The Dangers of a Digital Age: Are We Taking Online Privacy Seriously Enough?

Online privacy 

Online privacy and information security seem to be hot topics in light of recent high-profile hacking incidents. We’re quickly learning that the information we’ve long considered safe with our favorite retailers, technology platforms and even healthcare facilities is very much at risk.

In light of these incidents, we could assume the precautions the average American is taking to ensure their online privacy would be at an all-time high. But that notion is called into question as research continues to surface, exposing hole after hole in the virtual armor we naively assumed would protect our valued information.

All of this paves the way for crucial questions we should be asking in our rapidly evolving digital age: Are we actually taking online privacy and security as seriously as we think we are? Where are our weak spots? What more can we be doing?

We canvassed a handful of tech experts to help uncover the answers to these critical questions.

Do we take online privacy seriously?

For such a complex question, the answer is overwhelmingly simple. “We definitely do not take online privacy seriously enough,” urges attorney James Goodnow, technology expert and legal commentator with Fennemore Craig P.C. “Or perhaps we don’t take it seriously until our privacy is breached.” He explains that you can still enjoy the conveniences of living in a digital age by investing a little time to protect yourself.

It has become abundantly clear that as much as the average American may be aware of the importance of information security, people too often place personal convenience above privacy online. “Online security is like an analog dial,” explains Jonas Sickler, Marketing Director at “On one end we have convenience, on the other end privacy. Finding the balance is going to require constant tweaking, and we may never find that sweet spot.”

Another flaw present in the way we often think about online security is operating under the assumption that, as individuals, we’re too small a target. Tech experts are quick to shut this line of thinking down. “The situation is even worse with individuals who often think they would never become the target for hackers because ‘there isn’t much to steal’ from their computers,” says George Tatar, Founder and CEO of Akruto. “The trends of 2016 show an increasing number of cyber-attacks directed at individuals.”

Today’s hackers are technologically advanced, and they’re getting more and more creative. Tatar illustrates a couple crucial points by referencing the recently announced Yahoo data breach that affected at least half a billion email accounts:

  • Hackers can gain access to your security questions and answers and later use this information to further hack your accounts on other services. This can lead to, among other things, complete identity theft.
  • Security can be breached with the combination of attacks, social engineering or one simple vulnerability found, which means there is no place that is 100% safe for storing personal data online.

With all of this in mind, what are we—the average American consumers—to do? Aside from becoming information security experts, is there anything we can do to actually protect ourselves online?

“Since we don’t want a rolodex filled with 20-digit passwords, nor do we want to risk financial ruin, a smart middle ground is to take a few precautions to guard our most sensitive information,” Sickler offers.

6 ways you can protect your information online

1. Take password requirements seriously

If you’ve ever found yourself annoyed by a forced password change or the complex guidelines for creating a new password, you’re definitely not alone. But before you roll your eyes and shrug it off as unimportant, consider the words of our tech experts.

“Creating difficult passwords and never using the same password twice are some of the most important practices in preventing online accounts from being compromised,” urges Benjamin Van Pelt, CEO at VPNetworks LLC.

Nathan Barber, digital analyst for seoWorks, also suggests changing your password every three to six months. “Hacking information often takes place over an extended period of time with the hacker using multiple techniques to get into your account,” he explains. “Once they are in, they can control the password and prevent you from accessing it again.”

But sometimes keeping track of multiple ultra-secure passwords can feel like attempting to crack dozens of secret codes all written in different languages. If you’re worried about your ability remember your complex passwords, you might consider using a secure password manager like Dashlane, LastPass, Sticky Password or KeePass to log them for you.

2. Pay attention to system updates

This one is alarmingly simple: Run those system updates. “Technology evolves quickly, and so do the security vulnerabilities that are often hidden unknowingly in the devices we use day-to-day,” Van Pelt explains. “It is important to run regular system updates on your laptop, desktop, mobile smartphone, Wi-Fi router or any other internet-enabled device.”

With each update, technology teams are offering improved software that has filled in any of the holes identified in previous versions. So instead of continually clicking, “Remind me later” when those pesky reminders pop up on your devices, think about your virtual protection and take a few minutes to run the necessary updates as prompted.

