A Five-Minute Quick Guide to Data Security

The different aspects of data security

Data is the most buzzing word these days.

Data can be anything, a photo posted on your Facebook account, your medical record, or even your AADHAR number. As we are engaging in different digital mediums on a daily basis, digital data is becoming an integral part of our lives. As you are reading this post, you are dealing with a piece of digital data.

Though we deal with digital data in almost every conscious moment, we are surprisingly unaware of the need and use of data security.


Let’s find the answer to two fundamental questions:

  • What is data security?
  • Why do we need data security?

What is data security?

Data security is a measure to secure the data from unauthorized access, tampering, and prevent data theft.

As a part of the digital world, we use numerous online platforms with assigned credentials, including the user id number and the password. In the data security view, any person other than the designated account user is unauthorized and should not have access to that account.  Data security will ensure that only the authorized person with given credentials can access the information on that platform.  

Some of the most common data used in almost every app include:

  • Name
  • Email Account
  • Birthdate
  • Telephone Number

If you use the app for purchasing goods and services, then it would also include:

  • Credit or Debit Card Details
  • Bank information
  • Address

Why do we need data security?

Now, just imagine what would happen if someone gains access to your Facebook Account or your Swiggy account!!!! The person would not only able to peep into your personal life but also gain access to your bank details. In the worse case, the person would use your debit/credit card without your knowledge by tampering with your authentication and gaining access to your email. The practice of data security will help you maintain your data privacy in your email, social media accounts, food ordering apps, and other apps.

Many think that data security is not a necessary measure for ordinary people or small companies, but the actual scenario is just the opposite. During the lockdown, the online presence has increased significantly, resulting in a skyrocketing increase in cybercrime. A recent report says that cybercrime has risen significantly in the time of lockdown, and the Brute-Force attack in India has increased from 93.1 million in January 2020 to 377.5 million in February 2021. For reference, a Brute-Force attack happens when one tries to infiltrate another person’s online account by cracking passwords in trial-and-error methods.  

The situation is much grimmer for female users as they don’t only face online financial scams but also online violence and abuse. In many cases, scammers use the photos of female users by hacking their social media and using those photos for malicious purposes. The authorized users don’t even know about those fraudulent activities until it is too late. Data security is equally important in the professional life as well as the personal life of the data users. Wait for my next blog to know more about the role of data security in the professional lives of data users.

Start it from NOW!!!

The practice of cyber security not only helps you to prevent any economic loss but also helps you to make sure that your personal data won’t be used without your knowledge for the vicious or vengeful purpose. Data privacy is not a myth; instead, it is a right for every individual. Every person with an online presence should take precautions and needed measures to maintain that right!!!

Wait for my next blog to learn more about the risks of data leaks in our workplace.

1 thought on “A Five-Minute Quick Guide to Data Security”

  1. In your next blog, I am expecting to read 1 – How does data security matters for individuals who are at mediocre or lower level. 2 – How can we prevent data theft?
    – What is the cost related to prevention of data theft?

Leave a Comment

Your email address will not be published. Required fields are marked *