Enable breadcrumbs token at /includes/pageheader.html.twig

Protection of PII Starts With the Person in the Mirror

Individuals must do their part to secure their information, says guest blogger Glenn Kesselman.

It seems every week we read about a cyber breach that involves millions of records at risk of compromise. Why can’t the big boys get it right? After all, they have large information technology departments and many layers of protection. From the opposite perspective, what did you do today to protect personally identifiable information (PII)?

Do you have unique personal identification numbers (PINs) for all of your passwords? If you answered no, create a priority “to do” and investigate password vaults, accessible from your mobile devices and Web browser.

Did you receive an email that resulted from a hacked email account and address book? Did you reach out to that person and let them know to change the password on their email account and to perform a deep scan of their computer?

What about the periodic emails you receive from organizations, friends and family, where all of the email addresses are found in the “To” field versus the “BCC.” Contact the sender to explain the benefit of using the “BCC” field to protect the recipients’ PII.

Above all, the protection of PII starts with the person in the mirror.