The Times Australia
The Times World News

.

How vulnerable is your personal information? 4 essential reads

  • Written by Eric Smalley, Science + Technology Editor
How vulnerable is your personal information? 4 essential reads

When you enter your personal information or credit card number into a website, do you have a moment of hesitation? A nagging sense of vulnerability prompted by the parade of headlines about data breaches and hacks? If so, you probably push those feelings aside and hit the submit button, because, well, you need to shop, apply for that job, file that insurance claim, apply for that loan, or do any of the other sensitive activities that take place online these days.

First, the bad news. If you regularly enter sensitive information online, chances are you’ve had some data stolen somewhere at some point. By one estimate, the average American had data stolen at least four times[1] in 2019. And the hits keep coming. For instance, a data breach at the wireless carrier T-Mobile reported in August 2021 affected 100 million people[2].

Now for some good news. Not all hacks are the same, and there are steps you can take to protect yourself. The Conversation gathered four articles from our archives that illuminate the types of threats to your online data, what data thieves do with your stolen information, and what you can do about it.

1. Take stock of your risk

Not all cyberattacks are the same, and not all personal data is the same. Was an organization that has your information the victim of a ransomware attack? Chances are your information won’t be stolen, though the organization’s copy of it could be rendered unusable.

If an organization you deal with did have customer data stolen, what data of yours did the thieves get? Merrill Warkentin[3], a professor of information systems at Mississippi State University, writes that you should ask yourself some questions to assess your risk[4]. If the stolen data was your purchase history, maybe that won’t be used to hurt you. But if it was your credit card number, that’s a different story.

Data breaches are a good opportunity “to change your passwords, especially at banks, brokerages and any site that retains your credit card number,” he wrote. In addition to using unique passwords and two-factor authentication, “you should also consider closing old unused accounts so that the information associated with them is no longer available.”

Read more: Ransomware, data breach, cyberattack: What do they have to do with your personal information, and how worried should you be?[5]

2. The market for your stolen data

Most data breaches are financial crimes, but the hackers generally don’t use the stolen data themselves. Instead, they sell it on the black market, usually via websites on the dark web[6], for other criminals and scammers to use.

This black market is awash in personal data, so much so that your information is probably worth a lot less than you would guess. For example, stolen PayPal account information goes for $30[7].

Buyers use stolen data in several ways[8], writes Ravi Sen[9], an associate professor of information and operations management at Texas A&M University. Common uses are stealing your money or identity. “Credit card numbers and security codes can be used to create clone cards for making fraudulent transactions,” he writes. “Social Security numbers, home addresses, full names, dates of birth and other personally identifiable information can be used in identity theft.”

Read more: Here’s how much your personal information is worth to cybercriminals – and what they do with it[10]

The T-Mobile breach revealed in August 2021 exemplifies the challenges consumers face when hackers steal their information from large corporations.

3. How to prepare for the inevitable

With all this bad news, it’s tempting to throw up your hands and assume there’s nothing you can do. W. David Salisbury[11], a professor of cybersecurity management, and Rusty Baldwin[12], a research professor of computer science at the University of Dayton, write that there are steps you can take to protect yourself[13].

[Over 140,000 readers rely on The Conversation’s newsletters to understand the world. Sign up today[14].]

“Think defensively about how you can protect yourself from an almost inevitable attack, rather than assuming you’ll avoid harm,” they write. The key is focusing on the information that’s most important to protect. Uppermost are your passwords, particularly for banking and government services. Use different passwords for different sites, and use long – though not necessarily complicated – passwords, they write.

The most effective way to protect your data is to add another layer of security via multifactor authentication. And rather than rely on websites to text or email you authentication codes, which can be hijacked, you should use an app or USB device that uses public-key encryption[15], they write.

Read more: Data breaches are inevitable – here's how to protect yourself anyway[16]

4. Don’t make it easy for the thieves

The risk to your personal information isn’t just having it stolen from a third party. Phishing attacks[17] can get you to do the thieves’ work for them. These emails fool people into entering personal information and passwords on fake websites controlled by data thieves.

It turns out that you’re probably pretty good at sensing when something is off about an email message. Rick Wash[18], an associate professor of information science and cybersecurity at Michigan State University, found that the average person is as good as a cybersecurity expert[19] at sensing when something is weird about an email message.

The trick to protecting yourself from phishing attacks is remembering that phishing exists and could explain what you’re sensing about an email message.

“The people who were good at noticing phishing messages reported stories about specific phishing incidents they had heard about,” he wrote. “Familiarity with specific phishing incidents helps people remember phishing generally.”

