Page 35 - CyberSecurityEssentialsEnglish
P. 35
CHAPTER 3
SHARING INFORMATION SAFELY
A person's ability to communicate with others has undergone one of the fundamental shift’s consequents to
the digital revolution. There were few available channels of communication in the nineteenth century. The
number of communication possibilities has increased in the twenty-first century, providing many
groundbreaking options (e.g., email, cellular phones, instant messaging). Due to the rising digital
communication alternatives, everything has changed because people can now stay in continual contact with
anyone else. Nowadays, anyone may connect with anyone and work together anytime, anywhere.
Unfortunately, many users lack the knowledge necessary to make wise choices regarding information sharing,
which may lead to harm. Therefore, this chapter will guide and help you decide which information to share
and present guidelines to teach your kids how, when and which personal information may be shared.
Information sharing threats
Whenever you interact online, data is produced. There is information about your actions, habits, and hobbies.
Moreover, it can be linked with your personal information, such as your back account or license numbers.
There are also details about your physical self, such as your health. It's simple to feel powerless over the data
gathered about you. However, you may take measures to understand more about the data you're producing
online and how it's being gathered, shared, and used. Based on such understanding, you can protect yourself
and your family against cyber threats, like social engineering, by following simple rules:
Manage your privacy
You can limit how and with whom you share information by using different options on each device,
application, and browser you use.
33

