How to protect data on the Internet so that you do not get robbed
Trends Technologies / / December 30, 2020
What can they steal
Electronic mailbox
This is an invaluable repository of information to which almost all accounts are linked. If you use the same mail for both personal and business purposes, you risk doubling. When hacked, fraudsters will be able to gain access not only to personal, but also to commercial information. If any data is lost, the entire company could be at risk. Therefore, having two mailboxes is not only reasonable, but necessary.
Through email, you can not only find out the name of the account, but also recover passwords to accounts. Having access to your mailbox, cybercriminals will certainly try to get data for PayPal, and for Internet banking, and for all other important applications.
Logins and passwords for accounts
The data for entering all services directly or indirectly related to money must be selected especially carefully. Of course, it is very convenient to use a postal address as a login, but think about security first. Especially if your email is easy to find on social media.
Game accounts
Computer games are not only fun but also financially costly. Upgrading tanks, buying a new player for the team, skins for weapons cost a lot. Gamers and just amateurs buy gaming experience, ammunition and the games themselves. Once stolen, account hackers can resell all of this and withdraw real money.
Passport photos
Perhaps the most dangerous weapon in the hands of Internet scammers is scans or photographs of your passport. They can fall into the possession of the wrong people through your own fault. For example, if you sent photos to your relatives or friends to buy tickets or register a parcel. These pictures can be stolen from your social networks, mail or messengers when hacked. Why is it dangerous?
- A microloan will be issued for you. Of course, according to the law, in order to obtain a loan for a serious amount, you need a person's personal presence and the provision of a package of documents. But with the advancement of technology, things are getting easier. To take a microloan, it is enough to enter the passport data in the online application - and you can receive money on a bank card. And it will not be easy to prove that it is the scammers' debt and not yours. Also, criminals can write down other people's passport data in the column "Guarantors for the loan." As a result, it is the victims who will be held accountable to the bank.
- They will buy a SIM card in your name. The situation is similar to the previous one. Yes, mobile operators do not issue cards by online application, customers must apply in person and present their passport. But the attackers may have accomplices - employees of mobile operators.
- A company will be registered on you. Do you dream of having a business and not working? The wish may come true, but most likely you will not be happy about it. It is unlikely that a company in which you are listed as a formal director without your own knowledge will conduct business legally, cleanly, without debts and violations of the law.
- Create fake accounts. Registering accounts on your behalf on various sites with a dubious reputation will become easier than ever. And it is almost impossible to predict what kind of scheme the online robbers are using.
Boarding pass details
Almost every Instagram has a photo of a paper receipt in front of a gate or panoramic window with airplanes. Subscribers quietly envy, and only scammers are happy like no one else. The data from your boarding pass opens up a lot of possibilities for them.
First, you can find out the airline's bonus card number. In some cases, his and his surname is enough to access your personal account or check in for a flight.
Secondly, PNR. Passenger name record is a booking code, a special identifier in the database that can tell you about all the details of your route. There are no uniform PNR standards. But this code may contain information about the method of payment (up to the bank card number), the passenger's phone number, his date of birth and passport data. Remember, even if you have photographed your boarding pass so that the PNR cannot be read, it can usually be extracted from the barcode on the ticket.
What scammers can do:
- cancel the return ticket;
- change the date and time of the return flight or connecting flight;
- find out the mobile phone number and contact the mobile operator for a new SIM card, since the old one is allegedly lost;
- determine the dates when you will definitely not be at home, and try to rob your home.
Driver's license information
Driving school graduates almost universally post selfies with driving license. But the presentation of successful success can end almost in court. Having information from your ID, fraudsters can easily make a fake and sell it - for example, to someone who was once deprived of his rights. The fake will include a photo of this person and your personal data. And if he breaks the law again, questions can be for both of you.
How to protect personal data
When changing your password, come up with a new combination
Many services ask users to periodically change their passwords. And it would seem that this is an effective security measure. But the reality is quite the opposite.
Remember: when you needed to update your password, did you come up with a new combination of letters and numbers, or modified an old one? Most likely the second. As a rule, users follow the path of simplifying the combination, and this only weakens the protection. In addition, a slightly modified cipher is easy to forget, so people write it down. These notes are left on the desktop, on a sticker, carried in a wallet - many can access them, including scammers.
One complex password is more secure than frequently changing copycats. For example - Microsoft Corporation refused in the updated version of its operating system Windows 10 (1903)Security baseline (DRAFT) for Windows 10 v1903 and Windows Server v1903 from the policy of regular password changes, calling this measure obsolete.
It is much more efficient to have a password manager. He will come up with a difficult combination for you and keep it protected. The application will independently substitute the required password for mail, social networks, and accounts. Here are some popular services: 1Password, LastPass, Enpass. They are paid, but this is not a high price to pay for reliable storage for your passwords.
Use two-factor authentication
A very popular data protection method today. In simple terms, this is a double barrier, two steps required to access. For example, to enter Internet banking, you enter your username and password. If they are correct, an SMS with a code is sent to the phone. This cipher is the second step. Instead of SMS they can be used special applications or hardware tokens. Do not neglect the possibility of two-factor authentication when the software on your smartphone or computer offers you this option.
Don't connect to unverified Wi-Fi
It is dangerous to connect to someone else's unpaired Wi-Fi. Cybercriminals can create a fake network to steal data from unsuspecting users. This happens most often in crowded places: cafes, shopping centers and city parks. Attackers can access your logins, passwords, credit card information, Internet subscriptions, and your favorite social networks through a wireless network. To avoid this, always use only secure internet connections.
How to punish cybercriminals
It is important to understand that fraud with virtual money and personal data ends with a very real punishment. Connect SMS notification about money debiting from the card and control finances. In case of a leak of funds, immediately contact the bank to clarify the details and report to the police in case of theft. Also ask for help from law enforcement if you suspect someone is using your personal information in bad faith.
Responsibility for crimes against property is regulated by Chapter 21 of the Criminal Code Criminal Code of the Russian Federation Russian Federation. And all questions regarding personal information are regulated by the Federal Law Federal law on personal data about personal data.
Read also🧐
- 6 gadgets to help you stay healthy
- 10 technologies that will change the world, according to Bill Gates
- What profession to get now so as not to sit without work tomorrow