There are several methods that can be used to secure personal information when surfing the Web and transferring online. Some of the methods include securing internal network and cloud services, developing strong password policies, securing and encrypting Wi-Fi, encrypting sensitive personal data, regularly updating all applications, setting a safe web browsing rules, securing remote access enable devices and creating safe-Use Flash Drive (ICO, 2014).
Read also Developing An Information Assurance Policy
Securing internal network and cloud services
It is important to ensure that personal network is separated from the public internet using a strong user authentication policy enforcement mechanism and systems. This include the use of web filtering proxies and firewalls. Other methods that can be used to secure internal network and cloud services is the use of intrusion detection systems and anti-virus software which is an addition technique for monitoring and securing personal data while surfing (Abliz, 2011). Border routers must be configured to permit only route traffic entering and exiting network’s public IP addresses. This is achieved through deployment of firewalls to monitor suspicious activity crossing the network perimeter.
Developing strong password policies
Strong password policies involves the use of two-factor authentication methods, which requires the user to use two types of evidence rather than using only static password authentication (ICO, 2014). The first aspect is the use of personal security token, which involve the display of changing passcode and the second aspect is the use of password which comprised of alphabetical, numerical and symbols.
Securing and encrypting Wi-Fi
Most people access network through Wireless Local Area Network (WLAN) to browse or check their emails. Therefore, it is important to ensure that personal Wi-Fi is separated from the public network (ICO, 2014). This ensures that public network is not allowed to traverse the personal systems at any point. In addition, wireless encryption is another way of protecting Wi-Fi through the use of Wi-Fi Protected Access 2 (WPA2) encryption.
Encrypting sensitive personal data
Encryption should be deployed to ensure that sensitive personal data is protected from unauthorized persons. There are various methods of encrypting data, but the most common methods is the use of OpenPGP standard which involves the use of GnuPg and PGP which protect data in the transit and stored in the disks.
Read also Federal Government And Backdoor Access to Encrypted Devices or Unwarranted Access to Personal Communications
Regularly updating all application.
It is important to ensure that all network equipment are updated on a regular basis in order to remove and fix the bugs. It is appropriate to use automatic update especially in the case of intrusion prevention systems, web filtering tools and anti-malware application.
Setting safe web browsing rules
This can be achieved through the use of modern web browsing software and a web proxy in order to prevent unauthorized person accessing personal information and data.
Order Unique Answer Now