You are the Weakest Link

The Weak Link in Your Personal Security Could be You

Have you “Googled” yourself lately?

8 out of 10 people in the US have a social networking profile. The need to have an online presence in today’s digital world to stay connected and relevant is unquestionable.  The problem is, most people don’t think twice about how much personal information they put out there.

Too Much Information.

A 2016 Wall Street Journal (WSJ) article reported that all computer systems that help run our lives have a “critical weakness” that can’t be fixed with a software fix or “patch.”  That weak link is you.

The WSJ article featured the opinions of an ex-hacker who also happens to be a neuroscientist – he felt strongly that we are simply making too many “mistakes” with our online lives—the kind that hackers are taking advantage of.

Social Engineering.

Social engineering is a form of hacking where online stalkers use the information they’ve gleaned from the Internet to put together profiles on people to con them into a scam or steal valuable information.  And every day, we make it easier for them with irresponsible online habits.

Accepting “friend requests” and new “connections” from unknown people are just the tip of the iceberg.  Most of us don’t think twice about posting what we eat, where we are (I am vacationing in the Maldives so my house is empty), “liking” pages, “following” people and generally ranting or raving about work, family and friends.  We also indulge in fun quizzes and surveys that may seem harmless at first but actually reveals the answers to secret security questions that can be used to unlock and access your online accounts.

Falling victim to hacking and scammers are not the only possible fallouts. There’s a saying that if you’re not paying for a product, then you are the product.  Think about this – every time you used a social media platform, app, service, or participated in surveys, you provided the company/game developer access to your online profile (including your email address). Who’s to say that your information won’t be mined and sold to the highest bidder?  Companies willingly pay big bucks to have control or influence over your buying habits and even voting preferences.

Information defines us.

The more inside information someone knows about you, the more likely you are to let your guard down, and that’s all that a hacker needs—a crack in your line of defense.  It’s also possible that you’re not the ultimate target – making yourself vulnerable also exposes your family, friends and even business to the same criminal threats.

You can have the best alarm system in your home and the best locks on every door and window. However, if you forget to set the alarm, or leave a window open or simply open the door to anyone who knocks, then you’ve lessened the power of your security system.

The Takeaway.

It’s unlikely that you’ll suddenly change your ways or completely unplug especially if nothing bad has happened to you…yet.  However, it’s not too late to start being wise about what you post and take some measures to make sure you stay safe online.

  • Don’t accept friend requests unless you know the person and you truly want to be friends. Remember—they may have friends you wouldn’t really want to know.
  • Think before you click, especially shortened URLs. Hover over the URL and see where it leads you or if you click on the link, check that the URL matches the company’s website/ name and that all the branding aspects are correct and current.
  • Be cautious of a high volume of the same status being shared on timelines especially if the wordings are exactly the same. It’s a red flag for a scam.
  • Use different passwords for your email accounts, social media, and online banking. Utilizing two-factor authentication and password managers can also be useful.
  • Keep your anti-virus and anti-spyware/malware version up-to-date and make sure it’s from a reputable source or company.
  • Be wary of websites that offer free downloads of music, games or movies. Porn sites and P2P streaming/file-sharing sites may install harmful programs without your knowledge.
  • Do not use any software that auto-completes online forms. The same goes for your Google or browser settings… make sure you turn off the feature and clear your history and cached data.
Picture of <span>About The Author</span>Chris Parker

About The AuthorChris Parker

Chris Parker is the founder of WhatIsMyIPAddress.com, one of the world’s most popular websites for online privacy and security with over 13 million monthly visitors. He is also the host of the Easy Prey podcast, where he interviews experts and survivors to uncover the tactics behind scams, fraud, and digital manipulation. Chris is the author of Privacy Crisis: How to Maintain Your Privacy Without Becoming a Hermit, a practical guide to protecting personal information in today’s surveillance-driven world. His work has been featured on ABC News and numerous podcasts, making him a trusted voice on how to stay safe, secure, and private online.
Share Post:

INSIGHTS YOU

MAY ALSO LIKE

You play a role in preventing social engineering. So, just what is social engineering? It’s a vague term that’s used for online shenanigans and…

If you think that only your Internet Service Provider (ISP), such as Cox Cable or Verizon, knows your IP address, think again. (Your IP…

This post was moved over from an old blog of mine that I’ve since taken down. Several years ago I purchased an APC AP9630…

WHAT PEOPLE SAY

ABOUT CHRIS

DOWNLOAD CHRIS’ BOOK

PRIVACY CRISIS

DOWNLOAD YOUR FREE PDF, MP3, and workbook by entering your details below.

We respect your privacy. 

Don’t want to share your email?

Privacy Policy

This following document sets forth the Privacy Policy for this website.

Collection of your personal information

We collect Non-Personally Identifiable Information from visitors to this Website. Non-Personally Identifiable Information is information that cannot by itself be used to identify a particular person or entity, and may include your IP host address, pages viewed, browser type, Internet browsing and usage habits, advertisements that you click on, Internet Service Provider, domain name, the time/date of your visit to this Website, the referring URL and your computer’s operating system.

Free offers & opt-ins

Participation in providing your email address in return for an offer from this site is completely voluntary and the user therefore has a choice whether or not to disclose your information. You may unsubscribe at any time so that you will not receive future emails.

Sharing of your personal information

Your personal information that we collect as a result of you purchasing our products & services, will NOT be shared with any third party, nor will it be used for unsolicited email marketing or spam. We may send you occasional marketing material in relation to our design services.

What Information Do We Collect?

If you choose to correspond with us through email, we may retain the content of your email messages together with your email address and our responses.

Cookie Based Marketing

Some of our advertising campaigns may track users across different websites for the purpose of displaying advertising. We do not know which specific website are used in these campaigns, but you should assume tracking occurs, and if this is an issue you should turn-off third party cookies in your web browser.

How Do We Use Information We Collect from Cookies?

As you visit and browse Our Website, the Our Website uses cookies to differentiate you from other users. In some cases, we also use cookies to prevent you from having to log in more than is necessary for security. Cookies, in conjunction with our web server log files or pixels, allow us to calculate the aggregate number of people visiting Our Website and which parts of the site are most popular.

This helps us gather feedback to constantly improve Our Website and better serve our clients. Cookies and pixels do not allow us to gather any personal information about you and we do not intentionally store any personal information that your browser provided to us in your cookies.

IP Addresses

P addresses are used by your computer every time you are connected to the Internet. Your IP address is a number that is used by computers on the network to identify your computer. IP addresses are automatically collected by our web server as part of demographic and profile data known as traffic data so that data (such as the Web pages you request) can be sent to you.

Sharing and Selling Information

We do not share, sell, lend or lease any of the information that uniquely identify a subscriber (such as email addresses or personal details) with anyone except to the extent it is necessary to process transactions or provide Services that you have requested.

How Can You Access and Correct Your Information?

You may request access to all your personally identifiable information that we collect online and maintain in our database by using our contact page form.

Changes to this Privacy Policy

We reserve the right to make amendments to this Privacy Policy at any time. If you have objections to the Privacy Policy, you should not access or use this website. You may contact us at any time with regards to this privacy policy.