3. Watch out for hyperlinks

Sickler reminds users to be wary of links included in the emails they receive as you could unknowingly unpack malware. “This is especially true during the holidays when there are tons of fake invoices and shipping scams,” he explains.

You may think you have the ability to spot a scam from a mile away, but our experts would urge you to think twice. “Most people know that if you receive an unsolicited hyperlink via text message or email, it’s not a good idea click on it. Many hackers know this, too, and they are getting good at disguising links to look like legitimate sources,” Van Pelt explains, adding that it’s not uncommon for hackers to hijack a trusted contact to gain your trust and trick you into clicking an infected link. Be wary of this, and if you are even slightly suspicious, don’t click.

He suggests to instead hover your mouse over the link to examine the target domain and verify its legitimacy. To be 100 percent sure, you can copy the link and paste it into a new browser or verify it with a malware scanner, like

4. Never allow browsers to save your passwords

Nearly every time you create a new account—whether it’s something seemingly simple, like registering with a new online retailer as you fill out your shipping form, or something a bit more high-stakes, like creating an online profile with your new bank—your browser will prompt you to save your log-in credentials.

The convenience of this action is tempting, but it has the potential to yield dangerous results. “The password is then stored in your computer as well as the cloud, and if you were to get hacked, the password information would become available for the hacker to exploit,” Barber offers.

5. Be mindful of the Wi-Fi you’re using

Public Wi-Fi seems to be offered everywhere these days—libraries, cafes and even city buses. While it’s a nice convenience and you can definitely still reap its benefits, be careful about the kind of information you could be exposing while using a public network. “Never enter passwords or make purchases while on public Wi-Fi—you may as well print your credit card number on your shirt,” Sickler says.

“It doesn’t matter how secure your password is,” Van Pelt adds. “If you are connecting over public Wi-Fi networks, your passwords and data are at risk of being stolen by hackers. Checking your personal email or logging into social media or online banking accounts can all lead to your information being compromised if someone with malicious intentions is lurking on that Wi-Fi network.”

He suggests using a VPN (virtual private network) service to create a secure tunnel for your information to pass through, encrypting all data that is sent to and from your device. But not all VPNs are created equal, so check out this list to find a secure option.

6. Remind yourself of the trade-off

Finally, when it seems that all these rules and regulations are starting to get a bit overwhelming, it’s abundantly helpful to remind yourself of the purpose of maintaining a secure online presence. Goodnow reminds consumers that the ramifications of not being proactive with your online security can be far-reaching and financially devastating.

“Ask yourself this next time you’re agreeing to purchase on online product or participate in a service: Is that simple password that saves two milliseconds over a longer, more complicated one worth hours and hours of time wasted and potentially thousands of dollars lost?

Take charge of your own security

With high profile security breaches popping up in our news headlines more and more frequently, it’s clear that our private information is at greater risk than we want to admit. While the establishments and corporations with whom we share our data need to do their parts by actively improving their information security, we each have to proactively protect our own data.

If you’re intrigued by the topic of information security and you’re feeling more than ready to take matters into your own hands, you would likely thrive in making an exciting career out of analyzing and improving upon online security! Learn more about your options by visiting our article, 5 Fascinating Infosec Jobs that Help Combat Cybercrime.


Jess Scherman

Jess is a Content Specialist at Collegis Education. She researches and writes articles on behalf of Rasmussen University to help empower students to achieve their career dreams through higher education.


Related Content

This piece of ad content was created by Rasmussen University to support its educational programs. Rasmussen University may not prepare students for all positions featured within this content. Please visit for a list of programs offered. External links provided on are for reference only. Rasmussen University does not guarantee, approve, control, or specifically endorse the information or products available on websites linked to, and is not endorsed by website owners, authors and/or organizations referenced. Rasmussen University is a regionally accredited private university.

