top of page
Search

What is Digital Identity and How to Protect It

  • Kreo Estrategias
  • Jan 31, 2023
  • 5 min read

Updated: Feb 13, 2023

Digital identity, also known as identity 2.0, identifies a person in the online environment.

ree

In the network, in addition to keeping the same data as in the offline world, personal identity is completed through actions: comments on publications, likes on Facebook, retweets, photos on Instagram, signed petitions for organizations, etc. All these interactions contribute to the perception that others have about each one.

At a time when digital identity theft is the order of the day, you need to be trained in best practices to protect yourself.


Personal identity

In the analog world comprises a series of characteristic data such as name, surname, date of birth, sex, educational level, etc. Some of these are on the identity document.

Digital identity

Encloses a large amount of data provided on the network: photographs, preferences, email, etc. It is not uniform because different attributes are shared on other platforms.


Characteristics of digital identity

A series of features have been identified by the OECD (Organization for Economic Cooperation and Development) to define the concept better and understand its dimension:

  • It is social: it is built by browsing social networks based on the recognition of others, without even checking if that identity is confirmed.

  • It is subjective: it depends on how the rest of the users perceive that person through their generated information.

  • It is valuable: on many occasions, the information available from a candidate on social networks is investigated by companies to make decisions, for example.

  • It is indirect: it allows one to know the person only by the references published about it in the online environment.

  • It is composed: it is built through the contributions of the same person and those of others without the need for their consent.

  • It's real: digital information can have positive and negative effects in the real world.

  • It is contextual: it is essential to assess the need or not to maintain separate identities depending on the context, since the disclosure of information in the wrong context can harm the digital identity.

  • It is dynamic: it is always in constant change or modification.


How is a person identified on the Internet?

It is increasingly common to make an online purchase or carry out banking operations from the mobile app. This is a great advance, but it also poses significant challenges in terms of the security of digital identity and the privacy of personal data on the Internet.

In this sense, one of the main challenges is to develop systems so that anyone can prove their identity in the digital sphere. In other words, they can prove that they are who they claim to be when they want to buy or access an online service.

From here, the concepts of online identification and authentication arise. While identifying yourself is saying who you are, authenticating yourself is proving that you are who you say you are.


Normally, to access an online service, you identify yourself through your name and/or email, and authenticate yourself through a password. Given the rise in cybercrime, authentication systems are becoming increasingly sophisticated, using dynamic keys, facial recognition, and digital signatures.


Digital identity theft

Digital identity theft is one of the most frequent cybercrimes. If it happens, the cybercriminal can agree to make purchases on your behalf and can also damage your reputation on social networks.


Tips to protect digital identity

1. Do not use unprotected Wi-Fi networks

Free or public Wi-Fi networks usually do not have WPA or WEP encryption, so they are not secure. So if you have to connect to some kind of site or app with sensitive personal information, particularly a banking service, don't use it.


If you have no other option, at least make sure that you can browse safely, accessing only pages that use the https protocol.

2. Do not use unprotected web pages

Even though you are using private Wi-Fi, it is also important that you browse web pages that use the HTTPS (HyperText Transfer Protocol Secure) protocol. This protocol means that the information that circulates is encrypted, and nobody can intercept it.

3. Use strong passwords and change them regularly

Passwords are the main resource to protect digital identity, and perhaps they are not given the importance they have.


Strong passwords must be at least 16 characters long, mixed case, and alphanumeric. As well as not using the same one for everything.

Since they are difficult to memorize, especially if they are secure, it is highly recommended to use a password manager.


4. Update your software regularly

Whether you use Windows or Mac, the operating systems are updated with some frequency. Every time a new update is released, a prompt appears on your computer asking if you want to proceed with the update (in some cases, it is automatic). It is important not to delay the process, even if it means having to restart the computer and wait a few minutes. Each update supposes an improved version of the software, including reinforcement in its security.

5. Review permissions and privacy policies

All the social networks you use have their privacy policy. Currently, they allow you to control what you want to be published about you.

Review those privacy policies and review the permissions you grant to each social network. Perhaps you are not interested in having a public profile on Instagram, or you want to approve each photo in which you are tagged on Facebook, to decide whether or not it appears on your wall.

6. Monitor your name regularly

Surely you have searched for your name on Google at some time. It is advisable to do it from time to time to check that you still have control of most of what appears.

7. Set up an external drive for data storage.

It is recommended to back up your computer data to an external hard drive. Also, it is advisable to keep printed the most important documents, such as financial documents and family photos. If your digital copies are compromised, you'll have hard copies. Be sure to store them in a fireproof box or safe deposit box.

8. Think before you download an app.

Even some apps on mobile devices can be an opportunity for hackers to steal your information. They may seem harmless or have rave reviews, but once downloaded, they infect your phone with Malware. Some signs of Malware include sending text messages or emails you didn't write or look for other mysterious apps you didn't download on your phone. It is advisable only to download apps from reputable companies and official sites.

9. Use social media safely.

Social networking sites can serve as entry points for identity thieves. Because of this, you should avoid excessive sharing on social media. Ensure your profiles don't include personally identifiable information like your full name, birthday, or other essential account numbers. As a general rule, the less information about you is publicly available online; your digital identity will be more secure.

Your data is a valuable asset. Taking some proactive steps can help safeguard your digital identity.



Contacto: Mario Barboza | mbarboza@grupocomeca.com

 
 
 

Comments


If you have any news that you would like us to cover, don't hesitate to contact us.

boletin@grupocomeca.com

© 2022 Grupo Comeca S.A.

bottom of page