How to avoid becoming a participant in data leaks?

No need to give out your personal data where they are not needed. If you make purchases on the Internet or get a discount card in a store, it is best to indicate the "left" information.

So you protect yourself from spam calls and SMS and do not become a victim of leaks, which have been happening more often lately. 

Another easy way to steal personal data was authorization on portals through social networks. On the one hand, it is convenient, you do not need to fill out many different forms. But on the other hand, the user himself combines an incomprehensible site with his page. 

Applications - harm or benefit?

Now we have applications on our phones for every occasion. We trust them with our personal information. But do they keep it that well? Grigory Pashchenko believes that it is worth considering if the application requires access to your phone book, SMS, instant messengers. 

Before installing, you need to search the Internet for what they generally write about this application. They may look for your bank cards, send you money transfer messages, or send you viruses. Now, through closed channels, chats and incomprehensible sites, the applications “Find out who called you”, “How much you can win on bets”, “Find out where your soulmate is now” have begun to actively spread. People download them because they believe. But in fact, such applications do not work, they download your data and transfer it to scammers. 

In addition, due to the blocking of many services and sites in the last year, many people have started using VPNs. This is a technology that provides a connection over another network and protects personal data.

Don't trust free VPNs. They work only on the fact that they collect your data, process it, and then transfer it to marketing agencies or even law enforcement agencies. That being said, a paid VPN can be useful. For example, you are at the train station, you do not have internet, you join free Wi-Fi. You don't know who opened this hotspot. This may be a scammer who works from a laptop. Then a paid VPN will save you. 

The expert also advises to always update the operating and software systems of computers, laptops and phones. Recent versions may have fewer vulnerabilities. At the same time, they must be supplied with more recent versions of browsers and antiviruses. 

If your smartphone has not been updated for more than a year, replace it with a more modern one. It is better to spend money than to lose in safety. 

How to maintain a reputation on the Internet?

Social networks have become an integral part of our lives. They are convenient because in a short period you can find out news about all your friends and tell about yourself. Sometimes this information can be used to your detriment. 

Many guys get to know girls by collecting information on them. Who goes where, what they do. Then they choose a “profitable” companion for themselves and begin to adapt to supposedly random situations. For example, they know that a girl goes for a manicure to one master and loves coffee. Then they introduce themselves as a businessman from Cameroon, they are nicely looked after, they say that they want to open a business, but they were robbed. Please lend me, I'll give it back tomorrow. 

The "swindler from Tinder" - Simon Leviev became famous all over the world. A young Israeli posed as the son of a real billionaire - the diamond king. And after skillful processing, the swindler defrauded the girls of huge sums that they could not afford. Now the victims are paying off debts on loans, being treated for a nervous breakdown and depression.

I recommend being on social media not under real data. You don’t need to take photos from your personal life where your apartment will be visible, describe your travels, tell the names of your animals, how long ago you got married, what places you visit. Moreover, do not take pictures of your passport and driver's licenses. 

The expert believes that the profile in social networks should be closed so that the data could not be copied. If friends or acquaintances are looking for you, just send them a link to your profile.

If unwanted information about you is already circulating on the network, and anyone who wants to can get acquainted with it simply by typing in a name on the Internet, then there is also a way out. You can ask  search engines to remove search results. This is called the right to be forgotten. 



Comments (0)
No login
Login or register to post your comment