What do you need to know about the security of your data? Let's take a look at the top 6 fears
Miscellaneous / / June 22, 2022
Fear 1. Fraudsters steal money from a bank card
Did you receive an SMS that money was deducted from the card, but you didn’t buy anything? Recheck your balance. This may be a fake message sent by scammers.
Viktor Verentsov
Director of the Department for Monitoring and Response to Cyber Threats at Rostelecom.
It's always worth double-checking first to see if your funds were actually debited, because it could be a phishing message. After this, the attackers from the “bank security service” will definitely start calling you, persistently offering to return the funds and help catch the “criminals”.
If scammers still call you, do not tell them your card details, passwords and codes - a real bank representative will not find out such information. Sometimes scammers do not call, but send SMS with a request to follow a link in order to cancel an unknown purchase. This is also not worth doing - this way you can catch the virus.
Sometimes money is really written off. Will return them not easyArticle 9 The procedure for using electronic means of payment / "ConsultantPlus"
- for example, if you yourself provided the attackers with your card details, the bank may refuse. In order not to deal with the consequences, it is better to prevent an unpleasant situation. When paying online, use a separate card and transfer only the amount necessary for the purchase to it. Do not share her information with anyone. Let's say a seller on a classifieds site offers you to make a payment yourself, for this you only need to send a photo of the card. Do not continue the conversation - they are trying to deceive you.Fear 2. Your account will be hacked and will write to friends
Often scammers "hijack" other people's pages and extort money from subscribers. Let's say they say that the owner of the profile needs an urgent operation, and they ask to transfer funds. To protect your account, use two-factor authentication in social networks and instant messengers. When logging in, you need to enter your username and password, as well as a special code that comes via SMS. Even if attackers find out the password, they won't be able to access your account if they don't have your phone.
Do not use one password for all social networks. If criminals break into one account, they can easily get to other profiles. Check which applications have access to your account - outdated ones should be deleted.
If you need to access social networks from someone else's computer, use the "Incognito" mode. This way, information about your activities will not be available to other users. Click the "Exit" button when you're done.
Fear 3. Attackers will issue a loan on your behalf
Previously, in order to get a loan, you had to go to the bank. Thanks to the development of banking services, it is now possible to apply for a small amount online. You only need to provide passport data and upload a scan of the document. If such information gets to scammers, you will find yourself a “happy” owner of a loan that you did not apply for.
Copies of documents should not be stored on the Internet, as well as on a computer and phone. Remove them after they have been applied. If you use document storage apps, set up two-factor authentication.
Viktor Verentsov
It is important to keep track not only of special applications that are created for the convenience of storing digital copies of documents, but also of accounts on government portals. This may be the Gosuslug website (or its regional equivalent) or the application of the Federal Tax Service. On such resources, it is necessary to use two-factor authentication.
Carefully check the sites you visit - sometimes scammers create fake pages whose addresses differ by one or two letters from the original ones. The secure site URL starts with https://. Also, look for "lock" in the address bar - if it is closed, the connection is secure. This means that your data will not be intercepted by hackers.
Fear 4. "Burn" archives of photographs and documents
It is better to store important papers on a separate home server. For especially valuable documents, copies should even be made. Some viruses are really capable of destroying all files on a computer, and it will be problematic to restore them. Therefore, it is important to use an antivirus and update it regularly - it will find and remove malware. And you also need to be careful. Do not open emails from unknown senders or follow unknown links to avoid introducing malware to your computer.
For photos dear to the soul, in which there is nothing confidential, cloud services are suitable. Just don't forget the security rules: strong passwords and two-factor authentication come in handy here too.
The advantage of cloud services is that you can open access to a folder to a friend or colleague. However, outsiders can take possession of it, for example, if the link is sent uncontrollably in instant messengers and social networks. Therefore, do not forget to close access when it is no longer required.
Fear 5. Your correspondence and photos will be merged into the public domain
Even if you have enabled two-factor authentication, this does not guarantee that your social network account will never be hacked. Therefore, do not share information on the Internet that can ruin your reputation. This rule applies even to private correspondence - sometimes people themselves leak photos of former lovers and friends in order to annoy them.
Sometimes criminals send out messages in which they threaten to publish intimate photos and videos. If you are sure that you did not send such files to anyone, did not store them on cloud services and a computer, just ignore the letter. The maximum that attackers can do in this case is to fake a photo.
If there was spicy compromising evidence and the criminals demand money for it, it is better not to give in. Next time they will ask for more. You can go to the police and try to attract villains for violating immunity personal lifeCriminal Code of the Russian Federation, article 137. Violation of privacy / "ConsultantPlus" and extortionCriminal Code of the Russian Federation, article 163. Extortion / "ConsultantPlus".
Fear 6. Information in social networks will attract intruders
Many people cannot imagine their life without constant posting on social networks. But you may not even know how other people will use such information. Let's say a publicly available vacation photo might hint to burglars that no one is in your house right now. Therefore, it is better to limit the number of people who see personal content.
Also, try not to post on social media:
- Geodata. Do not mark the address of the apartment, office and other places where you often visit. This information allows criminals to track your schedule, routes, and habits. Sometimes, to find out the home address, a hint is enough - for example, photos with a view from the window. Such pictures are best left for a personal archive.
- Personal data and documents. Do not publish photos of passports, visas, bank cards. Do not leave your phone number in the public domain - you can run into spam messages.
- Information about your children. Information about which school the child goes to, which circles he attends, is best left for relatives. If the kid uses social networks, explain to him what you can’t talk about on the Internet. Criminals can ingratiate themselves with children and try to find out where they live and what valuables are in the apartment. In addition, having information about your family, a person can harm the child.
- Future plans. Do not talk about upcoming trips, do not publish airline tickets and boarding passes. Using the number and barcode, you can access your account and change the booking details.
Leakage of personal data threatens with a lot of trouble, so do not ignore the rules of information security. And the technical side of this issue will be taken care of "Rostelecom». The company provides broadband Internet access, TV and cellular communications, and also makes digital products for business and life. Rostelecom monitors the cybersecurity of its customers and promptly suppresses threats.
You too can become part of the team and make cool and secure IT products. Vacancies can be viewed on the websiteRostelecom». Now, for example, a UX writer, a developer engineer, an Android system developer, a network architect, a QA engineer, and other specialists are required. Open a vacancy, read the conditions and send your resume through a special form.
Find a job