Remove Accountability Remove Data collection Remove Identity Theft Remove Media
article thumbnail

How to Secure Your Business Social Media Accounts

BH Consulting

When we think about social media, we think about the nice side of it: staying in touch with friends and family, getting updates about our interests – but the more active we are on it, the more risk we’re exposed to. Having policies and procedures to secure social media accounts and minimise the potential for incidents can help.

Media 52
article thumbnail

How to Help Protect Your Digital Footprint

Identity IQ

How to Help Protect Your Digital Footprint IdentityIQ Every click, search, and interaction online contributes to your digital footprint – an intricate trail of data that encapsulates your digital identity. Your digital footprint is the trail of data you leave behind when you use the internet and digital devices.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Not the Invasion They Warned Us About: TikTok and the Continued Erosion of Online Privacy

Approachable Cyber Threats

It’s a harsh realization we are dealing with more by the day as social media, and a litany of applications and hosted software products invade our daily lives, and in the process, our privacy. Now TikTok wants the ability to put an actual face and voice to those other data sets, and it’s… dangerous.

article thumbnail

Doxing in the corporate sector

SecureList

Doxing refers to the collection of confidential information about a person without their consent for the purpose of inflicting harm on that person or to otherwise gain some benefit from gathering or disclosing such information. Such key positions include the CEO, HR department director, and chief accountant.

article thumbnail

Spam and phishing in 2022

SecureList

For example, one website offered users to obtain a COVID vaccination certificate by entering their British National Health Service (NHS) account credentials. Scammers abused legitimate survey services by creating polls in the name of various organization to profit from victims’ personal, including sensitive, data.

article thumbnail

What is Maryland’s Online Data Privacy Protection Act?

Centraleyes

Maryland Takes the Lead in Privacy Legislation with Comprehensive MODPA The Maryland legislature enacted two comprehensive privacy bills to limit how big tech platforms can acquire and utilize customers’ and children’s data. Maryland has taken one of the strictest positions among U.S.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

Kottmann also reportedly even posted some of the videos on Twitter, which later deleted the hacker’s account and their offending tweets. The one that scares me the most is that with this data and its analysis, adversaries could perpetuate not only cybercrimes, but also physical crimes like looting or kidnapping.”. “You