2 min read
Do this exercise with your phone, tablet, and/or any computer you use regularly.
Imagine that someone has accessed your device and can log in and access all information on the device.
- If they were a thief, what information could they access about you?
- If they were a blackmailer, what information could they access about you?
- What information could they access about your friends, family, or professional contacts?
- If you work as a teacher, counselor, consultant, or other type of advisor: what information could someone glean about the people you work with?
As you do this exercise, be sure to look at all apps (on a phone or tablet), online accounts accessible via a web browser, address books, and ways that any of this information could be cross referenced or combined. For example, what information could be accessed about people you "know" via social media accounts?
- What steps can you take to protect this information?
- Assuming that someone you know has comparable information about you, what steps would you want them to take?
Are there differences between the steps you could take, and the steps you would want someone else to take? What accounts for those differences?
When it comes to protecting information, we are connected. At some level, we are as private and secure as our least private and secure friend.