Information security
Information security is critical in the current world since the information contained in the databases should be maintained confidential to serve the intended use. Regarding this, the stakeholders should be conversant with the most effective techniques that can be used to counter the adverse effects that might arise. Consequently, information confidentiality and integrity can be achieved. Information technology values the privacy and the integrity of the information since the two are the critical ingredient to the success of the information technology firms.
Recently, I fell victim to phishing, whereby a stranger convinced me to give my mobile number and email. According to the person, the email was to ascertain that the person had collected information from me, which I had no problem with. After a few months the I received a message from n unknown sender claiming that they needed further reviews on the products that the person had asked me some months ago. With my naivety, I followed the link to give my feedback on the things that they wanted opinions for. This was my downfall since, after opening the link, it posed some severe threats to the sensitive information in my email. This made me make some alterations to my sensitive accounts to prevent further damage.
The data management technique is a field that should be given the magnitude they deserve. This implies that the information technology key players should divert more effort into it. This will ensure that the people are equipped with the necessary information to act as their defense in times of need. In my case, I did not consider giving out my email as a security threat until I was hacked. From this inference, people should be keen on how they give their sensitive information since the information can be used to destroy them.