{"id":33519,"date":"2021-12-07T09:12:02","date_gmt":"2021-12-07T05:12:02","guid":{"rendered":"http:\/\/www.mauritiustimes.com\/mt\/?p=33519"},"modified":"2021-12-07T09:12:02","modified_gmt":"2021-12-07T05:12:02","slug":"how-vulnerable-is-your-personal-information","status":"publish","type":"post","link":"https:\/\/www.mauritiustimes.com\/mt\/how-vulnerable-is-your-personal-information\/","title":{"rendered":"How vulnerable is your personal information?"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"11847\" data-permalink=\"https:\/\/www.mauritiustimes.com\/mt\/what-happens-to-your-facebook-account-and-your-email-messages-when-you-die\/the-conversation\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2018\/02\/The-Conversation-e1535448713758.jpg?fit=400%2C41&amp;ssl=1\" data-orig-size=\"400,41\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"The Conversation\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2018\/02\/The-Conversation-e1535448713758.jpg?fit=640%2C65&amp;ssl=1\" class=\" wp-image-11847 alignleft\" src=\"https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2018\/02\/The-Conversation-e1535448713758.jpg?resize=127%2C13&#038;ssl=1\" alt=\"\" width=\"127\" height=\"13\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff;\"><strong>By Eric Smalley<\/strong><\/span><!--more--><\/p>\n<p><span style=\"color: #000000;\">When you enter your personal information or credit card number into a website, do you have a moment of hesitation? A nagging sense of vulnerability prompted by the parade of headlines about data breaches and hacks? If so, you probably push those feelings aside and hit the submit button, because, well, you need to shop, apply for that job, file that insurance claim, apply for that loan, or do any of the other sensitive activities that take place online these days.<\/span><\/p>\n<p><span style=\"color: #000000;\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"33520\" data-permalink=\"https:\/\/www.mauritiustimes.com\/mt\/how-vulnerable-is-your-personal-information\/tecno\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2021\/12\/Tecno.jpg?fit=1200%2C812&amp;ssl=1\" data-orig-size=\"1200,812\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Tecno\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2021\/12\/Tecno.jpg?fit=640%2C433&amp;ssl=1\" class=\"aligncenter size-full wp-image-33520\" src=\"https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2021\/12\/Tecno.jpg?resize=640%2C433&#038;ssl=1\" alt=\"\" width=\"640\" height=\"433\" srcset=\"https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2021\/12\/Tecno.jpg?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2021\/12\/Tecno.jpg?resize=300%2C203&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2021\/12\/Tecno.jpg?resize=1024%2C693&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2021\/12\/Tecno.jpg?resize=768%2C520&amp;ssl=1 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/span><span style=\"color: #808000;\">Data breach. Photo by Mikhail Nilov from Pexels<\/span><\/p>\n<p><span style=\"color: #000000;\">First, the bad news. If you regularly enter sensitive information online, chances are you\u2019ve had some data stolen somewhere at some point. By one estimate, the average American had data stolen at least four times in 2019. And the hits keep coming. For instance, a data breach at the wireless carrier T-Mobile reported in August 2021 affected 100 million people.<\/span><\/p>\n<p><span style=\"color: #000000;\">Now for some good news. Not all hacks are the same, and there are steps you can take to protect yourself. The Conversation gathered four articles from our archives that illuminate the types of threats to your online data, what data thieves do with your stolen information, and what you can do about it.<\/span><\/p>\n<ol>\n<li><span style=\"color: #000000;\"><strong> Take stock of your risk<\/strong><\/span><\/li>\n<\/ol>\n<p><span style=\"color: #000000;\">Not all cyberattacks are the same, and not all personal data is the same. Was an organization that has your information the victim of a ransomware attack? Chances are your information won\u2019t be stolen, though the organization\u2019s copy of it could be rendered unusable.<\/span><\/p>\n<p><span style=\"color: #000000;\">If an organization you deal with did have customer data stolen, what data of yours did the thieves get? Merrill Warkentin, a professor of information systems at Mississippi State University, writes that you should ask yourself some questions to assess your risk. If the stolen data was your purchase history, maybe that won\u2019t be used to hurt you. But if it was your credit card number, that\u2019s a different story.<\/span><\/p>\n<p><span style=\"color: #000000;\">Data breaches are a good opportunity \u201cto change your passwords, especially at banks, brokerages and any site that retains your credit card number,\u201d he wrote. In addition to using unique passwords and two-factor authentication, \u201cyou should also consider closing old unused accounts so that the information associated with them is no longer available.\u201d<\/span><\/p>\n<ol start=\"2\">\n<li><span style=\"color: #000000;\"><strong> The market for your stolen data<\/strong><\/span><\/li>\n<\/ol>\n<p><span style=\"color: #000000;\">Most data breaches are financial crimes, but the hackers generally don\u2019t use the stolen data themselves. Instead, they sell it on the black market, usually via websites on the dark web, for other criminals and scammers to use.