The number of cybercrimes is growing every day, in particular, the number of hacker attacks that result in leaks of personal data of ordinary users, who most often do not even suspect that they have been attacked by intruders, has increased significantly.

The main problem is that users are unable to grasp the fact that cybercriminals can easily get hold of critical personal data without sneaking into their homes or stealing their bags on the street. But today, user data is especially vulnerable – new technologies allow hackers to get logins and passwords, bank account numbers and other sensitive information without much effort.

So what are the ways cybercriminals can get hold of users’ personal data? eScan experts have listed the main methods used by hackers to gain access to data:

The most common way for data leakage is through Trojans or other malicious software downloaded to the computer. This occurs when a user moves from site to site, inattentively downloading an infected file, which opens the way to all the data stored on the infected device;

Much personal information is in the public domain – in social networks, messengers, etc., all of which helps cybercriminals achieve their goals. Dating sites are particularly favored resources for hackers to obtain users’ personal data;

Phishing. Cybercriminals can obtain credit card information by using an exact copy of an online store’s website.

Hackers also actively exploit emails, sending links leading to sites “infected” with viruses.

Hackers also get data from lost or stolen laptops, removable storage devices, and paper documents that contain personal information.

So what can users do to create a strong system to protect their personal information? Take a few important steps:

  • Install a firewall on the computer system to ensure safe operation on local networks and the Internet.
  • Install effective anti-virus software, such as eScan products, that provide advanced protection against increasingly sophisticated Internet threats.
  • Before installing any software, check data about it on various forums through search engines to see if there are any problems with users of the software; research the reputation of the company that sells the software.
  • Never use a short and simple password to log in to your online accounts. Use complex combinations of letters, numbers and special characters as passwords.
  • Be cautious of links and Internet addresses sent in unsolicited emails or text messages.
  • Do not transmit critical information in an unencrypted email, and be cautious when clicking on links in emails.
  • Regularly check accounts for any unusual activity.
  • Check the website’s privacy policy before sharing personal or financial information.
  • Monitor your child’s activity online, use an up-to-date parental control system on your computer, tablet, and cell phone. Parents should tell their children about the dangers of the Internet.
  • Don’t install mobile apps before you know the access rights they need.
  • Create email address groups; don’t link Facebook, Twitter, news sites, online shopping and online banking accounts to one email address.
17 Post

Moser Louis