Skip to content

10 個減少「數碼足跡」的方法

 

 

 

 

 

在網絡罪案日益增多的時代,限制和管理您的「數碼足跡」是絕對有意義的。「數碼足跡」並不是一個新事物,但足跡分佈在如此多的網站、帳戶和裝置上,到底應該從哪裡開始?

1. 減少下載應用程式
應用程式通常需要用戶輸入個人資料才可以正作運作,程式還可能會追蹤位置、瀏覽活動和其他信息,然後與第三方共享。建議適時檢視您的裝置,並刪除一些很久沒有使用的應用程式。

2. 減少建立帳號
試過在網購時建立帳號並加入信用卡資料嗎?減少建立帳號,讓系統不會紀錄您的付款信息。雖然在下次購物時會帶來不便,但可以更好的保障自己。

3. 保密行蹤
「位置追蹤」是其中一種最具侵入性的數據捕獲方式,第三方可以從中拼湊出關於您日常的活動和習慣,請務必阻止應用程式追蹤您的位置。

4. 禁用第三方 Cookie
Cookie 是在您訪問網站時,下載到您裝置上的小文件,雖然可能會改善瀏覽體驗,但當中可能會洩漏用戶名稱和密碼。如果在訪問網站時出現選擇,只需拒絕接受 Cookie,您還可以通過瀏覽器的私隱設定禁用第三方追蹤。

5. 行使刪除權
「刪除權」是歐盟 GDPR 相關的條例,您可以要求 Google 等科技公司刪除您不喜歡的信息,例如位置追蹤、搜索引擎紀錄或整個帳號。

6. 對敏感資料提高驚覺
有時為了獲得您想要的產品或服務,提供信息是不可避免的,但請對敏感資料提高驚覺,特別是電話號碼、電子郵件和家庭住址、財務等信息。

7. 不要填寫網上問卷
互聯網上充斥著網上問卷,通常以現金或禮物吸引人填寫,當中有可能會竊取您的個人信息用於網絡釣魚活動或在暗網上出售。

8. 減少訂閱品牌通訊電郵
如果您對某些品牌不太感興趣,可考慮使用專用電子郵件地址或一次性電子郵件帳戶。對大部份人來說,這些品牌通訊電郵只會堵塞我們的收件箱。

9. 謹慎使用社交媒體
考慮其他人和潛在雇主如何接收這些內容,當中是否包含有關您工作和個人生活的敏感信息,建議只添加您在現實生活中認識的人。

10. 限制您的裝置數量
最後,考慮您有多少個裝置和電腦處於活躍使用狀態。它們每一個都是潛在的數據寶庫,如果裝置丟失或被盜,這些數據可能就會洩漏。您真的需要購買那款新平板電腦嗎? 如果答案仍然是「是」,請考慮是否需要將所有個人數據同步到這個裝置?

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

10 個減少「數碼足跡」的方法

 

 

 

 

 

在網絡罪案日益增多的時代,限制和管理您的「數碼足跡」是絕對有意義的。「數碼足跡」並不是一個新事物,但足跡分佈在如此多的網站、帳戶和裝置上,到底應該從哪裡開始?

1. 減少下載應用程式
應用程式通常需要用戶輸入個人資料才可以正作運作,程式還可能會追蹤位置、瀏覽活動和其他信息,然後與第三方共享。建議適時檢視您的裝置,並刪除一些很久沒有使用的應用程式。

2. 減少建立帳號
試過在網購時建立帳號並加入信用卡資料嗎?減少建立帳號,讓系統不會紀錄您的付款信息。雖然在下次購物時會帶來不便,但可以更好的保障自己。

3. 保密行蹤
「位置追蹤」是其中一種最具侵入性的數據捕獲方式,第三方可以從中拼湊出關於您日常的活動和習慣,請務必阻止應用程式追蹤您的位置。

4. 禁用第三方 Cookie
Cookie 是在您訪問網站時,下載到您裝置上的小文件,雖然可能會改善瀏覽體驗,但當中可能會洩漏用戶名稱和密碼。如果在訪問網站時出現選擇,只需拒絕接受 Cookie,您還可以通過瀏覽器的私隱設定禁用第三方追蹤。

