Data leakage is a very common cyber crime these days. Cybercrime is an activity that targets (or makes use of) a computer, a computer network, or any equipment that can be connected to the Internet. A leak occurs when sensitive data is improperly exposed. It can be carried out by an individual or by criminal organizations that use advanced techniques to profit from the commercialization of irregularly accessed information.

 

It is important to clarify that data leakage can also occur due to human error, that is, when a person, or even a company, has inadequate data security practices or does not make use of the data stored. This ends up favoring and facilitating the action of cybercriminals.

 

Daily, most companies receive information from their customers and users over the internet. Registration data to access a service or product, name, and email to participate in promotions or receive something “free”, credit card number to make a purchase in an online store, are just a few examples.

 

All this information is stored in a database on the internet and is valuable for companies. They can also be used for many purposes, such as planning advertising and marketing actions, creating new products based on customer profiles, among others.

 

Criminals break into these databases and access t-his information. Much of this leaked data ends up on the deep web and dark web where it is sold for millions of dollars. 

 

But why is this data so valuable?

 

Here are some specific examples of some scams that cybercriminals can carry out with information from people and companies:

 

Email and Internet scams;

Identity fraud: personal information is stolen and used;

Credit card data theft and fraudulent billing;

Theft and sale of corporate data.

 

Now you must be wondering what is possible to do to prevent your information from being exposed and commercialized by malicious people. Here are some tips and best practices that will help you protect your data and your computer:

Always keep antivirus programs on your devices that have an Internet connection up to date.

 

Protect your email by changing your password regularly and access your accounts only from trusted, personal use devices.

 

Create a strong and difficult password containing more than ten characters including numbers, uppercase and lowercase letters, and special characters from your keyboard. Try to use different passwords for each account and avoid having your passwords saved in your browser. To help you manage so many complex passwords, you can count on specific tools for that.

 

Use two-step authentication as this creates an additional layer of security making it difficult for attackers to access.

 

Be careful and try not to click on links from spam emails or unknown websites.

 

Do not give your personal information to anyone. In case of suspicious orders, contact the company through a different channel (website or phone) to confirm the order.

 

Always keep an eye on your bank statements. If there is any suspicion, the bank itself can help you identify whether it may be a fraudulent action.

 

For bank accounts, activate the communication service, in which you are notified in all situations of debits, credits and loans.

 

Increasingly, we realize the need to be informed and updated about what is happening in the digital world. We need to use the internet with resilience and vigilance against careless or negligent behavior that could compromise their own or others’ data and device security. These are just some attitudes and values ​​related to the competences of Digital Security – Personal Cyber-Security Management. Shall we talk a little more about Digital Intelligence Skills?