You're Opted in by Default - Know When and Where to Opt Out

F5 Labs' Preston Hogue writes for Security Week, explaining how to manage the personal data you have spread across the internet in an assume breach world.
February 15, 2019
1 min. read

There’s no doubt your information is out there. And at a certain point, you have to assume it’ll be exposed.

So now what? With everything that’s happened in cybersecurity over the past few years and in the wake of so many high profile breaches all over the world, it’s time for a shift in mindset.

As individuals and consumers, we can’t control everything. We can’t just go in and audit our banks, medical providers and creditors to ensure our personal information is secure. We can’t even avoid sharing our information in many cases.

But at the same time, we do have some control over our digital footprint—and of course over our own behavior, both online and in the real world. There are steps we can take to limit our risk.

Read the full article published February 6, 2019 here: by SecurityWeek.

Join the Discussion
Authors & Contributors
Preston Hogue (Author)

More from Learning Center

Forward and Reverse Shells
Forward and Reverse Shells
09/15/2023 article 5 min. read
Web Shells: Understanding Attackers’ Tools and Techniques
Web Shells: Understanding Attackers’ Tools and Techniques
07/06/2023 article 6 min. read
What Is Zero Trust Architecture (ZTA)?
What Is Zero Trust Architecture (ZTA)?
07/05/2022 article 13 min. read