How to protect your personal information. PIM Tips

How to protect your personal information. Personal Information Management (PIM) safety tips to follow.

Your personal information management is your responsibility. No-one else cares, or is going to protect you from “Bad People” doing bad things to you. “A study conducted earlier this year by the Ponemon Institute revealed more than three-quarters of the nearly 2,500 IT professionals questioned in five countries admitted their organizations suffered a data loss sometime within the past twelve months.”

Granted, this study and report is about data associated with business of all sizes. BUT, and this is a big BUT…. These business usually have someone that is skilled and paid to watch out for this kind of mischief. You as an individual must be diligent, smart, and cautious at all times. Below are tips that are offered within this set of findings that I am paraphrasing as they would / should be implemented by individuals such as you and me, as we try to secure our personal information.

1.) Immediately change all default and simple-to-guess passwords when you are setting up your electronic systems, or establishing relationships with services on the Internet.


2.) Keeping all software patches up to date. Not only will this give you the latest versions as far as features are concerned, but this is very important because software updates give you the latest security patches that protect you from “Bad People” doing bad things. An example: There is an entire industry trying to “Hack” into online services like Google, Yahoo, AOL, Facebook, Twitter and others. These people have figured out very cleaver techniques to wreak havoc on individuals systems and data. The firms mentioned above, and others spend hundreds of millions of dollars a year to keep their systems safe and secure. Firms like Symantec that sells Norton Security products, and McAfee to name a few, spend tens of millions each to keep you, their customers safe from the latest threats. They disseminate their findings and security techniques via software updates called “Patches” on a regular basis. My personal philosophy is to always update to the latest revision levels.

3.) Permission Management – Meaning, control who has access to your data. Never let a stranger use your system!! And that includes you phone. Examples abound. It is generally a pretty bad idea to let an un-knowing child download materials and programs onto your critical systems. (Like the Notebook you use for work!!) They may download a virus, and corrupt your system, and or your data. IF and when this ever happens, I suggest you use the services of an expert to clean up the mess. I do.

Hope these tips help.


Peter Gailey
Your Personal Information Coach


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>