{"id":7145,"date":"2014-05-15T00:00:00","date_gmt":"2014-05-15T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2014\/05\/15\/how-to-protect-pii\/"},"modified":"2021-01-28T16:21:49","modified_gmt":"2021-01-28T16:21:49","slug":"how-to-protect-pii","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/","title":{"rendered":"How to Protect Your Personally Identifiable Information (PII)?"},"content":{"rendered":"<div id=\"article-content\">\n<div id=\"article-ads\">\n<div class=\"hidden-xs\">\n<div id=\"daily-newsletter\" class=\"row\">\n<div class=\"text-center\">\n<div class=\"col-md-6 col-md-offset-3\">\n<div id=\"namecard-input-groupwz\" class=\"input-group\">\n<span class=\"input-group-btn\"><\/p>\n<p><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<p>Because many modern security systems rely on users\u2019 personal information, also known as PII, or personally identifiable information, a data breach can potentially weaken your security posture not just in a single context, but in all contexts.<\/p>\n<p>Stefan Frei, Ph.D., research vice president at security research firm <a href=\"https:\/\/www.nsslabs.com\">NSS Labs<\/a> , and Bob Walder, NSS Labs&#8217; president and chief research officer, address the PII issue in a recent security brief called &#8220;Why Your Data Breach is My Problem.&#8221; They say that each security breach which leaks PII data has a cumulative weakening effect on users\u2019 personal security in aggregate. In other words, when Sony\u2019s PlayStation network <a href=\"https:\/\/www.esecurityplanet.com\/headlines\/article.php\/3934276\/Sony-Says-PlayStation-Security-Breach-Will-Cost-170-Million.htm\">suffered a data breach<\/a> in April 2011 \u2013 leaking PII data from some 77 million individuals \u2013 users\u2019 loss of personal security was not limited to their use of the PlayStation.<\/p>\n<p>That data, and data from the <a href=\"https:\/\/www.eweek.com\/security\/target-hack-blamed-on-stolen-credentials-who-s-at-fault\">Target breach<\/a> in late 2013 and other breaches, feeds into a vast pool of PII data in which the criminal underground horse-trades and aggregates.<\/p>\n<p>With so much PII data floating around, details can easily be cross-correlated, helping criminals quickly put together accurate identity profiles. With just a few pieces of &#8220;secret&#8221; personal information, thieves can potentially gain access to online accounts and even financial accounts through identity theft.<\/p>\n<h2>Two Kinds of PII Data<\/h2>\n<p>PII is a broad industry term which encompasses many forms of data which can be used to identify individuals. We can make an important distinction between two types of PII data: static and dynamic.<\/p>\n<p>Dynamic PII data includes details like credit card and bank account numbers, email addresses and passwords. All of these things can be linked to our identity, but in the case of breach they can be changed. The link to our identity can be broken, albeit not without expense of time and sometimes cost.<\/p>\n<p>Fixed PII data, such as date and place of birth or a national ID number such as a U.S. Social Security number, is far more valuable. Even our mother\u2019s maiden name \u2013 a commonly used security factor \u2013 is permanent information. When breached, this information cannot be taken back, effectively reducing our security posture.<\/p>\n<h2>Everybody Loses<\/h2>\n<p>When an online service is hacked, both the service and its users are the losers. For companies, losing customer data is at best a PR nightmare and more than likely, expensive. The massive Target data breach has so far <a href=\"https:\/\/trends\/.yahoo.com\/data-breach-costs-toll-target-profit-123047290--finance.html\">cost the company<\/a> at least $60 million (before insurance) in direct expenses. The retailer attributed a 5 percent fall in first quarter 2014 revenue to customer decline resulting from the breach.<\/p>\n<p>End users not only suffer an increased risk of being hacked elsewhere \u2013 for example, if their breached login credentials were used on multiple sites \u2013 but potentially the intangible loss of &#8220;secret&#8221; fixed PII data. \u00a0<\/p>\n<h2>Consider How You Use PII<\/h2>\n<p>The NSS Labs authors suggest treating security compromises not as exceptions, but as expectations. Nobody wants to believe that their security is subpar, but this is the wrong way of looking at reality. Just as everyone eventually gets sick and needs to see a doctor, we now live in a world where data security can never be guaranteed.<\/p>\n<p>Preparing for a data breach can motivate companies to realize they are part of a broader data ecosystem. When another service has been breached, can that leaked data be used against your users? We are, ultimately, all in the same boat.<\/p>\n<p>Anticipating a breach is an instructive way to think about the personal data a service uses. These three strategies help protect PII data:<\/p>\n<p><strong>Salt and hash passwords.<\/strong> Secure one-way password encoding should be a given these days, but hacks like that <a href=\"https:\/\/www.eweek.com\/security\/linkedin-investigates-reported-theft-of-6.45-million-user-passwords\">against LinkedIn<\/a> remind us otherwise. Properly encoded password hashes should be extremely expensive to decrypt when a breach occurs.<\/p>\n<p><strong>Do not rely on &#8220;secret&#8221; fixed PII data.<\/strong> We cannot assume that data like Social Security numbers are truly a secret anymore. In fact, if we assume that this kind data for any given individual has quite possibly already been leaked and cannot be changed, it makes for weaker rather than stronger security.<\/p>\n<p><strong>Do not store PII for long periods of time.<\/strong> Again, assume that hackers will eventually acquire some or all of a company\u2019s data. What will they find? Purging personal data which is no longer useful \u2013 such as for accounts which have been terminated, or verifications used to establish an account \u2013 limits the surface area of exposed data.<\/p>\n<p>Walder notes that companies may find a &#8220;mild conflict of interest&#8221; between sales and security as collecting PII data may be attractive for marketing purposes. &#8220;However,&#8221; he adds, &#8220;more sensitive data, such as SSN, could and should be kept private. Even government websites should not rely on SSN for identification. In France, during initial registration to the online tax system, you are provided with a digital certificate that is used to log on from that point forward. This is much better, since it can easily be revoked and replaced following compromise.&#8221;<\/p>\n<h2>Put Users in Charge<\/h2>\n<p>Shifting security data from the service provider to the end user can benefit everyone. For example, consider the common &#8220;security questions&#8221; tactic, wherein a service asks the user to supply personal information like &#8220;favorite color.&#8221; In an effort to avoid broad or easily guessed questions, many services now ask questions that are so specific and yet so arcane that a user is unlikely to remember even their own answers. &#8220;What was the name of your first teddy bear?&#8221;<\/p>\n<p>Letting the user define their own security questions increases the likelihood they will use truly personal data which is not publicly documented, and yet is also well-known to them.