blog.avast.com Open in urlscan Pro
199.60.103.228  Public Scan

Submitted URL: https://click.emails.avast.com/?qs=33c5ea3f02357ef5a8461a3a0b90bbd337265911a7be47a8736d396081715811083bfdd987b8c13be602958d63fc...
Effective URL: https://blog.avast.com/your-data-is-under-siege.-heres-how-to-win-the-war?utm_content=1404731&utm_term=284431628_10008_...
Submission: On December 08 via api from RU — Scanned from US

Form analysis 0 forms found in the DOM

Text Content

WE VALUE YOUR PRIVACY

By clicking "OK" you allow cookies that improve your experience on our site,
help us analyze site performance and usage, and enable us to show relevant
marketing content. You can manage cookie settings below. See Cookies Policy

OK
Manage...



PRIVACY PREFERENCE CENTER

By clicking "Accept all" you allow cookies that improve your experience on our
site, help us analyze site performance and usage, and enable us to show relevant
marketing content. You can manage cookie settings below. By clicking “Confirm
selection” you agree with the current settings. See 
Cookies policy
Accept all


MANAGE CONSENT SETTINGS

NECESSARY COOKIES


Always Active

Necessary cookies help make a website usable by enabling basic functions like
page navigation and access to secure areas of the website. The website cannot
function properly without these cookies.

PREFERENCE COOKIES


Preference cookies

Preference cookies enable a website to remember information that changes the way
the website behaves or looks, such as your preferred language or the region that
you are in. De-selecting these cookies may result in improper functionality and
setting of the website.

PERFORMANCE COOKIES


Performance cookies

Performance cookies help us improve our website by analyzing how visitors use it
and interact with it. De-selecting these cookies may result in poorly-designed
content and slow site performance.

MARKETING COOKIES


Marketing cookies

Marketing cookies are used to track visitors across websites. The intention is
to display ads that are relevant and engaging for the individual user and
thereby more valuable for publishers and third party advertisers. De-selecting
these cookies may result in seeing advertising that is not as relevant to you.

 * TARGETING COOKIES
   
   Switch Label label
   
   These cookies may be set through our site by our advertising partners. They
   may be used by those companies to build a profile of your interests and show
   you relevant adverts on other sites. They do not store directly personal
   information, but are based on uniquely identifying your browser and internet
   device. If you do not allow these cookies, you will experience less targeted
   advertising.

 * SOCIAL MEDIA COOKIES
   
   Switch Label label
   
   These cookies are set by a range of social media services that we have added
   to the site to enable you to share our content with your friends and
   networks. They are capable of tracking your browser across other sites and
   building up a profile of your interests. This may impact the content and
   messages you see on other websites you visit. If you do not allow these
   cookies you may not be able to use or see these sharing tools.

Back Button


BACK



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Confirm selection

150609292312
Privacy
Emma McGowan
13-09-2024


Skip to main content >Close
 * For home For home Products for PC and mobile phone protection
 * For business For business Protect your business with Avast
 * For partners For partners Partner with Avast and boost your business

 * About us About us Careers, investors, media, contact
 * Blogs Academy, Blog, Decoded, Forum
 * Worldwide (English)

For home
 * Security
    * 
      Free Antivirus Basic protection for all your devices
      
      Free Antivirus Basic protection for all your devices
      
      Free Antivirus Basic protection for all your devices
      
      Free Antivirus Basic protection for all your devices
    * 
      Premium Security Complete protection against all internet threats
    * 
      Ultimate Our best security, privacy, and performance apps in one package
   
   Looking for a product for your device? Free Antivirus for PC,
   Free Security for Android, Free Security for Mac,
   Free Security for iPhone/iPad
   
   Looking for a product for your device? Free Antivirus for PC
   Free Security for Mac Free Security for Android Free Security for iPhone/iPad

 * Privacy
    * 
      SecureLine VPN Encrypt your connection to stay safe on public networks
    * 
      AntiTrack Disguise your digital fingerprint to avoid personalized ads
    * 
      Secure Browser Enjoy safer browsing that’s up to 4x faster
    * 
      BreachGuard Protect your personal info from being exposed and sold

 * Performance
    * 
      Cleanup Premium Boost your computer’s speed and performance
      
      Cleanup Premium Boost your computer’s speed and performance
      
      Cleanup Premium Boost your computer’s speed and performance
      
      Cleanup Premium Boost your computer’s speed and performance
    * 
      Driver Updater Automatically update drivers with a single click
    * 
      Battery Saver Maximize your battery life

 * 
   Store

 * 
   Home
 * 
   Support
 * 
   Store
 * 
   Account

For business
 * Solutions
    * 
      Endpoint Protection
      
      Small Businesses
      11-100
      Safeguard your data, devices, and apps with Next-Gen Antivirus, Patch
      Management, and Cloud Backup.
    * 
      All-In-One Protection
      
      Medium and Large Businesses
      101-1000+
      Endpoint Protection Backup and Recovery Endpoint Optimization Cloud
      Network Security Business Hub Security Platform
    * 
      Advanced All-In-One Protection
      
