top of page
Buscar
  • Foto del escritorAdams & Asociados

How to prevent your data from being leaked on the Internet



Cybercriminals seek personal information to steal money, compromise identities, or even sell data on the dark web.


Protecting Data in the Digital Environment


Protecting data in the digital realm requires a combination of strong passwords, constant monitoring of financial activities, and proper device security.


According to Norton, a well-known cybersecurity brand from Gen™ (NASDAQ: GEN), precautions must be taken to prevent corporate databases from being compromised and to ensure that personal confidential information does not fall into the hands of malicious actors.


"Corporations and businesses are extremely attractive to cybercriminals simply because of the large amount of data that can be obtained at once. Data breaches can affect companies and consumers in many ways. Such security incidents can damage lives and reputations and take time to repair," commented Iskander Sanchez-Rola, Director of Privacy Innovation at Norton.


Cybercriminals seek personal information to steal money, compromise identities, or even sell data on the dark web. Data breaches can occur for various reasons, including accidentally, but targeted attacks are typically carried out in five ways:


1. Exploitation of System Vulnerabilities: Outdated software can create a loophole that allows an attacker to insert malware into a computer and steal the data it contains. Keeping software up-to-date is a crucial measure to prevent such security breaches.


2. Weak Passwords: Weak and insecure user passwords are easier for cybercriminals to crack, especially if the password consists of full words or phrases. It is crucial to use unique and complex passwords. The use of password managers that generate and store secure passwords is recommended.


3. Unauthorized Downloads: A person can accidentally download a virus or malware simply by visiting a compromised website. An unauthorized download usually exploits outdated or security-flawed browsers, applications, or operating systems. Caution when downloading files and using updated software can mitigate this risk.


4. Targeted Malware Attacks: Cybercriminals use phishing tactics via email or keyloggers in credential stuffing attacks to discover users' login information. Email is a common way for malware to reach a computer. Therefore, people should avoid opening links or attachments in emails from unknown sources.


5. Watering Hole Attacks: Cybercriminals monitor traffic and users on specific websites to locate and exploit software or security issues. These malicious actors can then use malware to infect a network of devices and create backdoors in the stored data.

The Norton specialist warned that for protecting identity in the digital environment, it is necessary to use strong and secure passwords.

 

"Passwords should be complex and unique for each online account. People should also continuously monitor credit card reports, bank statements, and financial accounts for any unknown activities, such as the opening of a new credit card or another account in the victim’s name. If companies offer activity alerts via text messages or emails, it may make sense to subscribe to them and, in the case of any suspicious activity or data breach, to immediately contact the involved financial institution," he says.


Additionally, individuals should protect their devices, ensuring that cell phones also have passwords as a line of defense in case of loss or theft of the device. This prevents the criminal from accessing information if they were able to access an unprotected phone.

0 visualizaciones0 comentarios

Comments


bottom of page