Login to your account

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Reload Captcha

Personal Data means what in the world of Information Security?

Written by  Aug 01, 2019

Data Privacy is a hot topic these days and this has made people begin to think and understand what it means to them in a real-time world and what consequences it can fetch if left unseen.

The recent FaceApp controversy and the Facebook’s indulgence in Cambridge Analytica data scandal are two of the most well known examples which tend to quote us the real meaning of personal data and how it is being exploited by ad and marketing agencies across the world.

So what constitutes to “Personal Data”

In the world of Information Security, obtaining a definition for Personal Data is pretty vague. All records personal to our banking accounts, social security number and health records make up to sensitive info which when exposed to hackers could spell doom for us. At the same time, some critical details posted on social media, location data, search engine queries can put an online user in jeopardy by exposing them to threat actors who are often in lookout for such information to blackmail their victims at some point of time in future.

Acronis True Image 2019

Who likes to buy this data?

In many cases, the data you give and the services you get might not prove worthy. But there is another breed of underhanded businesses which try to make money out of this info by targeting the data givers with relevant ads to boost sales and services of companies and clients. In some cases, data brokers often give out data to hackers who practice ‘Doxing’ where they publicly sell huge amounts of data to hackers without their user’s consent. This is devious and malicious but happens all the time in todays world.

What’s the future for data collection?

As things are becoming more and more digital, currently personal info is being collected only from those who are using PCs, tablets and smartphones. But in years, the situation will change on a drastic note as people start using smart speakers, IoT, connected cars and censor embedded clothing and health monitoring devices. Adding to it is the innovations being presented by Tech companies which mostly do not ply with data collection standards prevailing across the world like in the EU.

Also see: Companies still can’t detect IoT device breaches

Did you find this article useful? Comment below or follow us on
Facebook, Twitter or LinkedIn.

Amanda Dresler

A very experienced freelance tech journalist who now prefers to work from home and has such a broad range of knowledge accrued over the years, we would not cope without her influence and ideas.

1 comment

  • Andy Michaels
    Comment Link Andy Michaels Saturday, 03 August 2019 10:57

    It is a scary world out there, but it only takes advice like this to make people more aware. Forewarned is forearmed!

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.


We would like to invite IT Security Professionals from the UK to join our other contributors in providing high quality articles for our website.

To enhance IT Security Centres credentials and to offer an opportunity for other IT Professionals and IT Companies to share their work, information and ideas.

We are always happy to hear from other IT Security Professionals and look forward to your incite. please contact us for more information.

Popular News

Jun 13, 2020 IT Security News

Microsoft announces major issue in Windows 10 June 2020 updates

On 9th June, 2020, Microsoft released cumulative updates for supported versions of Windows 10 including version 2004, ve...

Jun 12, 2020 Cyber Security

NHS email service fooled users in phishing attack

NHS Digital is contacting users of its NHSmail email system after a small number of mailboxes were compromised in a gene...

May 25, 2020 Cyber Security

Beware of security threats before deploying remote working

Remote working is receiving a great deal of attention recently for obvious reasons. The world has changed and remote wor...

Jun 09, 2020 Cyber Threats

Common types of cyber-attacks and how to avoid them

With cyber-attacks on the rise, businesses are constantly worried about losing vital data and the threat is very real. ...

May 19, 2020 IT Security News

EasyJet data breach: Over 9 million customers affected

The personal data of over 9 million EasyJet customers has been infiltrated by hackers, including over 2,000 users' credi...

Jun 12, 2020 IT Security News

100,000 cheap wireless cameras sold in the UK are vulnerable to hacking

Consumer advocacy organisation Which? has issued a warning over the security of wireless camera brands made by China-bas...

May 18, 2020 Cyber Security

UK power grid operator Elexon hit by cyberattack

The UK’s power grid middleman Elexon has announced it has fallen victim to a cyberattack, which did not compromise pow...

May 28, 2020 IT Security News

UK virus apps highlights tension between privacy and need for data

As more UK and European governments turn to tracing apps in the fight against the coronavirus, a deep-rooted tension bet...

Jun 09, 2020 IT Security News

Self-employed targeted by hackers with HMRC SMS phishing scam

Cyber criminals have launched a new phishing scam designed to steal personal and financial details of millions of self-e...

May 27, 2020 Cyber Security

UK scared cybercriminals will use NHSX Covid-19 Tracing App to launch attacks

Nearly half (48%) of the UK public surveyed about the NHSX COVID-19 tracing app do not trust the UK government to keep t...

Jun 08, 2020 Cyber Security

Ransomware attack compensation: What the UK public think

UK consumers believes businesses should stand their ground having suffered a ransomware attack and refuse to negotiate w...

May 28, 2020 IT Security News

Defence tips to stop a trojan invasion

Knowing not to open email attachments from unfamiliar addresses, or even the email itself, is a vital step to preventing...

Jun 11, 2020 IT Security News

UK government still can’t decide how NHS contact tracing app should work

A new report today says that the UK government still hasn’t decided exactly how its NHS contact tracing app should wor...

May 20, 2020 IT Security News

To VPN or not to VPN for business users

It’s a question many organisations are asking as they work to provide secure and reliable remote access at scale. ...

May 22, 2020 Cloud Security News

Overwhelming majority of UK organisations now confident in public cloud security

UK businesses are extremely confident in the security measures offered by public cloud service providers.

Jun 25, 2020 IT Security News

NCSC catch a million phish

The National Cyber Security Centre has received the millionth submission to its Suspicious Email Reporting Service. ...

Symantec Home 120x60