Technology has become an integral part of every aspect of our lives with the technology revolution we’ve witnessed many changes within the last twenty years. With the ever-increasing digitisation in our country, be it mobile & data penetration or digital banking platforms, it’s become very challenging to safeguard one’s identity. In the current scenario of cybersecurity breaches and attacks, authentication of someone’s data before allowing any access is the most vital step.
Biometric recognition refers to the automated recognition of people based on the biometric scan of fingerprints, faces, iris, palm prints, retina, hand geometry, voice, signature, and gait. It’s the most effective method of identifying and authenticating individuals in an extremely reliable and timely manner using unique biological characteristics. It has replaced traditional authentication methods, like personal ID cards, magnetic cards, keys, or passwords, because biometric recognition intrinsically linked to someone and thus can’t be easily compromised through theft, collusion, or loss. Most of the time, access is lost because of social engineering tactics like people falling easily into their traps, usually out of greed or fear.
Building Healthy Digital Identity
- Think before you post – Thinking before you post is a very good approach. It ensures you understand the evidence that underlines the content you are sharing, its impact it might have or you could even stop the spread of misinformation and its aftereffects which are harmful.
- Avoid over sharing – Many of us are going official on social networks declaring relationship status, expressing opinions, confessing mistakes, and announcing sexual identity like I am a gay, this is something that was uncommon a decade ago. These expressions give the ability to the fraudsters to steal your identity by using simple phishing techniques
- Fact check – Don’t forward content that you don’t Own, do a simple fact check before forwarding content in messaging groups and other social channels, alternatively look for help from International Certified Fact Checkers Network like www.factly.com and www.boomlive.in
- Protect your privacy – Here are some tips to stay private. (a) Use a VPN or Use Incognito Mode feature of browsers while internet browsing or Use Privacy Conscious Browsers as TOR / Duck Duck Go (b) Use two factor authentication for all login purposes (c) Stay Private on Public and Free Wi-fi networks. (d) Use messaging applications that have end-to-end encryption. (e) Change all your default passwords of gadgets and applications. (f) Be doubly sure before you grant permissions for mobile apps and browser extensions.
- Manage Kids Online Usage – For a healthy digital identity of kids, you must enable features like (a) parental controls (b) safe search and (c) play it safe features on all kids of electronic gadgets and social profiles. (d) Create a family Screen time agreement with tech free zones. (e) Co-view or co-create at time with kids.
Tips to better manage your smartphone:
- Disable Notifications on your Smartphone, it keeps you informed of what you are supposed to be informed, it makes you do what you don’t want to do, and it makes you feel what you don’t want to feel.
- It is important to set boundaries, make your bedroom a smartphone-free zone.
- Charge your device outside the bedroom.
- Access social media from your computer instead of your Smartphone and it’s recommended you set a Social Media schedule.
- Keep your home screen as empty and put the rest of the apps in folders in next screens.
- Put your phone away during meals with friends and families
- Do device-free meetings, no phones, and tablets, and engage in social conversations with one another.
- One reason our devices are so alluring is that they’re vibrant (In Colours), It’s recommended you use Grey Scale mode on your Smartphone.
- Track your smartphone usage using “Screen Time” App on iOS Smartphones.
- Track your smartphone usage using “Digital Wellbeing” App on Android Smartphones.
- Make use of Productivity Apps, that are available on App-store and Play-store.
Conclusion:
Checking up on a prospective marriage alliance or employee’s social media profiles has become a regular routine for all of us. The reason being that social profiling helps us gain more insights into that individual or entity. We must accept that, building strong habits in the digital age does not happen overnight. Similarly, breaking bad habits, a little awareness will go a long way in getting through to a good digital identity.