Read more: You know how to identify phishing emails – a cybersecurity researcher explains how to trust your instincts to foil the attacks[20]

Editor’s note: This story is a roundup of articles from The Conversation’s archives.

References

  1. ^ had data stolen at least four times (www.techrepublic.com)
  2. ^ affected 100 million people (www.vice.com)
  3. ^ Merrill Warkentin (theconversation.com)
  4. ^ assess your risk (theconversation.com)
  5. ^ Ransomware, data breach, cyberattack: What do they have to do with your personal information, and how worried should you be? (theconversation.com)
  6. ^ websites on the dark web (qz.com)
  7. ^ goes for $30 (www.privacyaffairs.com)
  8. ^ use stolen data in several ways (theconversation.com)
  9. ^ Ravi Sen (theconversation.com)
  10. ^ Here’s how much your personal information is worth to cybercriminals – and what they do with it (theconversation.com)
  11. ^ W. David Salisbury (theconversation.com)
  12. ^ Rusty Baldwin (theconversation.com)
  13. ^ steps you can take to protect yourself (theconversation.com)
  14. ^ Sign up today (memberservices.theconversation.com)
  15. ^ public-key encryption (ssd.eff.org)
  16. ^ Data breaches are inevitable – here's how to protect yourself anyway (theconversation.com)
  17. ^ Phishing attacks (www.consumer.ftc.gov)
  18. ^ Rick Wash (theconversation.com)
  19. ^ is as good as a cybersecurity expert (theconversation.com)
  20. ^ You know how to identify phishing emails – a cybersecurity researcher explains how to trust your instincts to foil the attacks (theconversation.com)

Read more https://theconversation.com/how-vulnerable-is-your-personal-information-4-essential-reads-172203

Times Magazine

From Beach Bops to Alpine Anthems: Your Sonos Survival Guide for a Long Weekend Escape

Alright, fellow adventurers and relaxation enthusiasts! So, you've packed your bags, charged your devices, and mentally prepared for that glorious King's Birthday long weekend. But hold on, are you really ready? Because a true long weekend warrior kn...

Effective Commercial Pest Control Solutions for a Safer Workplace

Keeping a workplace clean, safe, and free from pests is essential for maintaining productivity, protecting employee health, and upholding a company's reputation. Pests pose health risks, can cause structural damage, and can lead to serious legal an...

The Science Behind Reverse Osmosis and Why It Matters

What is reverse osmosis? Reverse osmosis (RO) is a water purification process that removes contaminants by forcing water through a semi-permeable membrane. This membrane allows only water molecules to pass through while blocking impurities such as...

Foodbank Queensland celebrates local hero for National Volunteer Week

Stephen Carey is a bit bananas.   He splits his time between his insurance broker business, caring for his young family, and volunteering for Foodbank Queensland one day a week. He’s even run the Bridge to Brisbane in a banana suit to raise mon...

Senior of the Year Nominations Open

The Allan Labor Government is encouraging all Victorians to recognise the valuable contributions of older members of our community by nominating them for the 2025 Victorian Senior of the Year Awards.  Minister for Ageing Ingrid Stitt today annou...

CNC Machining Meets Stage Design - Black Swan State Theatre Company & Tommotek

When artistry meets precision engineering, incredible things happen. That’s exactly what unfolded when Tommotek worked alongside the Black Swan State Theatre Company on several of their innovative stage productions. With tight deadlines and intrica...

The Times Features

Cult Favourite, TokyoTaco, Opens Beachfront at Mooloolaba this June

FREE Tokyo Tacos to Celebrate!  Cult favourite Japanese-Mexican restaurant TokyoTaco is opening a beachfront venue at the Mooloolaba Esplanade on Queensland’s Sunshine Coast t...

Samsara Eco and lululemon announce 10 year partnership

lululemon and Samsara Eco Announce 10-Year Plan to Advance Recycled Material Portfolio Plan will see lululemon source a significant portion of its future nylon 6,6 and polyes...

The viral diet that could boost your immunity during winter

As we settle into the winter months, immune health becomes top of mind, and the latest food trend gaining traction may be worth taking seriously, especially when it comes to st...

Running Across Australia: What Really Holds the Body Together?

How William Goodge’s 3,800km run reveals the connection between movement, mindset, and mental resilience As a business owner, I’ve come to realise that the biggest wins rarely com...

Telehealth is Transforming Healthcare Services in Australia

It has traditionally not been easy to access timely healthcare in Australia, particularly for people who live in remote areas. Many of them spend hours on the road just to see...

Launchd Acquires Huume, Strengthening Creative Firepower Across Talent-Led Marketing

Launchd, a leader in talent, technology and brand partnerships, has announced its acquisition of influencer talent management agency Huume from IZEA. The move comes as the medi...