logo-accreditation-acenlogo-accreditation-ccnechart-credential-laddering-associates-bachelors-masters0 Credits90 Credits180 Credits48 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTSStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE’S DEGREEStart HereMASTER’S DEGREEPURSUERSEnd HereBACHELOR’S DEGREEEnd HereMASTER’S DEGREEchart-credential-laddering-associates-bachelors0 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTS90 CreditsStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE'S DEGREE180 CreditsEnd HereBACHELOR'S DEGREEchart-credential-laddering-healthcare-management0 Credits90 Credits180 Credits48 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTSStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE’S DEGREEStart HereMASTER’S DEGREEPURSUERSEnd HereBACHELOR’S DEGREEEnd HereMASTER’S DEGREEchart-credential-laddering-rsb0 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTS90 CreditsStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE'S DEGREE180 CreditsEnd HereBACHELOR'S DEGREEchart-credential-laddering-rsd0 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTS91 CreditsStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE'S DEGREE181 CreditsEnd HereBACHELOR'S DEGREEchart-credential-laddering-rsjs0 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTS91 CreditsStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE'S DEGREE180 CreditsEnd HereBACHELOR'S DEGREEchart-credential-laddering-rsn0 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTS91 CreditsStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE'S DEGREE181 CreditsEnd HereBACHELOR'S DEGREEicon-colored-outline-bankicon-colored-outline-certificateicon-colored-outline-circle-dollar-signicon-colored-outline-folder-searchicon-colored-outline-hand-hearticon-colored-outline-head-blocksicon-colored-outline-head-cogicon-colored-outline-head-hearticon-colored-outline-health-plus-leavesicon-colored-outline-hospitalicon-colored-outline-lifelong-learningicon-colored-outline-light-bulb-analyticsicon-colored-outline-maginify-glassicon-colored-outline-magnifying-glassicon-colored-outline-monitor-healthcareicon-colored-outline-monitor-paper-searchicon-colored-outline-nurse-raysicon-colored-outline-padlock-shieldicon-colored-outline-scalesicon-cameraicon-filtericon-info-circleicon-mail-forwardicon-play-solidicon-quote-mark-lefticon-quote-mark-righticon-share-square-oicon-spinnericon-taglogo-rasu-horizontalras-logo-flameras-logo-horizontalras-logo-stackedicon-bankicon-general-charticon-general-connecticon-general-degreeicon-general-discussicon-general-emailicon-general-findicon-general-haticon-general-hearticon-general-laptop-buildingicon-general-laptopicon-general-leadericon-general-mapicon-general-moneyicon-general-paperworkicon-general-peopleicon-general-phoneicon-general-speak-outicon-head-hearticon-mglassicon-scalesrebrand-arrowsicon-colored-advanceicon-colored-arrows-cross-curveicon-colored-briefcase-staricon-colored-buildicon-colored-bulb-analyticsicon-colored-certificateicon-colored-continual-developmenticon-colored-duo-chatboxicon-colored-folder-mortarboardicon-colored-globe-penicon-colored-growthicon-colored-hand-bubbleicon-colored-hand-starsicon-colored-head-blocksicon-colored-head-cogicon-colored-laptop-cbe-skyscrapericon-colored-laptop-webpageicon-colored-location-mapicon-colored-location-pinicon-colored-monitor-paper-scanicon-colored-mortarboard-dollaricon-colored-nationalicon-colored-person-laptop-checkboxesicon-colored-person-whiteboardicon-colored-phone-chatboxicon-colored-police-lighticon-colored-prepicon-colored-presentericon-colored-regionalicon-colored-save-timeicon-colored-shirt-haticon-colored-skyscrapericon-colored-stateicon-colored-student-centeredicon-colored-supporticon-colored-world-experienceicon-simple-chaticon-simple-desktopicon-simple-findicon-simple-hamburgericon-simple-phoneicon-testimonial-quotesicon-social-facebook-square-coloredicon-social-facebook-squareicon-social-facebookicon-social-google-plus-squareicon-social-google-plusicon-social-instagramicon-social-linkedin-square-coloredicon-social-linkedin-squareicon-social-linkedinicon-social-pinterest-picon-social-twitter-squareicon-social-twittericon-social-youtube-play-coloredicon-social-youtube-playicon-util-checkbox-whiteicon-util-checkboxicon-util-checked-whiteicon-util-checkedicon-util-chevron-downicon-util-chevron-lefticon-util-chevron-righticon-util-chevron-upicon-util-language-switchicon-util-loadingicon-util-open-window-buttonicon-util-open-window-linkicon-util-pdf-buttonicon-util-pdf-linkicon-util-refreshicon-util-x