Federal Employee Education & Assistance Fund
  • About Us
    • Our Mission
    • Our Board
    • Our Staff
    • Watch Our Video
    • Accessibility Statement
    • Privacy and Data Protection Policy
  • Our Programs
    • Emergency Hardship Loans
    • Disaster Relief
    • Scholarships
    • Tutoring
    • FEDLifeHacks
    • Childcare Subsidies
  • News & Impact
    • News
    • Annual Report
  • Support Us
    • Our Supporters
    • Ways to Give
    • Volunteer
    • Feds In Motion Challenge
  • Feds In Motion Challenge
  • DONATE
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Link to Facebook
  • Link to X
  • Link to LinkedIn
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on LinkedIn
  • Share by Mail
News & Impact, Safety

Data Privacy Week Aims to Educate Individuals on How to Manage Their Data

byDan Jackman/January 25, 2023
A man work on his laptop computer while sitting in the airport with the Data Privacy 2023 logo overlays the picture.

Data Privacy Week is an annual event that aims to raise awareness about the importance of data privacy and the steps individuals and organizations can take to protect personal information.

In today’s digital age, personal information is more vulnerable than ever. Your data is not only being compromised by hackers and cybercriminals but also mined by advertisers, software developers, and big businesses. According to recent estimates, the global data analytic market was worth over $270 billion in 2022 and will hit $650 billion by the end of the decade.  

The goal of Data Privacy Week is to educate people about the potential risks associated with the collection, storage, and sharing of personal data and to encourage them to take steps to safeguard their information.

From social media accounts to banking information, it’s crucial to take steps to protect your online data. This can include actions such as being mindful of the personal information shared online, keeping software and systems up to date, and being cautious about sharing personal information with untrusted sources.

Steps You Can Take to Keep Your Data Safe

PROTECT YOUR DATA

Protect your data by adjusting your privacy settings to your comfort level and knowing the tradeoff between privacy and convenience. The National Cybersecurity Alliance advises users to cultivate a data privacy habit by making informed decisions about who you share your data with. So, what steps can you take to protect your data?

  • Strong Passwords

    Create long, unique passwords and, if possible, store them in a password manager. 

    PCMag shared their simple tricks for creating and remembering strong passwords. A few years back, I took this information and found a unique way to customize it for every site that never leaves me second guessing myself. I’d share my strategy with you, but then you’d know!

    You can also explore a variety of password management products reviewed by PCMag that will do the work for you, for a fee.

  • Review your privacy settings

    Many websites and apps have privacy settings that allow you to control how your data is collected, shared, and used. Review these settings and adjust them to your comfort level.

  • Be mindful of the apps you download and use

    Only use apps from trusted sources and read the privacy policy and understand what data the app collects and how it is used. If you just read that last sentence and your eyes glossed over and you said, “ok, I’ll do that,” you are lying to yourself. Do you know how long those terms of services are, how frequently they are updated, and how many professionals are tasked with writing those terms to ensure you are the loser in every possible situation? 

    Next time, try out TOSDR.org. This site, Terms of Service Didn’t Read, breaks down the terms of services for most sites and services into digestible chunks. Next time you will be able to make an informed decision and consider the amount of information they are asking for and weigh it against the benefits you may receive in return.

  • Adjust Your Privacy Settings

    Be wary of apps or services that require access to information that is not relevant to their services, such as your device’s microphone, camera, access to other apps, and even location services.

Adjust the privacy settings to your comfort level

Apps, websites, devices, and software will often seek out more data than you would think is necessary. Ever wonder why that game app wants to know your location or why that social media site wants access to your contacts? Those are great questions to take back control of your data. The National Cybersecurity Alliance has a list with direct links to update your privacy settings on popular devices and online services.

Many web browsers, computers, and devices will ask you if you want to share certain types of data with a new app or website. Strike up a habit of paying attention to these requests and actually think about your answers. Here are common types of data you might be asked for:

  • Your location
  • Your contacts
  • Your photos and camera
  • Data about your behavior and use of a service

Opt for private browsing and do-not-track features:

  • Google Chrome. Go to the Google Support Center opens a new window and search for “incognito mode.”
  • Mozilla Firefox. Go to Firefox Help opens a new window and search for “private browsing.”
  • Microsoft Edge. Go to Edge Help opens a new window and search for “InPrivate browsing.”
  • Apple Safari. Go to the Apple Support Center opens a new window and search for “private browsing.”
$270000000000

The global data analytic market was worth over $270 billion in 2022 and will hit $650 billion by the end of the decade.

Keep Data & Software Up to Date

Software updates often include security patches to fix vulnerabilities. Make sure to keep all your devices and software, including your operating system, browser, and apps, up to date. This is important to keep your device and software protected from the latest security threats.

Further, periodically check through the list of apps on your device and delete any unused apps. Conducting a regular app audit can help protect your data and privacy. Even when you don’t use an app, it can still collect data, meaning you’re potentially giving away your data without being aware of it.

Cybercime cost Americans over $50 billion in 2021, a 62% increase over the previous year.

