If we ensure that our things can’t be lost, get damaged or are intruded, they’re secured. But does that play well with privacy? There definitely is a relationship, but in this case, its status would be… complicated.

From my Security in 60 Seconds series at iWelcome

So how are they friends?

If we look into privacy law, we see that security plays an integral part. After all, if your personal information gets breached as a result of a security flaw, then your privacy is surely violated. So, privacy needs security.

Passwords. They suck, but we can make them safe and simple. And hopefully, you only need to create and remember one: your master password. Let your password manager deal with all the others.

From my Security in 60 Seconds series at iWelcome

False beliefs

Let’s kick it off by debunking some false beliefs. You shouldn’t need to keep changing your password, and you really don’t need funky characters or capitals for it to be strong.

Prevention is better than cure, whether it regards our bodies, our cars, or our work.

From my Security in 60 Seconds series at iWelcome

One question

Every time you create a new process or software component, ask yourself: how might this risk our customers’ privacy or security risks further down the road? Doing so will help you to reduce tricky problems and costly changes over time, when privacy and security requirements inevitably pop up later.

Information is power, but with great power comes great responsibility. Don’t inherit Spiderman’s curse by claiming all your company’s data. If it comes to security, less is more. After all; what cannot be reached, cannot be leaked nor hacked!

From my Security in 60 Seconds series at iWelcome

You are trusted

Sure, it’s convenient to be able to login everywhere, and to be able to enter every resource on the network. Plus, it feels nice, doesn’t it? But if your computer gets hacked one day, for example through a virus, then all that access can expose all secrets that were entrusted to you.

Today’s business world is moving fast, so you should too. And in order to win the race, your equipment needs to be the latest & greatest. Prioritize your pitstops so you won’t end up in the gutter!

From my Security in 60 Seconds series at iWelcome

Complexity is security’s worst enemy

Today’s software is complex, and that means vulnerable. Your laptop, mobile phone and browser specifically need their software updates to fight off the hackers.

At its core, our right to privacy means having the right to be left alone. Regarding personal information, that means not asking for it if you don’t really need it. It’s the principle of data minimization under European privacy law, and it’s beneficial for both consumers and organizations.

From my Security in 60 Seconds series at iWelcome

Don’t ask for it

Say we have a registration form to order online tickets for an event. If I need an e-ticket to show at the door, I probably want to get it by email. So, let’s give ’em my online address. Perhaps, my name, if they…

Pollution is real. Do recycle in the real world, just don’t do it online!

From my Security in 60 Seconds series at iWelcome

Don’t be funky

Securing your online accounts might work differently than you think. For passwords, we’ve all been told to use capitals and funky characters, right? That usually ends up like “i<3cats$”… or “SuperS3cr!t”. And because these passwords are difficult to remember, we apply it to email, and that one newspaper, and why not to our bank account as well. That’s password recycling and that is bad. Let me explain why.

Who is responsible for security at work? The security officer, or IT? Of course not. Everyone owns security within their own team. Just as you lock your door at home, security is part of your everyday routine.

From my Security in 60 Seconds series at iWelcome

Security is not a task

This may sound like extra work, while in fact, it isn’t. Would you put washing your hands as a chore on your daily to-do list? Of course not, because it’s effortless. You do it without thinking!

Scammers send millions of phishing emails every day. How to spot them in your inbox? Check for legitimacy, monitor your emotions, and switch to verify. I’ll explain these three tips to keep you secure.

From my Security in 60 Seconds series at iWelcome

First, check for legitimacy.

Scammers usually include slightly wrong URL’s or have email attachments that are uncalled for. Sure it’s interesting to take a peek in your company’s payroll sheet, but how likely would it be sent to you by mistake?

Often, scammers also make small mistakes in spelling or layout. Such cues are your red flags to watch out for.

Choosing a password that is easy to use and safe against hackers seems difficult nowadays. Way too often, big organizations and websites are found to be vulnerable to hackers and leak millions of our passwords. Especially for this reason, it’s important to create strong passwords that are also unique for every system account you use. If you apply these five tips, you will be well protected — and without too much effort.

TIP #1. Use a story phrase instead of only one word

As we’ve been told for years, longer passwords are better than short ones. Eight characters should be the absolute minimum, but did you know that having long ones…

Rens van Dongen

Chief Information Security Officer (CISO) at iWelcome

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store