"Health Treasure" Privacy Leak: Data protection must be managed in a closed loop. How to protect privacy in the era of big data?

User privacy leaks occur from time to time. From where? Health treasure? Privacy leakage, Alipay annual billing incident, Facebook user data leakage, and every large-scale information leakage has caused continuous hot discussion. The rapid development of e-commerce increases the risk of personal information disclosure; The emergence of a large number of new Internet formats has brought many new forms of online fraud. China is a global leader in mobile payment, and the risk of misappropriation that comes with it cannot be ignored.

What exactly leaked our privacy?

Improper use by users: We may log in to our social accounts on some public networks, which may lead to our information being illegally stolen by others from some public networks.

Improper use by the third party: This is a way of privacy disclosure that people pay more attention to. The third party uses the user privacy information obtained from the authorized platform outside the prescribed scope.

Platform leakage: a lot of customer information can only be contacted by internal employees, and a few are greedy? A mole? Causing trouble, user information flows into the black industry and becomes the transaction object, resulting in user information leakage. Defend against hackers, check your side? A mole? .

How to protect privacy in the era of big data? 1, don't disclose personal real information casually, except when using various online accounts? Real name authentication? In addition, don't casually fill in your real name and real information in your personal data. Try not to take photos and expose your true information on personal space and social networking sites.

2. Don't save important information on computers and mobile phones, and try not to use network disks and cloud storage to avoid information being stolen. You can save data to the mobile hard disk, and the mobile hard disk that stores important data is not borrowed or plugged into a public computer casually. Update anti-virus and security software on computers and mobile phones in time, kill viruses irregularly, and clean up garbage and traces in time after using computers and mobile phones. ?

7. Don't casually use public Wi-Fi on mobile phones and tablets, don't casually scan QR codes with mobile phones, and don't download, install and use programs and software of unknown origin. A large part of the information leakage is caused by ourselves. While coveting free WIFI, the risk of personal information being stolen is also great.