classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Protect your personal information
November 2017, This Week's Editor's Pick, News, Security Services & Risk Management

SABRIC encourages consumers to protect their personal information by sharing it very selectively and on a need to know basis only. Personal information includes identity documents, driver’s licences, passports, addresses and contact details amongst others. In addition, confidential information, which includes usernames, password and PIN numbers should never be shared with anybody.

In order to participate in commercial activity, it has become necessary to identify yourself by providing personal information. Good identity management practices can assist in mitigating the risk of impersonation should the information be compromised.

As some personal information such as your identity number cannot be changed readily, and other personal information such as your home and work addresses are impractical to change, we recommend that you consider the following precautionary measures when you are required to provide personal information for security verification purposes:

• Do not use the information that may have been compromised. Rather use other personal information that you have not used previously in order to confirm your identity in future.

• Register a new email account.

• Implement dual authentication for all accounts and products, especially for financial services products.

• Register for SMS notifications to alert you when products and accounts are accessed.

• Conduct regular credit checks to verify whether someone has applied for credit using your personal information and if so, advise the credit grantor immediately.

• Investigate and register for credit related alerts offered by credit bureaux.

• Check your bank statements regularly.

“Whilst the compromise of personal information creates opportunities for criminals to impersonate you, it does not guarantee access to your banking profile or accounts.” says Kalyani Pillay, CEO of SABRIC. “However, the importance of never sharing confidential information in order to protect yourself cannot be overemphasised.”

SABRIC encourages consumers to note and implement the tips and guidance given by the banking industry to ensure that criminals cannot gain access to their profiles and accounts.

Some don'ts

• Don't carry unnecessary personal information in your wallet or purse.

• Don't disclose personal information such as passwords and PINs when asked to do so by anyone via telephone, fax or even email.

• Don't write down PINs and passwords, and avoid obvious choices like birth dates and first names.

• Don't use any Personal Identifiable Information (PII) as a password, user ID or personal identification number (PIN).

• Don't use Internet cafes or unsecure terminals, hotels, conference centres etc. to do your banking.

Some do's

• Use strong passwords for all your accounts.

• Change your password regularly and never share them with anyone else.

• Store personal and financial documentation safely. Always lock it away.

• Keep PIN numbers and passwords confidential.

• Verify all requests for personal information and only provide it when there is a legitimate reason to do so.

• To prevent your ID being used to commit fraud if it is ever lost or stolen, alert the SA Fraud Prevention Service immediately on 0860 101 248 or at www.safps.org.za.

• Ensure that you have a robust firewall and install antivirus software to prevent a computer virus sending out personal information from your computer.

• When destroying personal information, either shred or burn it (do not tear or put it in a garbage or recycling bag).

• Should your ID or driver’s licence be stolen, report it to SAPS immediately.

For more information go to www.sabric.co.za


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Aggregation, automation and augmentation
    April 2018, Milestone Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring
    Memoori Market Research interviewed Milestone CTO Bjorn Eilertsen, who spoke about future trends in the video surveillance Industry.
  • The IQ of a shrimp
    April 2018, Naxian Systems, This Week's Editor's Pick, Integrated Solutions, IT infrastructure, Security Services & Risk Management
    Amidst all the talk and confusion, Hi-Tech Security Solutions talks to Bernard Senekal to get a better understanding of what artificial intelligence really is.
  • How deep learning benefits the security industry
    April 2018, Hikvision South Africa, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring
    Artificial intelligence and deep learning are taking video analytics into a new era of improved recognition and potentially creating a revolution in pre-event alerts.
  • The cybersecurity of physical ­security
    April 2018, This Week's Editor's Pick, Cyber Security
    Being aware of the dangers is one thing, but actually knowing what you need to look out for and do to secure your surveillance infrastructure, is quite another.
  • Local is illuminated
    April 2018, GIS-SA, This Week's Editor's Pick, Products
    Local surveillance lighting company, Green Illumination Systems (GIS) has launched the latest in its line of locally designed and manufactured lighting products.
  • Droning on about compliance
    April 2018, CCTV, Surveillance & Remote Monitoring, Security Services & Risk Management
    Drones are cool, but there are mountains of regulations for using them in an official business capacity.
  • The question of value
    April 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
    How do you know your surveillance installation is delivering value? Do your service providers deliver value?
  • Surveillance-friendly storage
    April 2018, Capsule Technologies, Seagate Technology, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, IT infrastructure
    Storage solutions for surveillance must be designed for intense sequential writing to the disk and random reading. Your average desktop hard disk won’t do the job.
  • Beyond the hype: tomorrow’s surveillance, today’s reality
    April 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions, IT infrastructure, Conferences & Events, Training & Education
    iLegal 2017 once again lived up to its reputation and saw a host of presenters offering insights and advice into a range of aspects related to the surveillance world.
  • Eight things to consider when designing a camera perimeter
    April 2018, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
    PureTech Systems offers eight practical tips to remember when designing a camera-based perimeter security solution.
  • Secure communication technology
    April 2018, Panasonic South Africa, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security
    Cyber-attacks on IoT devices are on the rise, with video surveillance systems connected to the Internet also becoming a popular target.
  • To PoE or not to PoE
    April 2018, This Week's Editor's Pick, IT infrastructure
    The ability to carry both data and power along the same cable has proven so transformative that in many industries it has become the norm rather than the exception.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.