– FBI Elder Fraud Report

Be Cautious of Phishing Scams

Cybercriminals often use phishing scams to trick you into revealing personal information or login credentials. Be cautious of emails or messages that ask for personal information, or that contain links or attachments. Phishing scams can be difficult to identify, so it’s important to be vigilant and not to open or click on links or attachments from unknown or suspicious sources.

Use Two-Factor Authentication (2FA)

Two-factor authentication adds an extra layer of security to your online accounts by requiring a second form of verification, such as a fingerprint or a code sent to your phone, in addition to your password. This can help to prevent unauthorized access to your accounts, even if a hacker has your password.

 

a text conversation between a scammer and a victim reads:Scammer:

Phishing Scam in Action

What does a phishing scam look like? Check out this story from WCNC Charlotte’s VERIFY segment where a scammer makes contact with an individual in a lost pet group on social media to seek out a two-factor authentication code. The scammer tells the individual that they have their cat and will send them a two-factor authentication code to verify their identity. This is a scam documented by the Federal Trade Commission. WCNC Charlotte >>

If you are a victim of a scam or phishing attack, you should take the following steps:

  • Stop Responding

    Immediately stop responding to the scammer and do not give them any more information.

  • Don’t be embarrassed

    Don’t be embarrassed or ashamed, scammers are professionals. Use the information you have to help stop scammers in their tracks.

  • Report the scam

    Start a report with the Federal Trade Commission (FTC). Your report will be shared with more than 3,000 law enforcers. The FTC can’t resolve your individual report, but they will provide you with next steps to assist you and use reports to investigate and bring cases against fraud, scams, and bad business practices.

  • Alert Accounts

    If you have given away personal information, such as your social security number or credit card information, don’t delay in contacting financial institutions and credit reporting agencies to report the incident and protect yourself from potential fraud.

  • Change Passwords

    Change any passwords or account information that you may have given to the scammer.

  • Run Malware

    If you have clicked on a link or downloaded an attachment from the scammer, run a malware scan on your computer to ensure that it has not been infected.

  • Stay Vigilant

    Be vigilant of any suspicious emails or phone calls you receive in the future, and be sure to report any suspicious activity to authorities.

More from FEEA

A graphic with a lock has the title of our upcoming webinar: Protecting Yourself from Identity Theft. The webinar takes place on Wednesday, November 20 from 12 - 1 pm et.
#FedLifeHacks, Safety

Lunch & Learn Webinar: Protecting Yourself from Identity Theft

A man working on a computer smiles for the camera. Cybersecurity awareness month aims to showcase the importance of data protection and secure transactions providing online shopping safety.
#FedLifeHacks, Safety

Cybersecurity Awareness Month: Empowering You to Safeguard Your Digital Footprint

News & Impact, Safety

Data Privacy Week Aims to Educate Individuals on How to Manage Their Data

An African American woman works on her computer.
#FedLifeHacks, Safety

Keeping Your Data Safe While Shopping Online

tween or teen kids are on their devices together, unsupervised
#FedLifeHacks, Safety

Keeping Kids Safe Online

An African American man uses his smart phone while sitting on a bench. Illustrated social media icons appear above the phone. Feds using social media need to ensure they are protecting themselves and their privacy when online.
#FedLifeHacks, Safety

5 Dos and Don’ts for Feds Using Social Media

Previous Previous Previous Next Next Next

Subscribe to FEEA’s Newsletter

Join the National Cybersecurity Alliance (recorded webinar)

Your data is precious – when it is added up, it tells an expansive story about you and your behavior. Learn how to manage and protect it. Learn how to protect your family’s data and how to take charge of your own data trail. We’ll even let you know if you should accept cookies.

Watch Webinar >>

The information provided in this piece is for your convenience and informational purposes only and not to be construed as professional advice. FEEA and its coauthors and sponsors are not liable for any losses or damages related to actions or failure to act with regard to the content in this piece.

Would you like to reprint this piece in your agency human resource, federal employee association, or union local newsletter? You can do so at no cost by contacting admin@feea.org with your request.

Tags:#cybersecurity, #dataprivacy, #datasafety
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on LinkedIn
  • Share by Mail

Archive

Categories

  • #FedLifeHacks
  • News & Impact

Newsletter Sign-up

* indicates required
Fed Life Hacks Logo

Footer Section

Guidestar Platinum Transparency 2021

Contact

  • Phone: 202-554-0007
  • Fax: 202-559-1298
  • Email: fedshelpingfeds@feea.org
  • Accessibility Statement
  • Privacy Policy

Mailing Address

  • FEEA
  • 1641 Prince St.
  • Alexandria, VA 22314

News

  • Subscribe to our Newsletter
Link to: What To Do When Your Flight Gets Canceled Link to: What To Do When Your Flight Gets Canceled What To Do When Your Flight Gets CanceledA female passenger sits at the gate at teh airprot. We asked the experts what to do when your flight gets canceled Link to: William Shackelford Link to: William Shackelford William Shackelford

© 2025 - Federal Employee Education & Assistance Fund | All Rights Reserved.

Scroll to top