With the rapid development of technology, the Internet, the growing popularity of smart devices, the application of big data processing technology and cloud computing technology, the personal information data of ordinary users are more and more complete and collected by various information systems, so these information systems can analyze the user’s hobbies and habits more accurately through the user’s personal information data, so as to provide better services, which makes people’s This makes people’s daily life easier and more convenient.

When there is an information security incident in the system, the leakage of users’ personal information is likely to cause catastrophic consequences. The current laws, regulations and measures for the protection of users’ personal information are not perfect, and the leakage of users’ personal information occurs frequently. In order to protect users’ personal information and avoid personal information leakage without affecting system service quality, this paper provides some ideas and methods to protect personal information security.

For data protection, it requires the cooperation of many parties to achieve, both we as individuals and enterprises have the responsibility to protect data security, from our own daily life there are many data leakage dangers, then how should we go to avoid?

  • Install antivirus software on your computer.

Regular antivirus cleanup of your computer to prevent Trojan horses and viruses, and timely update of antivirus software.

  • Less privacy when registering on the website.

When registering for an online account, do not fill in what you do not need to fill in, do not casually register information on non-HTTPS websites, and do not casually click on pop-up windows to avoid poisoning.

  • Mobile payment security use

Set the appropriate transfer amount; change your cell phone number when you change your cell phone number; open SMS notification so that you can be notified in time when there are abnormal changes in your funds

  • Use less public WiFi

Many free WiFi, there is the possibility of leaking your personal information, try not to use unfamiliar WiFi.

How companies protect personal information

  • Enterprises should deploy SSL certificates

To prevent users from falling into the trap of fake/phishing websites, corporate websites should deploy SSL certificates or higher-level EV SSL certificates to distinguish corporate websites from phishing websites, and display HTTPS, security locks and real identity information of the website in the URL bar, so that users have enough information to judge the authenticity of the website, and in contrast, fake websites will be immediately visible

  • Companies should have code signing certificates for their software

The legitimate APP should use the code signing certificate to sign the software program, the signed software, which can show the true identity of the software developer, while proving that the software has not been illegally tampered with or implanted with viruses and Trojans during transmission, and the user can judge the authenticity of the software source and the integrity of the software program through the certificate

  • Enterprises should deploy email certificates for employee communication mailboxes, in order to protect the interests of customers and maintain customer data security

Mail users use GDCA mail certificates to digitally sign and encrypt emails for transmission, which can ensure the authenticity of the email sender’s identity on the one hand, and safeguard the emails from being read and tampered by others during transmission and verified by the email receiver to ensure the integrity of email contents.

Today, data is becoming a powerful economic engine in the digital world. This is when how to ensure data protection and data security, especially when it comes to sensitive private information, are important challenges in front of us. It can be said that once the protection of personal data is done, not only can we effectively avoid the danger of data leakage, but also significantly eliminate users’ concerns about personal privacy leakage.