{"id":866,"date":"2020-07-22T13:25:34","date_gmt":"2020-07-22T13:25:34","guid":{"rendered":"http:\/\/zikzag.wgl-demo.net\/?p=866"},"modified":"2021-12-23T14:44:49","modified_gmt":"2021-12-23T14:44:49","slug":"how-to-protect-data-in-2020","status":"publish","type":"post","link":"https:\/\/stash.global\/how-to-protect-data-in-2020\/","title":{"rendered":"How to Protect your \u2018New Normal\u2019 Data in 2021"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

2020 was a crazy year and, though 2021 feels like things are a bit more stable, with so many working from home there are more and more opportunities for people to have their data compromised. Here are some tips from the STASH\u00ae<\/span> team to help you make sure you\u2019re safe on the web.<\/span><\/p>

Tip #1: Practice Proactive Awareness<\/strong><\/p>

A quick trip to<\/span> https:\/\/haveibeenpwned.com\/<\/span><\/a> will tell you whether or not your information has been compromised in a past data breach. With almost 10 billion accounts that have been \u201cpwned,\u201d it\u2019s highly likely that either your current or previous login credentials are compromised.<\/span><\/p>

It\u2019s not just the rich and powerful who need to worry about a data breach; all of us have sensitive information that we need to keep safe. Often, cybercriminals look specifically for ordinary people to steal from because they know their information is usually less protected due to lack of data security. <\/span>Creating a secure password will ensure that your online accounts don\u2019t end up in a public data leak.<\/span><\/a><\/p>

Forget about easy to remember passwords completely. If you can remember them, you are an easy hack. While most sites won’t even let you save the obvious ones (like 12345 or password) you should get into the mental habit of jettisoning even the idea of familiar passwords.<\/span><\/p>

There are many resources that will generate and even store strong passwords, <\/span>like LastPass, Nordpass and others.<\/span><\/a> These are long and random strings of text that are unlikely to be guessed by an algorithm or an attacker. You can also store these in a separate and secure password manager for ease of use.\u00a0

<\/span><\/p>

Tip #2: Get Creative – use a different password for every account!<\/strong><\/p>

Even though you instinctively know that \u2018Yourdogsname123\u2019 is a very poor password, many of you will take the risk because it\u2019s fun and familiar to have a password you think of as \u2018yours\u2019. STOP.\u00a0<\/span><\/p>

If your social media accounts aren\u2019t private, anybody can log onto Facebook and see that your dog\u2019s name is Chip. If you happen to use that same password everywhere for the sake of convenience, you are in even more trouble.<\/span><\/p>

If someone gains access to one of your accounts, they can quickly try the same login information across the board. Using a different password on every account ensures that, in the case of a data breach, <\/span>you can work to protect your other accounts while recovering your lost information<\/span><\/a>.<\/span><\/p>

\u00a0A smart data protection strategy keeps your passwords unique and stored in secure locations. Online or offline. Last, change them up once a quarter – with a password generator app, this becomes much less painful than it may seem.

<\/span><\/p>

Tip #3: Privacy is alive and well – protect yours.<\/strong><\/p>

You\u2019d be surprised just how much information you reveal to the world via social media. Things like mother\u2019s maiden name, best friends, and past employers all are potential answers to security questions. Some social media accounts even allow you to display your phone number and email address.<\/span><\/p>

A skilled hacker can crack a \u201ccomplex\u201d password in as little as 2 hours, and that timetable decreases significantly with more information. Making your accounts private gives you more control over who can access your personal information, which is something you should care about in 2021 and beyond..

<\/span><\/p>

Tip #4: Avoid giving out your email address as much as possible.<\/strong><\/p>

Many people use throwaway emails to sign up for coupon codes, promotional updates, and discounts so that they don\u2019t expose their personal email accounts.\u00a0<\/span><\/p>

Your email addresses and usernames are examples of personally identifiable information that should be protected. The first thing that someone needs to access your account are those usernames, so avoid submitting that information to untrustworthy sites.

<\/span><\/p>

Tip #5: Avoid keeping your sensitive data on big data platforms.<\/strong><\/p>

Over the past ten years, the track record of cloud-based data aggregates like <\/span>Dropbox<\/span><\/a>, <\/span>Google Drive<\/span><\/a>, and <\/span>Adobe Cloud<\/span><\/a> has been abysmal. The problem with these operating systems is that they are too big, too automated, and keep everyone\u2019s files and folders in the same big \u2018bin\u2019 \u00a0 If someone gets in <\/span>(this isn\u2019t the first time for Dropbox) <\/span><\/a>\u00a0<\/span><\/p>

Everyone’s stored files, including yours of course, are there for the taking. For instance, if someone gains access to your personal Gmail, they can automatically access all of the information in your Drive. Keeping your most sensitive data away from these larger platforms reduces the likelihood that your information will be a part of a more substantial data breach.

<\/span><\/p>

Tip #6: Keep your files private and secure with STASH\u00ae.<\/strong><\/p>

At STASH\u00ae<\/span>, our primary goal is protecting what matters most: the data itself. The amount of information on our electronic devices combined with the time we spend looking at our screens, a breach is just waiting to happen.<\/span><\/p>

There is a BIG difference between a secure cloud and security in the cloud. A secure cloud typically protects the pathways that carry your data in and out of that cloud – this is what most security tools do. Security in the cloud is what STASH\u00ae<\/span> does instead. Rather than attempting to protect your data by protecting the pathways (this is called defensive security) , we focus on protecting your data at the data level.\u00a0<\/span><\/p>

That means even when attackers get access to your data inside the cloud, they don\u2019t have access to all the pieces that STASH\u00ae<\/span> has encrypted and keeps in multiple places. Attackers are foiled. They would have to find every piece, put them back together, and break the encryption of each piece before they could see your data.\u00a0\u00a0<\/span><\/p>

The possibility of this happening is statistically almost impossible. Instead of trying to protect your documents, folders, pictures and videos by simply keeping them in an insecure cloud, secure them in any cloud, anywhere,\u00a0 by protecting them with STASH\u00ae<\/span>.<\/span><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"

On the other hand, organizations have the need for integrating in IT departments new technologies often using cloud services and other ways of direct access to the web. This pressure for IT departments to give…<\/p>\n","protected":false},"author":4,"featured_media":7642,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"audio","meta":{"nf_dc_page":"","footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/posts\/866"}],"collection":[{"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/comments?post=866"}],"version-history":[{"count":0,"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/posts\/866\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/media\/7642"}],"wp:attachment":[{"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/media?parent=866"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/categories?post=866"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/tags?post=866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}