5. 行使刪除權
「刪除權」是歐盟 GDPR 相關的條例,您可以要求 Google 等科技公司刪除您不喜歡的信息,例如位置追蹤、搜索引擎紀錄或整個帳號。

6. 對敏感資料提高驚覺
有時為了獲得您想要的產品或服務,提供信息是不可避免的,但請對敏感資料提高驚覺,特別是電話號碼、電子郵件和家庭住址、財務等信息。

7. 不要填寫網上問卷
互聯網上充斥著網上問卷,通常以現金或禮物吸引人填寫,當中有可能會竊取您的個人信息用於網絡釣魚活動或在暗網上出售。

8. 減少訂閱品牌通訊電郵
如果您對某些品牌不太感興趣,可考慮使用專用電子郵件地址或一次性電子郵件帳戶。對大部份人來說,這些品牌通訊電郵只會堵塞我們的收件箱。

9. 謹慎使用社交媒體
考慮其他人和潛在雇主如何接收這些內容,當中是否包含有關您工作和個人生活的敏感信息,建議只添加您在現實生活中認識的人。

10. 限制您的裝置數量
最後,考慮您有多少個裝置和電腦處於活躍使用狀態。它們每一個都是潛在的數據寶庫,如果裝置丟失或被盜,這些數據可能就會洩漏。您真的需要購買那款新平板電腦嗎? 如果答案仍然是「是」,請考慮是否需要將所有個人數據同步到這個裝置?

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

How to Guarantee a Completely Secure Migration to M365

Many organizations are now choosing to migrate to Microsoft 365 for a number of reasons including collaborative working options and Microsoft 365. Doing so has a number of advantages, but the movement of data can be difficult. A main consideration during the migration process can be maintaining data integrity whilst securing the data throughout the migration. Here are some migration security measures to consider to ensure a secure migration to Microsoft 365.

 

Encryption of Data
End-to-end encryption is the most secure way to communicate securely and with privacy online. The messages are encrypted at both ends of the conversation which prevents anybody in the middle from reading the private communications. Neither hackers nor unwanted third parties can access the encrypted data on the server.

CloudM Migrate has end-to-end encryption between migration endpoints. The option to Self Host CloudM Migrate will completely isolate your migration data from your source environment to the destination cloud tenant.

Both primary and secondary servers use the following components to temporarily store migration data during a migration.

  • Encrypted SQLite databases (AES256)
  • Encrypted temporary file storage (AES256)

Where CloudM Migrate requires a username or password to interact with a system, and stores sensitive data like this, that data is stored encrypted within SQL Server (AES256). SQL Server 2019 Express is installed by default but you can specify your own SQL instance.

Know your source data
Before you start migrating data, you need to know exactly what it is you’re moving. Ensure you know the format of the data, where it is in the system, and if it does actually need to be migrated. Ensure the data is clean and any data that does not need to be kept, can be disposed of to reduce costs and decrease the chance of security risks.

Know your destination
Knowing everything about where the data is coming from is half the battle, the other half is knowing where it’s going.

Ensure that you know the exact destination your data will be going to. From simple things like username conflicts to license fees, the new system will have its own set of rules and regulations.

For example, if you are moving from a legacy endpoint to Microsoft 365, you need to know that all data will be working as expected and the appropriate security compliances are in place. It is also important to ensure everything will be compatible
Back up data
Before the migration begins, ensure all data has been backed up, especially the files you will be migrating. If there are any issues or problems during the migration, such as corrupt or missing files, then you can always restore from the backup.

Get us to help
Migrations are a specialized area, bringing with them their own challenges and solutions, and the right advice from experts like us can make things go a lot smoother. It’s important to understand your limitations, as mishandling a migration can have disastrous consequences.

We know how important security is during migrations. Move to the cloud with confidence with guaranteed data integrity with zero downtime for users with our secure cloud migration tool.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CloudM
CloudM is an award-winning SaaS company whose humble beginnings in Manchester have grown into a global business in just a few short years.

Our team of tech-driven innovators have designed a SaaS data management platform for you to get the most from your digital workspace. Whether it’s Microsoft 365, Google Workspace or other SaaS applications, CloudM drives your business through a simple, easy-to-use interface, helping you to work smarter, not harder.

