The risks and management challenges in the digital era.

This month I decided it was a good time to start managing all of my passwords, for a long time I had managed all of my information in a pretty simple manner I take little thought about the security issues that some decisions may lead to, something as trivial as a password, the single and only key to most of the websites and common places I visit and something so tight to my web identity that if found it could let to identity thief. Along the years I have created countless accounts, so many to remember even in which website I am or not registered and so I found myself in a vulnerability. In which sites have I registered and how many of those sites have the same password been used? To just imagine this vital and private information in the wrong hands could turn my entire world apart and that was something I was not willing to let happened. Think just for a second that one of this small website is attacked and that its user’s information’s is compromised, this simple slip could cost you a ton of money IF the same password you use for smalltaquito.mx is the same as amazons one.

kvqhycv
-laughs in spanish-

That is the reason I decided that It was time to move on, because my lack of security was placing me at risk for others to make it easy to be hacked. This was my motivation to make use of password managers and get to know how they can change the way I use the internet, how I contact different websites and how to store a secure password.

Accessibility was one of the mayor factors that kept me at bay whenever I tried to use this tools but now is not complicated to move along with my passwords on the other hand, the ease of access is one of the reasons that I like the password manager last pass (see https://www.lastpass.com/es) because it’s easy to keep track of my passwords among many computers, cellphones and tablets or any other digital device I find It easy to use.

Digital Identity

Online identity is a social presence that an internet user stablishes in online communities and websites such as Facebook or twitter.

Untitled
As a whole online identity defines you as a user of the internet.

By expressing opinions on blogs and other social media, users define a tacit identity, which can be considered as actively constructed presentation of one’s self. Many people like myself prefer to use a pseudonym as our personal identity while many others prefer to use their names online.

But what is identity?

Identity is personal identifiable information, this is sensitive information that can be used on its own or combined with other information to identify someone, specifically is any information that can be used to distinguish or trace an individual. through a name, social security number, date and place of birth, mother’s maiden name, home address or email address, passport number, driver’s license number, credit card numbers, telephone number, or any other information that is linked to a specific person.

Untitled
The risks of today digital streaming media sites like twitch has rised a new risk in identity, to be identified on the internet can have severe consequences.

Identity theft

Identity theft happens when someone steals your personal information and uses it without permission. Thieves can run up your credit accounts, get new credit cards, medical treatment, or a job, write stolen or fake, or altered checks, siphon checking and savings accounts, or take out loans for large ticket items, all in your name.

Easy to access for convenience = easy for others to access

And while most of us is aware of the risks of the digital world and we like to believe that what we have is secured there are several risks that happen every day and we have to take in account like for example, there are several web pages where we store our passwords but if there is a security breach and our information is compromised, the atackers may gain our passwords and more information, In the real world many people recicle the same passwords for diferent websites and losing one password compromises several websites. We have to take into accound that the information we handle to companies has to be secured equally to not be tranpased by other people and this is another flaw in security.

References

https://www.lynda.com/IT-Infrastructure-tutorials/Theft-identity/616732/643952-4.html