The Hunt for Your Data

 

For many of us our job or business requires us to be online, whereas for others it is simply a social ‘fix’, but we all have one thing in common. Our personal and financial data is online and at risk if we don’t follow strict security practises. Even the switch to strong passwords and an email purge will make a big difference. Your passwords and email addresses are the keys to your identity and need to be protected in the same way you would guard a key to a safety deposit box.

 

Your personal information is everywhere, even in the garbage can in the form of unshredded bills, notes, lists, and any other identifying discarded item. Fortunately for hackers, they don’t have to get filthy to find your data. By gaining access to nothing more than your credit card information, they have your name, address, phone numbers, email, date of birth, Mother’s maiden name, your spending history, and perhaps most importantly, your Social Security number (or a similar government income tax/benefits identification number used in other countries).

 

What do hackers do with the stolen data? They sell it on the black market, also called the Dark Web. Anyone in possession of your credit card information can max out the spending limit before you even know the card is compromised. A Social Security number and some of your personal information can be used to create a false income tax scenario, where the criminal collects the benefits and you are responsible for the damages.

 

The threat doesn’t always come from the outside. Anyone in your home including family, friends, or other visitors, can unintentionally compromise your computer network security and put your private data at risk. If you would like to see how fast things can go horribly wrong when you neglect proper security measures, check out the “Identity Theft” and “Email Security” videos in the DNotesEDU “Online Security & Fraud Protection” module .

Cyber Security 101

 

Identity Theft

Email Security

Passwords

Two-Factor Authentication (2FA)

BE CAREFUL WHAT YOU POST ONLINE!

Geotagging

Social Media

What Is Pretexting

Secure your Computer Network

WIFI

Firewalls

Antivirus Software

Malware

Ransomware

Botnets

Adware

Investment Fraud & Schemes

Beware of Pyramids and Other Scams Masquerading as Legitimate Digital Currency Investments

Wherever there is money to be made, there will always be crafty scam artists with complex plans to bilk naive and unsuspecting investors out of their money. Since bitcoin and dozens of other digital currencies are proving to be very lucrative investments, it comes as no surprise to find criminals surfacing, pretending to be legitimate members of the digital currency industry. Aside from the illegal ‘pump and dump’ schemes that were commonplace with many of the early fly-by-night cryptocurrencies, there are scarier scenarios involving pyramid schemes that have the potential to do a lot of damage to the industry’s reputation. The Ponzi or Pyramid may involve the criminal using a legitimate cryptocurrency, but the ones that may have the most painful impact on their victims are those ‘currencies’ created solely to run the scheme. These fraudulent acts have nothing to do with digital currency and everything to do with criminals preying on easy targets that buy into their get-rich-quick pitches. Unfortunately, as we have witnessed time and time again, that is not how the story will be portrayed in the mainstream media – they will find a way to blame bitcoin.

Continue reading… 

Pump and Dump

Online Security and Fraud Protection

Digital currencies, sometimes explained as "internet money", has brought an urgency for network security that few may be prepared for. Since everything done today that involves money, is at some point online and at risk, DNotesEDU has included a security...

The Hunt for Your Data

For many of us our job or business requires us to be online, whereas for others it is simply a social ‘fix’, but we all have one thing in common. Our personal and financial data is online and at risk if we don’t follow strict security practises. Even the...

Index