By automating time-consuming tasks like IT admin, onboarding & offboarding, archiving and migrations, the CloudM platform takes care of the day-to-day, allowing you to focus on the big picture.

With over 35,000 customers including the likes of Spotify, Netflix and Uber, our all-in-one platform is putting office life on auto-pilot, saving you time, stress and money.

Introduction to CloudM Migrate Self Hosted

Cloud migrations are complex, always changing, and unique to every organization. You need the flexibility and control to tackle your project in the way that suits you best. This is why we have multiple migration deployment options to suit all businesses. In this blog, we break down exactly what CloudM Migrate Self-Hosted is as well as explain security, endpoint, and installation information so you have more guidance when selecting a deployment option. Definition CloudM Migrate Self-Hosted is the downloadable version of CloudM Migrate, ideal for large and complex migrations. Migrate (Self-hosted) is highly configurable, allowing you to complete the most complex and demanding migrations seamlessly. Using our web interface, you can run a multitude of virtual machines to complete your self-hosted migration to Microsoft 365. Once set up in your environment, Migrate (Self-hosted) can securely migrate your mailboxes, files, SharePoint sites, mailbox archives, and more to Microsoft 365. Security If the organization has compliance obligations that do not permit you to use a third-party service, Migrate Self-Hosted is most appropriate. The software can be run behind your own organization’s firewall, critical data is kept internally and no other party has access to it. CloudM Migrate already has end-to-end encryption between migration endpoints. The option to Self Host CloudM Migrate will completely isolate your migration data from your source environment to the destination cloud tenant. CloudM has adopted the ISO 27001 standard as its framework and is externally certified. ISO27001 is one of the most popular information security standards in the world, focusing on protecting three key aspects of information; confidentiality, integrity, and availability. Installation Basic installation will install all components to a single machine and is suitable for performing migrations from a single server or as the main server in a multi-server migration. If you have specialized requirements, have a pre-existing SQL Server instance you would like to use, or will be performing multi-server migrations using a server farm, you should also review the advanced installation documentation. The following components makeup and are used by CloudM Migrate:
  • Web Application and Primary Service
  • Secondary Service
  • SQL Server Express 2017
  • Redis
Clustering With Self-Hosted the option to create a cluster of CloudM Migrate servers can be leveraged to increase migration velocity. Each CloudM Migrate cluster node can handle processing 20 migration threads. While this does increase velocity, more nodes do have ever-decreasing returns in overall velocity as destination throttling ramps up. Legacy Endpoints Moving legacy applications to the cloud can help to address multiple concerns businesses have regarding their data storage needs. Every business wants to be agile, flexible, up-to-date & adapt quickly to demand. CloudM helps businesses achieve these goals by supporting a wide range of source and destination endpoints, enabling migrations from almost any platform including various legacy endpoints. We’re here to help inform you about the most compatible deployment options for your business. Get in touch today to discuss your available options with one of our experienced solutions architects.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CloudM
CloudM is an award-winning SaaS company whose humble beginnings in Manchester have grown into a global business in just a few short years.

Our team of tech-driven innovators have designed a SaaS data management platform for you to get the most from your digital workspace. Whether it’s Microsoft 365, Google Workspace or other SaaS applications, CloudM drives your business through a simple, easy-to-use interface, helping you to work smarter, not harder.

By automating time-consuming tasks like IT admin, onboarding & offboarding, archiving and migrations, the CloudM platform takes care of the day-to-day, allowing you to focus on the big picture.

With over 35,000 customers including the likes of Spotify, Netflix and Uber, our all-in-one platform is putting office life on auto-pilot, saving you time, stress and money.

The Rise of Iran-Sponsored Threat Actors

In mid-summer of 2022, Albania accused the Iranian government of targeting them with a series of major cyberattacks. The attacks, which targeted government servers and online portals, raised alarms about the increasing expertise and audacity of Iranian-sponsored advanced persistent threat (APT) actors. Although many specifics about the attacks are still unknown, the FBI and other international observers believe that the Iranian government first breached the networks of the Albanian government by using phishing emails and malware as early as 14 months before launching the full attack. After gaining access, the attackers were able to penetrate deeper into the systems to obtain sensitive information and cause disruption to government operations.

Continue reading
×

Hello!

Click one of our contacts below to chat on WhatsApp

×