- 10/18/16NPO 3 dedicates two weeks to privacy
- 10/18/16The importance of unsolicited advice
- 04/05/16Number of viruses in email increases
- 03/09/16Proactive server and network monitoring through a new monitoring system of Icinga
- 02/10/16Nearly 50 kilometers of cable
- 02/03/16Alpe d’ HuZes | Dennis and Juul six times to the top!
- 11/16/15Impact compulsory notification data leaks
- 10/29/15Maintenance transformers performed without a hitch
- 09/21/15Is your IT environment ready for IPv6?
- 07/30/15Continuous tension: New UPSs BIT-2A
- 07/29/15Help, my IP addresses have been stolen!
- 06/23/15New Routers Put Into Operation
- 05/15/15A redundant network for an optimal operational reliability
- 05/07/15Behind the scenes: "Upgrade generators for more power"
- 05/04/15Datacenter industry is no pollutant
- 04/07/15The function and importance of DNSSEC
- 04/07/15Power Outage: The importance of a 'black-building-test'
- 04/07/15Yes, that worked out great
- 03/23/15How a little Open Source Project can make a big difference
- 02/25/15A taste of IPv6 please
- 02/20/15Nothing at all to hide?
- 12/17/14Drone Recordings at BIT
NPO 3 dedicates two weeks to privacy
As of this week television network NPO 3 is dedicating two weeks to the topic of privacy. What do we actually know about our online privacy and how important is it to us? Everyone has to deal with this daily. NPO 3 is airing programmes like Hunted, classes of the University of the Netherlands and many documentaries in which several aspects of privacy are being highlighted. More information on the content of these programmes can be found on https//www.bit.nl/npo-privacy.
We would like to give you some tips too!
1) Use a secure connectionSince January 2016, the obligation to report data leaks has been enforced and the processor of personal data can be held responsible for these data leaks. By using a secure HTTPS connection, it is prevented that privacy sensitive information can be used with malicious intent.
2) Use DNSSECIf a malicious user manages to alter the DNS information on the name-server, during transfer or with the client, he can send the internet user to an identical but fake webserver (DNS spoofing). The user has no way of noticing: the website in an exact copy and even the lock sign is present. This intercepts login, personal or business data. DNSSEC protects the name server and the transport of the DNS information. This is a guarantee for the user that his internet traffic gets to the right place.
3) The weakest link: manICT security is only as strong as its weakest link. And even though hackers attack networks on a daily basis, practice shows this is not the greatest threat though; much trouble can be prevented with technology. The weakest link is still the user. An employee reacting on a phishing email, typing in his or her email address on random websites and lost or lingering USB sticks containing confidential information are just a few examples.
By: Larissa Wiedeman