Spying Russians and criminals stealing identities have been news headlines for as long as I can remember, way before the Internet or cyber security existed.
But what’s new here, as the details of the methodology behind the Yahoo breach starts to come out, is just how big a haul just four people were able to reel in. It was one of the largest breaches in US history, orchestrated by only a handful of people.
Imagine how many people would have to have been employed to gather personal information about half a billion people using pre-internet methods.
The issue here is that each day we become more and more connected. And the more connected we become, the more likely our information will be leaked or stolen. While individual consumers often don’t have much control over how well protected their data is, we can all decrease the value of stolen data by following some basic operational security steps:
- Never reuse passwords. Get a password manager and use it.
- Familiarise yourself with the telltale signs of phishing emails. Be on guard, even when the email appears to come from someone you know.
- Find out if your email service provider is using state of the art technology to identify and block email borne threats. If they aren’t, change providers.
- Carefully consider whether you really need to identify yourself to the service provider requesting information about you.
As long as these huge troves of personal information exist and remain high in value, attackers will try to find them. Understanding exactly how criminals use stolen information will help you to not only reduce the value of your information to attackers, but reduce cyber criminals’ return on investment when they carry out these types of attacks.
Most Commented Posts
2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Celebrating Data Privacy Day – 28th January 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Most Active Commenters
Recent Comments
Chat systems such as Slack and Teams need to be…
“This is a sophisticated phishing scam that will catch out…
“Cybersecurity is increasingly complex, in part, due to the interconnected…
“Unfortunately, time and time again we see NGOs, hospitals and…
As I have always said - it is verified trust…