You are on page 1of 1

Aguilar, Alexis A.

BEED-3

Activity 3: Share a personal experience wherein you encountered digital risk and
consequences. What Life lessons and value have you realized?

Year 2017 and I was 17 years old during my Senior Highschool in University of La Salette
Inc., I’ve been experiencing some personal safety and threats because of data privacy risk
which is a digital threats or risk. I am referring to risk of being able to protect sensitive
data. Someone used my data usually includes my full names, email addresses, passwords,
physical addresses, and even dates of birth. My data can be easily misused by hackers as a
way of harming or misusing my identity. Someone steals my fb account or hack it to earn
money and load from my friends on Facebook. But because of my one Facebook friend who
is aware that I we’re not the one using it tell me about everything then sent me the
screenshots of their conversation which make me alarm because what if that hackers tend
to get money from my friends and used my personal identity? To end it up I tend to report
my own fb account and create another Fb account and I posted it online to make my friend
know that its not me who are using and scamming money to them and to help me to report
the account so that it won’t never be scam another victim using my identity. Managing
your digital risk takes time, and it’s no easy task. Yes, technology plays a vital role in
automating and identifying the right data to delete when responding to a data breach.
Developing a solid data retention strategy is key to managing and protecting your
important data, while avoiding fines and penalties. Protecting your user data to avoid and
suffered the consequences. In my new account I used the login review so that I were able to
access and keep updated if anybody open and used my account. Be proactive in identifying
unusual or unauthorized behavior. While insider threats can be more difficult to identify,
especially in a case where the user has legitimate privileged access rights, it’s important to
be able to consistently monitor for unusual and unauthorized activities.  Even more critical
is the ability to automatically remediate potentially risky behavior. Being prepare for a
more secure future.

You might also like