KUALA LUMPUR, Oct 6 — Beware. Today’s hackers are after five personal data that you use for your password — full name, identity card number, handphone number, home address and email address.
“For example, the last four digits of the IC are ‘0000’ with the same digits used for the email address...the chances are high for the user to use similar digits for other passwords. The cases recorded included cyber bullying, falsification, hacking, phishing and e-mail scams which are increasing each year.“Data privacy may be difficult to determine but users can empower data sovereignty, meaning that they know their data is used and for what purpose. That is what we are striving for to ensure the overall security of users’ data is safeguarded,” he said.Touching on basic data storage technology, Siraj said it is kept in the server and controlled by the intermediary.
“Blockchain technology, often linked to Bitcoin, refers to decentralised data technology, which differs from centralised data as every transaction process requires prior confirmation from the community . “Almost all big corporations will have a centralised data centre in the country and will store their data there. However, once the data is kept at the owner’s data storage centre, is there a guarantee that the party that stores and protects the data would not misuse the data?”
She also suggested that users create a password with unique identification and be cautious of suspicious phone calls and at the same time understand the basic requirements in the cyber space. “This is one way of avoiding identity fraud in the cyber space and users can activate their password through the 2FA or Two Factor Authentication as a security measure. .
“Our people often take a quick and easy approach in using either devices or online applications but are lacking in risk assessment of their actions. Besides that, the inability to analyse risks or to factor in cyber communication aspects also contributed to the problem,” he added. “The extreme apps culture and the herd mentality attitude also pose risks for netizens. From other aspects, authorities in digital communication should seek a more effective control and monitoring mechanism.
Malaysia Latest News, Malaysia Headlines
Similar News:You can also read news stories similar to this one that we have collected from other news sources.
Source: msianinsight - 🏆 8. / 63 Read more »
Source: malaymail - 🏆 1. / 86 Read more »
Source: theSundaily - 🏆 25. / 51 Read more »
Source: therakyatpost - 🏆 14. / 59 Read more »
Source: therakyatpost - 🏆 14. / 59 Read more »
Source: staronline - 🏆 4. / 75 Read more »