The knowledge you need

Issue 3 2021 Editor's Choice

Sharing and geotagging photos, uploading documents to the cloud, installing a new application and even when browsing online retail stores, we deal with personal data management daily, whether we realise it or not. Often, it is not clear what data we share and most importantly, who are the final recipients of the data and that makes us vulnerable.

One of the threats that online users of all ages, professions and backgrounds face is doxing, the practice of gathering personal information with the purpose of publishing it or using it in some other way to harm somebody. To help users take back control of their data and protect from doxing, Kaspersky privacy experts have developed a comprehensive checklist on how to handle one’s private data responsibly, without it becoming a headache (See www.kaspersky.com/blog/anti-doxing-checklist/).

Kaspersky research shows that looking after private data has finally become a mainstream concern, with 50% of consumers globally claiming they would no longer use an online service provider following a data breach and 57% expressing worry about their security and privacy being affected by ‘smart-’ and Internet-connected devices. This concern is justified, because online users face data risks on a daily basis.

We are still learning exactly how to build our relationships with technology, so we can better trust it with our personal data, as well as use it more mindfully to avoid potential anxiety or burnout. For example, the innocent photo of a teen with a newly-issued ID may end up in the hands of financial scammers. Your photos from the latest party might surface online without approval and your kid’s smartwatch might be broadcasting their live location 24/7.

While some of the risks – such as data leaks and ransomware attacks on organisations – are largely beyond a user’s control, other threats, such as doxing, can be tackled by users themselves. Doxing is made possible because there are so many public channels (forums, social media and application records) where user data is exposed, but that can be prevented.

Digital risks do not mean that users should stop expressing themselves online – and it certainly is not something that most people are willing to do anyway. Technology and innovation should improve lives and strengthen our mental welfare. As such, digital wellbeing should be a top priority for all, especially during the challenging times we live in. This is why digital citizens need to learn how to treat personal data online responsibly – similarly to how we treat our finances and take care of physical belongings.

Kaspersky privacy experts, with help from external experts, created a short guide that will ease the risks and stress of data loss and diminish doxing potential for a user. The checklist, which is split into three sections, addresses how to treat the data we do and do not control, such as browser activity and application tracking and other people’s data that you may come across. By providing users with the right knowledge and tools to help navigate the Internet safely, they can become empowered and experience less digital stress, to enjoy technology, worry-free.

Reader can also learn what doxing is and how to protect yourself and your close ones from it in Kaspersky’s free online course at https://education.kaspersky.com/en/lesson/53/page/291.

Read the Definitive Checklist: how to protect your data online at www.kaspersky.com/blog/anti-doxing-checklist or download a printable version at https://media.kasperskydaily.com/wp-content/uploads/sites/92/2021/04/28134211/Definitive-checklist-how-to-protect-your-data-online.pdf




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
South African fire standards in a nutshell
Fire & Safety Editor's Choice Training & Education
The importance of compliant fire detection systems and proper fire protection cannot be overstated, especially for businesses. Statistics reveal that 44% of businesses fail to reopen after a fire.

Read more...
LidarVision for substation security
Fire & Safety Government and Parastatal (Industry) Editor's Choice
EG.D supplies electricity to 2,7 million people in the southern regions of the Czech Republic, on the borders of Austria and Germany. The company operates and maintains infrastructure, including power lines and high-voltage transformer substations.

Read more...
Standards for fire detection
Fire & Safety Associations Editor's Choice
In previous articles in the series on fire standards, Nick Collins discussed SANS 10400-T and SANS 10139. In this editorial, he continues with SANS 322 – Fire Detection and Alarm Systems for Hospitals.

Read more...
Wildfires: a growing global threat
Editor's Choice Fire & Safety
Regulatory challenges and litigation related to wildfire liabilities are on the rise, necessitating robust risk management strategies and well-documented wildfire management plans. Technological innovations are enhancing detection and suppression capabilities.

Read more...
Managing stock efficiently and cost-effectively
Editor's Choice Asset Management Infrastructure Logistics (Industry)
Rina Redelinghuys, customer services executive at Cquential, a member of the Argility Technology Group, examines stock management across various industries, including retail, fast-moving consumer goods, food and dairy, automotive, apparel, industrial, accessories, paint and chemicals, and pharmaceuticals.

Read more...
Winners of the 2025 Southern Africa OSPAs
Editor's Choice
The winners of the 2025 Southern Africa Outstanding Security Performance Awards (OSPAs) were revealed on Wednesday, 4th June, at Securex South Africa. Winners from all categories (except the Lifetime Achievement) will be featured in the second Global OSPAs set to take place in 2026.

Read more...
Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.

Read more...
A new generational framework
Editor's Choice Training & Education
Beyond Generation X, and Millennials, Dr Chris Blair discusses the seven decades of technological evolution and the generations they defined, from the 1960’s Mainframe Cohort, to the 2020’s AI Navigators.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.