<\/span><\/p>\n<p><span style=\"color: #000000;\">This black market is awash in personal data, so much so that your information is probably worth a lot less than you would guess. For example, stolen PayPal account information goes for $30.<\/span><\/p>\n<p><span style=\"color: #000000;\">Buyers use stolen data in several ways, writes Ravi Sen, an associate professor of information and operations management at Texas A&amp;M University. Common uses are stealing your money or identity. \u201cCredit card numbers and security codes can be used to create clone cards for making fraudulent transactions,\u201d he writes. \u201cSocial Security numbers, home addresses, full names, dates of birth and other personally identifiable information can be used in identity theft.\u201d<\/span><\/p>\n<ol start=\"3\">\n<li><span style=\"color: #000000;\"><strong> How to prepare for the inevitable<\/strong><\/span><\/li>\n<\/ol>\n<p><span style=\"color: #000000;\">With all this bad news, it\u2019s tempting to throw up your hands and assume there\u2019s nothing you can do. W. David Salisbury, a professor of cybersecurity management, and Rusty Baldwin, a research professor of computer science at the University of Dayton, write that there are steps you can take to protect yourself.<\/span><\/p>\n<p><span style=\"color: #000000;\"><em>[Over 140,000 readers rely on The Conversation\u2019s newsletters to understand the world. Sign up today.]<\/em><\/span><\/p>\n<p><span style=\"color: #000000;\">\u201cThink defensively about how you can protect yourself from an almost inevitable attack, rather than assuming you\u2019ll avoid harm,\u201d they write. The key is focusing on the information that\u2019s most important to protect. Uppermost are your passwords, particularly for banking and government services. Use different passwords for different sites, and use long \u2013 though not necessarily complicated \u2013 passwords, they write.<\/span><\/p>\n<p><span style=\"color: #000000;\">The most effective way to protect your data is to add another layer of security via multifactor authentication. And rather than rely on websites to text or email you authentication codes, which can be hijacked, you should use an app or USB device that uses public-key encryption, they write.<\/span><\/p>\n<ol start=\"4\">\n<li><span style=\"color: #000000;\"><strong> Don\u2019t make it easy for the thieves<\/strong><\/span><\/li>\n<\/ol>\n<p><span style=\"color: #000000;\">The risk to your personal information isn\u2019t just having it stolen from a third party. Phishing attacks can get you to do the thieves\u2019 work for them. These emails fool people into entering personal information and passwords on fake websites controlled by data thieves.<\/span><\/p>\n<p><span style=\"color: #000000;\">It turns out that you\u2019re probably pretty good at sensing when something is off about an email message. Rick Wash, an associate professor of information science and cybersecurity at Michigan State University, found that the average person is as good as a cybersecurity expert at sensing when something is weird about an email message.<\/span><\/p>\n<p><span style=\"color: #000000;\">The trick to protecting yourself from phishing attacks is remembering that phishing exists and could explain what you\u2019re sensing about an email message.<\/span><\/p>\n<p><span style=\"color: #000000;\">\u201cThe people who were good at noticing phishing messages reported stories about specific phishing incidents they had heard about,\u201d he wrote. \u201cFamiliarity with specific phishing incidents helps people remember phishing generally.\u201d<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong><span style=\"color: #ff6600;\">Eric Smalley<\/span><br \/>\n<\/strong>Science + Technology Editor<\/span><\/p>\n<hr \/>\n<p><span style=\"color: #008080;\">* Published in print edition on 7 December 2021<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; By Eric Smalley<\/p>\n","protected":false},"author":139,"featured_media":33520,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[11797],"tags":[30952,30946,30947,2801,30951,30949,30945,30953,30948,28559,30950],"class_list":["post-33519","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-black-markets","tag-cybercrime","tag-cybersafety","tag-cybersecurity","tag-data-breaches","tag-essential-reads","tag-hackers","tag-multi-factor-authentication","tag-passwords","tag-phishing","tag-two-factor-authentication"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2021\/12\/Tecno.jpg?fit=1200%2C812&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8QzSF-8ID","_links":{"self":[{"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/posts\/33519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/users\/139"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/comments?post=33519"}],"version-history":[{"count":0,"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/posts\/33519\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/media\/33520"}],"wp:attachment":[{"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/media?parent=33519"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/categories?post=33519"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/tags?post=33519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}