Online safety and security require us at a minimum to learn and act on Access Protection, Data Protection and
Device Protection best practices
1. Access Protection:
In order to get access to a secure application we need prove our identity through passwords, biometrics, tokens
or other methods. This process is called authentication. Highly secure applications require more than one type of
authentication, generally called multi-factor authentication.
Passwords are widely used for authentication. There are many password best practices available to
prevent bad actors from getting un-authorized access to our applications.
Password Manager tools make it easy for everyone to apply password best practices for creating and
managing strong passwords. DigiCoffer recommends open source password manager Keepass. You can
download and use Keepass instructions created by DigiCoffer.
Biometrics (finger prints, iris recognition, facial recognition) is used a method of authentication finger
print scanner of a smart phone is a good example
2. Data Protection:
Personally identifiable as well as confidential data and documents need to be protected when it is stored,
viewed on a device and when it is traveling through the networks. Further it is essential for individuals to have
control over their data. Generally, many businesses are required to comply with privacy regulations across the
globe. Encryption, hashing and masking are the common data protection methods.
Through Masking the data on a device screen is masked by special characters like asterisks (***) or dots
Hashing and encryption use hash functions and encryption algorithms to convert readable text into an
unreadable output. It is impossible to turn hash back to the original text. But encrypted text can be converted
to original text using key (s), this process is called decryption.
3. Personal Device Protection:
Protecting personal devices from viruses, malware and other security threats is very important. This can be
accomplished by installing commercially available security software. Keeping the security software up to date
is essential to get protection from latest security threats.