". Retention of data is a personal responsibility of the user.
Admittedly, Google claims that its cloud infrastructure is one of the safest and most reliable in the world. It is constantly monitored so that consumer data is protected and accessible when it is needed.
Secure Internet connection
K.Meskonis, security expert at Blue Bridge, reminds that the connection to public or private networks not belonging to a person or a company has never been and will not be secure. Good security practices such as wireless encryption, use of VPN tunnels, activation of localized firewalls, activation and upgrading of antivirus software, l & # 39; Isolation of wireless network clients and secure pbadwords do not eliminate all risks, but they are mandatory.
Part of these good practices is the responsibility of the network provider, and we can not control it. If we do not have control of the network and if we do not know all these best security practices, the risk of joining your e. Public postal Internet networks are vast. In the case of disclosure of confidential data, free and full access to the Wi-Fi network at public access points complicates the task of the data subject and the Wi-Fi network provider.
"The smallest thing we can do as a user, before using Wi-Fi public access points, is to know the privacy policy of the service provider and the security of the service." Unfortunately, this information does not always appear when connecting to an external network, when the user is prompted to confirm the conditions for using the external connection. the mobile internet is definitely a much more expensive Wi-Fi alternative.Without the option, use at least the VPN tools ", – advises the lawyer E. Steckis.
Connecting to the Wi-Fi network when traveling to other countries has the same listed risks. Moreover, in non-democratic countries, it is common practice not to comply with the provisions on confidentiality of communications and data processing security. Similarly, some countries are listed in the Wi-Fi zone of the most vulnerable countries: Belgium, Tajikistan, Samoa, Australia and China. Therefore, we encourage you to check in advance the country in which you are going online.
It is strictly forbidden to use the information published by DELFI on other websites, in the media or elsewhere, or to distribute our material in any form whatsoever without consent. If this consent is obtained, it is necessary to indicate DELFI as the source.
[ad_2]
Source link