      Channel Partners
      MSPs, Resellers, Distributors
      Endpoint Protection Cloud Network Security CloudCare Security Platform
   
   Not sure which solution is right for your business? Help me choose

 * Business partners
    * Become a partner
    * MSP partners
    * Reseller partners
    * Distributor partners
    * Affiliates
    * Partner locator

 * Resources
 * Trials
 * 
   Store

 * 
   Home
 * 
   Contact sales
 * 
   Support
 * 
   Store
 * 
   Account
    * Business Hub
    * CloudCare
    * Reseller portal

For partners
 * Smart Life
 * Mobile Security
 * VPN
 * Threat Intelligence
 * Knowledge Center

About us
 * About Avast
 * Careers
 * Privacy
    * * Privacy
      * Expert guides
      * Privacy blogs

 * Blog
    * * Avast News
      * Business Security
      * Covid-19 Scams
      * Diversity & Inclusion
      * Elders
      * Privacy
      * Sandwich Generation
      * Security News
      * Threat Research
      * Tips & Advice

 * Press center
    * * Press releases
      * Events
      * In the news
      * Media materials
      * PR contacts

 * Investors
    * Our story
      * At a glance
      * Strategy
      * Technology expertise
      * Leadership
      * History
    * Investors
      * Overview
      * Growth & competitive advantage
      * IPO information
      * Regulatory news
      * Share price & tools
      * Corporate governance
      * Investor contacts
      * Financial calendar
      * Results, reports & presentations
      * Analyst consensus
      * Shareholder information
      * Contact us

 * Awards
 * Diversity & Inclusion
    * * Diversity & Inclusion
      * Accessibility

 * Contact us

 * Blogs
 * Avast Blog Read about recent news from the security world
 * Avast Academy Expert tips and guides about digital security and privacy
 * Avast Decoded In-depth technical articles regarding security threats
 * Avast Forum Discuss with the community

 


LIST OF AVAILABLE REGIONS

MAIN REGIONS

 * Worldwide (English)
 * Europe (English)
 * América Latina (español)

AMERICAS

 * Argentina
 * Brasil
 * Canada (English)
 * Canada (français)
 * Chile
 * Colombia
 * EE.UU. (español)
 * México
 * USA (English)

 * América Latina (español)

EUROPE, MIDDLE EAST & AFRICA

 * België (Nederlands)
 * Belgique (français)
 * Česká republika
 * Danmark
 * Deutschland
 * España
 * France
 * Italia
 * Magyarország
 * Nederland
 * Norge
 * Polska
 * Portugal
 * Schweiz (Deutsch)
 * Slovensko (česky)
 * South Africa

 * Suisse (français)
 * Suomi
 * Sverige
 * Türkiye
 * United Arab Emirates
 * United Kingdom
 * Ελλάδα
 * ישראל
 * Казахстан
 * România
 * Россия
 * Україна (українська)
 * Украина (русский)
 * المملكة العربية السعودية
 * الدول العربية

 * Europe (English)

ASIA & PACIFIC

 * Australia
 * India
 * इंडिया (हिंदी)
 * Indonesia (English)
 * Indonesia (Bahasa Indonesia)
 * Malaysia (English)
 * Malaysia (Bahasa Melayu)
 * New Zealand
 * Philippines (English)
 * Pilipinas (Filipino)

 * Singapore
 * Việt Nam
 * 日本語
 * 대한민국
 * 简体中文
 * 繁體中文
 * ประเทศไทย

 * Worldwide (English)

Close
Sections
 * All
 * business security
 * Avast News
 * Security News
 * Tips & Advice
 * Viewpoints
 * Privacy
 * Threat Research
 * Diversity & Inclusion
 * Diversity & Inclusion
   
 * Blog Authors
 * Visit Avast website
 * Change language
   * English
   * Deutsch
   * Čeština
   * Español
   * Français
   * Polski
   * Português
   * Русский
   * 日本語

Avast Blog Privacy Your data is under siege. How to protect your data and
privacy.


YOUR DATA IS UNDER SIEGE. HOW TO PROTECT YOUR DATA AND PRIVACY.

Emma McGowan 13 Sep 2024


Data privacy has become a hot topic and with good reason. Now’s the time to turn
over a new leaf when it comes to protecting your personal data.

I consider myself pretty savvy when it comes to protecting my personal data. But
last year I nearly fell for a phone scam from someone purporting to be an IRS
agent. In my own defense, it was an impressively creative scam. It was also a
reminder that there is no limit to the ingenuity thieves will employ in their
quest to steal nuggets of personal information.  

Data privacy today is a hot issue—so hot that over 18 states rushed to enact
comprehensive privacy laws, including Texas, Florida, and Oregon. Now is a good
time to spotlight some of the common schemes bad actors will use to get their
hands on your data, and to review steps you can take to avoid them. 


