The knowledge you need

Issue 3 2021 Editor's Choice

Sharing and geotagging photos, uploading documents to the cloud, installing a new application and even when browsing online retail stores, we deal with personal data management daily, whether we realise it or not. Often, it is not clear what data we share and most importantly, who are the final recipients of the data and that makes us vulnerable.

One of the threats that online users of all ages, professions and backgrounds face is doxing, the practice of gathering personal information with the purpose of publishing it or using it in some other way to harm somebody. To help users take back control of their data and protect from doxing, Kaspersky privacy experts have developed a comprehensive checklist on how to handle one’s private data responsibly, without it becoming a headache (See www.kaspersky.com/blog/anti-doxing-checklist/).

Kaspersky research shows that looking after private data has finally become a mainstream concern, with 50% of consumers globally claiming they would no longer use an online service provider following a data breach and 57% expressing worry about their security and privacy being affected by ‘smart-’ and Internet-connected devices. This concern is justified, because online users face data risks on a daily basis.

We are still learning exactly how to build our relationships with technology, so we can better trust it with our personal data, as well as use it more mindfully to avoid potential anxiety or burnout. For example, the innocent photo of a teen with a newly-issued ID may end up in the hands of financial scammers. Your photos from the latest party might surface online without approval and your kid’s smartwatch might be broadcasting their live location 24/7.

While some of the risks – such as data leaks and ransomware attacks on organisations – are largely beyond a user’s control, other threats, such as doxing, can be tackled by users themselves. Doxing is made possible because there are so many public channels (forums, social media and application records) where user data is exposed, but that can be prevented.

Digital risks do not mean that users should stop expressing themselves online – and it certainly is not something that most people are willing to do anyway. Technology and innovation should improve lives and strengthen our mental welfare. As such, digital wellbeing should be a top priority for all, especially during the challenging times we live in. This is why digital citizens need to learn how to treat personal data online responsibly – similarly to how we treat our finances and take care of physical belongings.

Kaspersky privacy experts, with help from external experts, created a short guide that will ease the risks and stress of data loss and diminish doxing potential for a user. The checklist, which is split into three sections, addresses how to treat the data we do and do not control, such as browser activity and application tracking and other people’s data that you may come across. By providing users with the right knowledge and tools to help navigate the Internet safely, they can become empowered and experience less digital stress, to enjoy technology, worry-free.

Reader can also learn what doxing is and how to protect yourself and your close ones from it in Kaspersky’s free online course at https://education.kaspersky.com/en/lesson/53/page/291.

Read the Definitive Checklist: how to protect your data online at www.kaspersky.com/blog/anti-doxing-checklist or download a printable version at https://media.kasperskydaily.com/wp-content/uploads/sites/92/2021/04/28134211/Definitive-checklist-how-to-protect-your-data-online.pdf




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What South Africans need to know about smart devices
Technews Publishing Editor's Choice
We live in a world surrounded by smart devices, from our pockets to our driveways and living rooms.

Read more...
From overwhelm to oversight
Editor's Choice Cyber Security Products
Security automation is vital in today’s world, and Microsoft Sentinel is a widely adopted, but complex answer. ContraForce is an easy-to-use add-on that automatically processes, verifies and warns of threats round-the-clock.

Read more...
SMART Surveillance Conference 2023
Technews Publishing Editor's Choice CCTV, Surveillance & Remote Monitoring Conferences & Events
Some people think the future is all about cloud technologies, but the SMART Surveillance conference demonstrated that AI is making edge surveillance much more attractive, over distributed sites, than ever before.

Read more...
Has your business planned for the worst?
Editor's Choice Cyber Security Security Services & Risk Management
Incident response is a specialised part of security, like a hospital's intensive care unit: IR kicks in when the organisation detects a breach of its systems to stop criminals from doing more damage.

Read more...
Making a difference with human intelligence gathering
Kleyn Change Management Editor's Choice
Eva Nolle believes that woman should stand their ground as they often bring an entirely different skill set to the table, which enhances the overall service delivered.

Read more...
Milestone celebrates women in security
Milestone Systems Technews Publishing Editor's Choice News Conferences & Events
The Milestone Systems’ African team wanted to express their appreciation for the incredible contributions of the women in the security industry and held a breakfast in honour of the hard-working women in the industry on 8 August.

Read more...
Supporting CCTV intelligence with small and big data
Leaderware Editor's Choice CCTV, Surveillance & Remote Monitoring
The increasing development of AI and its role in enhancing investigation-led surveillance, and the increasing capacity of control rooms and local analysts to deliver data in return, can increase the synergy between intelligence and surveillance.

Read more...
Overcoming resistance to changing your current operating model
Editor's Choice Integrated Solutions
Business survival goes beyond cutting costs and driving efficiency, it’s about using data and technology as strategic assets to develop speed, agility and resilience, keep up with customer demands, beat the competition and grow the business.

Read more...
The road to Zero Trust not necessarily paved with gold
Editor's Choice Access Control & Identity Management Cyber Security
Paul Meyer says that while Zero Trust must be the goal, there are a few potholes to navigate on the journey. Here he expands on these caveats, but also exposes the greatest ally of Zero Trust.

Read more...
More agile, flexible access management
ASSA ABLOY South Africa Editor's Choice Access Control & Identity Management
Tim Timmins from ASSA ABLOY Opening Solutions examines the growing shift towards cloud access management. How can organisations benefit, and what should they look for when choosing a cloud access control solution?

Read more...