Monday, 18 May 2015 00:00

How to protect yourself from personal data leaks

Rate this item
(0 votes)

b2ap3_thumbnail_iStock_000025150953_ExtraSmall.jpgProtection against data leaks Ξ Data leaks and self-protection

Over one hundred million people are exposed to the risk of personal data theft. It means that all those people can become target of phishing.

Well known personal data leaks, for example, data leaks of users of Sony consoles in 2011 or Target network got into the headlines of mass-media only because of its scale. Experts believe that data leaks occur constantly and millions of unaware people are exposed to them.

I.e. there are no safe networks and people have to fight it themselves.

If one approaches the problem with a clear head you will see that none of the companies or organizations working in the network can guarantee protection of your information. And, perhaps, would never be able to, no matter how often it would talk about it.

Data leaks will always occur. It is quite possible that your home address and email address would be exposed to identity kidnappers or other cybercrooks.

You better rely on yourself in this matter. A great way to avoid data leaks is to minimize the scope of personal information that you put into Network, sometimes using an old good method of evading questions, diversions or keeping a low profile.

We have selected several tricks that will help staying in the world wide web with maximum anonymity.

Protection against data leaks Ξ Use temporary email addresses

Create one email address exclusively for friends and relatives. Create another address for mailing lists, give aways and other online services.

Some people even use the third email address for social networks. Also you can use a new email for every new registration you do.

There are several advantages in using different emails for each service you subscribe. Firstly, if you get spam or exposed to fraudulent actions on one of email accounts, you can draw a conclusion that the service you subscribed to is either being hacked or sold your information to spammers. You could also take action and unsubscribe from the service. Secondly, if cybercrooks got one of your accounts they would be able to get data only from one service that you were subscribed to (via a simple function ‘Remind password via email’).

Protection against data leaks Ξ Use one-off credit card numbers

b2ap3_thumbnail_credit-card_20140127-120625_1.jpgSome banks and issuers offer their clients one-off credit card numbers. You can go to their web-site and generate online a new, one-off credit card number that will be useless for data thieves.

(Never use debit card in the Network since the money are withheld directly from your account and you will have only 48 hours to inform the bank about the fraud.)

Protection against data leaks Ξ Use distinct password for each account

No doubt, that it is difficult to remember a password for each account but allowing the browser to do it for you is not safe at all. If your computer is under threat, passwords are easily accessible and your accounts might be hacked.

Some web-browsers allow encrypting passwords and create master password for Credential Locker.

However, it is better to subscribe to one of many password management services that would better manage this function.

It should be added that having different passwords for different accounts is not enough. A password should be difficult to guess. If you use "facebook_password" for Facebook or "twitter_password" for Twitter – it doesn’t look like protection.
You could think of a sentence like: "I’m the best writer on this planet". Then take its initial letters: "ITBWOTP". Then replace letter "O" with 0 (null) and you get "ITBW0TP". It is quite easy to remember. You could easily add up other symbols to make the passwrod even more difficult to guess.

Protection against data leaks Ξ Do not provide personal information

In reality no one needs to know your mother’s maiden name or your place of birth. You can mention correct year of birth to pass age check but better be careful disclosing the day and month of your birth.

It also concerns information that you publish in social networks. It would be easy for hackers to search through Facebook or MySpace to steal your personal data.b2ap3_thumbnail_iStock_000015762740_ExtraSmall.jpg

If in the process of registration you are prompted to set a security question, like ‘mother’s maiden name’, then you could do as requested. Mention that your mother’s maiden name is, for example, Michael Jackson.

It doesn’t matter whether it is true or false. Main thing is that you know the answers and hackers – don’t.

Protection against data leaks Ξ Never give document numbers

Do not tell you passport or ID’s number or other identifying documents. Exclusions may include employer, spouse and accountant. Such information is not required for standard operations.

Such data is often used for security reasons of some services, in case you forgot password, and sometimes as an element of identification over the phone (for example, during a conversation with your bank’s official). It is unlikely that you’d like this information to be in supplier’s data bases that might be hacked by cybercrooks and used for identity theft.

Protection against data leaks Ξ Sometimes you’d have to give out your address

Some companies check credit cards by verifying the name and address. In such case you’d have to mention the real address.
If you buy something in the Internet, perhaps, you’d have to use a real address if you are not ready to spend time and money to rent a PO box.

Anyway, you need to stay alert.

If you installed applications that require permissions (for example, applications for Facebook or Android), think about the following: why the game needs access to SMS services or contact book? There are applications that seem to do nothing harmful, but in the background mode they send information about you, for example, contacts, personal data, emails, etc.

Last modified on Monday, 18 May 2015 16:10
Data Recovery Expert

Viktor S., Ph.D. (Electrical/Computer Engineering), was hired by DataRecoup, the international data recovery corporation, in 2012. Promoted to Engineering Senior Manager in 2010 and then to his current position, as C.I.O. of DataRecoup, in 2014. Responsible for the management of critical, high-priority RAID data recovery cases and the application of his expert, comprehensive knowledge in database data retrieval. He is also responsible for planning and implementing SEO/SEM and other internet-based marketing strategies. Currently, Viktor S., Ph.D., is focusing on the further development and expansion of DataRecoup’s major internet marketing campaign for their already successful proprietary software application “Data Recovery for Windows” (an application which he developed).

Leave a comment

Make sure you enter the (*) required information where indicated. HTML code is not allowed.

Get Help Now

Thank you for contacting us.
Your Private Investigator will call you shortly.