<\/p>\n<p>Likewise, increasing user activity transparency \u2013 such as providing the time and location of last login \u2013 gives extra tools to the user to detect intrusions. Even a sophisticated intrusion detection system may not be as effective as the end user saying, &#8220;Hey, I wasn\u2019t in China yesterday. Something fishy is going on!&#8221;<\/p>\n<p>With so much PII data already leaked, it begs the question of whether the toothpaste is already too far out of the tube. Walder doesn\u2019t think we should give up, however. &#8220;With new potential victims purchasing their first computer and signing up for online services on a daily basis, we need to start somewhere. In 10 years&#8217; time, we will be glad we made the change.&#8221;<\/p>\n<p><a href=\"http:\/\/aaron.bordella.com\/technology-writing-web-periodical\/\"><em>Aaron Weiss<\/em><\/a><em> is a technology writer and frequent contributor to eSecurity Planet.<\/em><\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d6fff5d513d-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fff5d513d\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fff5d513d\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fff5d513d\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fff5d513d\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fff5d513d\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fff5d513d\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Because many modern security systems rely on users\u2019 personal information, also known as PII, or personally identifiable information, a data breach can potentially weaken your security posture not just in a single context, but in all contexts. Stefan Frei, Ph.D., research vice president at security research firm NSS Labs , and Bob Walder, NSS Labs&#8217; [&hellip;]<\/p>\n","protected":false},"author":207,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[19],"tags":[4139,5277],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[392],"class_list":["post-7145","post","type-post","status-publish","format-standard","hentry","category-endpoint","tag-data-breaches","tag-web-security","b2b_audience-awareness-and-consideration","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Protect Your Personally Identifiable Information (PII)?<\/title>\n<meta name=\"description\" content=\"Learn how to protect Personally Identifiable Information from a breach. Explore these practices for securing PII now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Your Personally Identifiable Information (PII)?\" \/>\n<meta property=\"og:description\" content=\"Learn how to protect Personally Identifiable Information from a breach. Explore these practices for securing PII now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-15T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-28T16:21:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Aaron Weiss\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aaron Weiss\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/\"},\"author\":{\"name\":\"Aaron Weiss\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/8e2c2a11112815ef11eadb7c5bddbece\"},\"headline\":\"How to Protect Your Personally Identifiable Information (PII)?\",\"datePublished\":\"2014-05-15T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:21:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/\"},\"wordCount\":1070,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"keywords\":[\"data breaches\",\"Web security\"],\"articleSection\":[\"Endpoint\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/\",\"name\":\"How to Protect Your Personally Identifiable Information (PII)?\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2014-05-15T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:21:49+00:00\",\"description\":\"Learn how to protect Personally Identifiable Information from a breach. Explore these practices for securing PII now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Protect Your Personally Identifiable Information (PII)?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/8e2c2a11112815ef11eadb7c5bddbece\",\"name\":\"Aaron Weiss\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png\",\"caption\":\"Aaron Weiss\"},\"description\":\"Aaron Weiss is a technology writer, comedy writer, and web developer.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/aaron-weiss-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Your Personally Identifiable Information (PII)?","description":"Learn how to protect Personally Identifiable Information from a breach. Explore these practices for securing PII now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/","og_locale":"en_US","og_type":"article","og_title":"How to Protect Your Personally Identifiable Information (PII)?","og_description":"Learn how to protect Personally Identifiable Information from a breach. Explore these practices for securing PII now.","og_url":"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/","og_site_name":"eSecurity Planet","article_published_time":"2014-05-15T00:00:00+00:00","article_modified_time":"2021-01-28T16:21:49+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Aaron Weiss","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Aaron Weiss","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/"},"author":{"name":"Aaron Weiss","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/8e2c2a11112815ef11eadb7c5bddbece"},"headline":"How to Protect Your Personally Identifiable Information (PII)?","datePublished":"2014-05-15T00:00:00+00:00","dateModified":"2021-01-28T16:21:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/"},"wordCount":1070,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"keywords":["data breaches","Web security"],"articleSection":["Endpoint"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/","url":"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/","name":"How to Protect Your Personally Identifiable Information (PII)?","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2014-05-15T00:00:00+00:00","dateModified":"2021-01-28T16:21:49+00:00","description":"Learn how to protect Personally Identifiable Information from a breach. Explore these practices for securing PII now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-protect-pii\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"How to Protect Your Personally Identifiable Information (PII)?"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/8e2c2a11112815ef11eadb7c5bddbece","name":"Aaron Weiss","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png","caption":"Aaron Weiss"},"description":"Aaron Weiss is a technology writer, comedy writer, and web developer.","url":"https:\/\/www.esecurityplanet.com\/author\/aaron-weiss-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7145"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/207"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=7145"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7145\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=7145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=7145"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=7145"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=7145"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=7145"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=7145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}