With the popularization of information technology such as the Internet and big data, personal information leakage and the violation of public privacy have greatly disturbed public life, and are also becoming a “hotbed” for breeding crimes. The current cases involving personal information disclosure have several characteristics:
The access of citizens’ personal information by criminals is more accurate and targeted
Industry experts pointed out that the efficiency of fraud implementation has been greatly improved under the “accurate portrait” of big data. Taking the “fake customer service” fraud as an example, the fraudster obtained a large number of customer information on the e-commerce platform through illegal means. Customers often receive calls from the fraudster and are induced to make loans or payments within a short time after placing an order to purchase goods. The reporter found in some “telemarketing customer resources” groups that some people sell e-commerce customer information. At present, the reason for large-scale personal information leakage is that illegal elements obtain information illegally through hacker technology or “insider” appears inside the enterprise to sell information for profit.
The diversity of information collection subjects and scenarios brings security risks
In recent years, in the application process of big data technology, personal information and other data collection channels are complex, storage media are diverse, and there are many contacts. Inappropriate use and handling of data has caused many personal information leakage events. In addition to the traditional organizations for collecting personal information such as public security, basic telecommunications enterprises and public transport, grass-roots organizations such as property companies have also become new collection subjects. The collection, summary, transmission and disclosure of personal information have multiple links and many people, and any link failure may lead to data leakage, loss and abuse. In particular, the data without any trace mark can not be identified as the source of the leakage, so it is difficult to carry out accountability.
There are many types of information, which can easily lead to more serious secondary crimes. Because some personal information involves sensitive content such as accommodation, property, credit investigation and trajectory, it is very easy to lead to kidnapping, fraud, extortion and other related crimes. For example, some criminals use illegally obtained citizens’ personal information to send false winning information to defraud, use some financial software vulnerabilities to defraud property, and use hotel room opening records and other accommodation information to blackmail related personnel. In addition, the interference caused by information leakage to mobile communication tools and payment tools in daily use has a wide range of hazards and a large number of victims.
WiFi that can be connected everywhere, wanton pop ups, unknown apps, high margin scalping, carefully designed routines, etc. are all hidden traps, and personal information may have been leaked unknowingly. How to protect citizens’ personal information? Industry experts made the following suggestions:
Strengthen the application of security technology
Personal information security should be strengthened through technical means, such as embedding firewall mechanism, conducting personal information security impact assessment when establishing information systems or sharing data for development, utilization, classification and hierarchical management of personal information, establishing and standardizing the limit and trace system of system proxy, encrypting and storing personal sensitive information, unifying electronic identity authentication terminal management, and strengthening network security Application of blockchain and other technologies.
Pay attention to the management of personal data information
Institutional units that collect, control or process data, including governments, enterprises, hospitals, etc., should strengthen the compliance management of personal data protection, and it is necessary to strengthen the compliance training of personal data protection, appoint data protection compliance officers, and establish corresponding systems and processes as the premise for conducting business.
Improve relevant laws and regulations, strengthen supervision and attack
The “streaking” of public personal information violates the original intention of technology application and needs to be regulated by law. There are still some loopholes in the existing laws on personal information protection, which should be detailed according to the changes in social development and technological progress, and fully respect the rights of the public, such as the right to know, the right to consent, and the right to regret, while ensuring the security of public information and the application of technology.
Enhance personal information protection awareness
Individuals should take precautions from the use of electronic products and networks. For example, they should not fill in, share or discard personal information at will, try not to enter personal accounts and passwords on public electronic devices, avoid using unknown public networks for online payment, not easily receive and install unknown software, and try not to expose their true identity, family residence, children’s situation and other information excessively in the circle of friends, After the personal certificate is lost or personal information is leaked, the certificate shall be reissued and the account number and password shall be changed at the first time.
To protect your virtual machines, Vinchin offers solutions such as VMware backup for the world’s most popular virtual environments, XenServer backup, XCP-ng backup, Hyper-V backup, RHV/oVirt backup, Oracle backup, etc.