Archives - Personal Information


Limit the amount of personal information you post online

Do not post information that could make you vulnerable, such as your address, phone number, email, or information about your schedule or routine. Supplying your email address may increase the amount of spam you receive. Providing details about your hobbies, your job, your family and friends, or your past may give attackers enough information to […]

What is e-skimming?

Skimming online customer payment info from website checkout forms. Cyber criminals introduce skimming code on e-commerce payment card processing web pages to capture credit card and personally identifiable information (PII) and send the stolen data to a domain under their control. The malicious code captures credit card data as the end user enters it in […]

Secure your digital life

New Internet-connected — Internet of Things (IoT) or smart devices — provide a level of convenience in our lives, but they require that we share more information than ever. The security of this information, and the security of these devices, is not always guaranteed. Once your device connects to the Internet, you and your device […]

Social media is part of the online fraud toolset

By searching Google and scanning social media sites, cybercriminals can gather information about your partners and vendors, as well as human resources and financial departments. Employees should avoid oversharing on social media and should not conduct official business, exchange payment, or share personally identifiable information (PII) on social media platforms.

Never click and tell

Limit what information you post on social media—from personal addresses to where you like to grab coffee. What many people don’t realize is that these seemingly random details are all that criminals need to know to target you, your loved ones, and your physical belongings—online and in the real world. Keep Social Security numbers, account […]

Keep tabs on your apps

Most connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with suspicious apps running in the background or using default permissions you never realized you approved—gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and use […]