A MASTERCLASS IN SOCIAL ENGINEERING—ALMOST


But back to that oh-so-clever IRS scam. The caller launched into his spiel by
sharing with me his name and IRS badge number. Meanwhile, in the background I
heard the sounds of a busy office—phones ringing, other agents answering calls
and talking to customers. The production values were Netflix-worthy; it was
largely these that kept me from hanging up. Surely no scammer would go to the
trouble of recording a workplace soundtrack! 

The agent’s acting skills weren’t too shabby either, at least initially. The
thrust of his strategy was to get me to give him my current address under the
guise of needing to confirm my identity before we could continue the call. He
already knew a lot about me, including my name and a previous address. When I
balked, he shared some story about my identity having shown up in a drug bust in
another state. Even that was vaguely plausible because I’d lost a wallet with my
ID and credit cards a year prior.  

But something didn’t add up. Why would the IRS have this information, and why
would they be sharing it with me? It was more likely that my lost wallet had
provided a windfall of useful data to criminals, and now they needed a few
missing items—such as my current address—to complete the theft of my identity.  

Finally, as I started to hang up, the actor blew it, saying I’d have law
enforcement at my door the next day if I didn’t comply. Too bad. He’d been so
close to getting my Oscar vote. 


THINK TWICE BEFORE YOU CLICK, SHARE, OR RESPOND


Not all attempts to pilfer the crumbs of your personal information are as
elaborate as my IRS call. Some phone phishing scams are as simple as a caller
saying, “This is tech support, can you confirm the last four digits of your
social security number?”  

And then there are smishing scams—phishing via SMS—where you get a
friendly-seeming text from an unknown number such as, “Hi Brenda, are you still
coming over?” If you respond, even in jest, you’ve just helped a scammer confirm
your name and/or phone number. 

Social media is a fertile playground for cybercrooks looking to relieve you of
your personal data. Who among us has not come across innocent-seeming quizzes
and surveys in our feed like this one: “Your stripper name is your first pet’s
name and the street you grew up on”?  Sure, you may get a giggle from some of
the responses (“Pancake Ascot,” anyone?), but the reality is bad actors use such
social-sharing ploys to mine data on you and your friends—data that could help
them guess passwords and/or answers to security questions. Avoid clicking on
these schemes and do not share them. 

Other common social media schemes include requests for cash, friend requests
from strangers, friend requests from existing friends (these invariably come
from a hacked account), and clickbait that takes you to a fake login page in a
ploy to capture your credentials, to name a few. 


HOW TO PROTECT YOUR DATA AND PRIVACY


Here are a few basic steps. 

 * Don’t overshare on social media. Limit what you post, especially when it
   comes to quizzes and games. And make sure the only “friends” you share your
   data with are your real-life friends. That photo of your new car could
   include your license plate number, which a criminal might find useful. And
   that scooter or e-bike route you shared could give away your street address. 
 * Use strong passwords. You’ve heard it a thousand times, and with good reason.
   Instead of recycling old, easy-to-guess passwords, opt for passwords that are
   long, random, and unique. You can use a password manager to help you remember
   them. 
 * Use multifactor authentication (MFA). It’s like double-locking your front
   door. In addition to a password, MFA requires you to enter a second
   identifier to authenticate yourself. This can be an app notification, a text
   message to your smartphone, or a biometric. If a criminal compromises your
   password (first lock), your second identifier (second lock) can help keep
   your data safe. 
 * Audit your apps and logins. Delete apps you don’t use anymore or don’t
   recognize, especially if their data-sharing practices sound offensive. If you
   want to opt out permanently—for example, if you don’t trust a company—you’ll
   also want to delete your account. And think twice before using tech giants to
   automatically log in to your apps and websites. Doing so allows them to
   harvest even more of your data.  
 * Keep software up to date. Operating systems, browsers, apps, streaming
   devices, routers—you name it. Updates often include patches to fix bugs and
   security problems. Running older versions of software exposes you to attack. 

 * Protect your device from malware. As a final backstop against malware and
   other threats that may have infiltrated your device, install malware
   protection such as Avast. 

In 2024, treat your data and privacy as the precious resources they are. 





RELATED ARTICLES


CAN TSA SEARCH YOUR PHONE? KNOW YOUR DIGITAL RIGHTS AT THE AIRPORT | AVAST

TSA can make you take off your shoes, but can they search your phone? The answer
might surprise you.

12 Jun 2024 10 min read


GLITTER AND… FIREWALLS? HOW TO STAY SAFE THIS FESTIVAL SEASON

Planning on hitting up a festival or two this summer? Here's everything you need
to make sure you stay safe - in the digital realm, that is.

17 Apr 2024 10 min read


DATA BROKERS: EVERYTHING YOU NEED TO KNOW

Data brokerage is a $156 billion industry that feeds off buying and selling your
data. Find out how data brokers get your data and how to stop them here.

3 Jan 2024 5 min read


MOST POPULAR


THE HIDDEN PITFALLS OF TRAVEL APPS

6 Jun 2024


VIDEO: ACCEPT ALL COOKIES? A RECIPE FOR ONLINE PRIVACY THIS HOLIDAY SEASON

11 Dec 2023


HOW TO USE DISCORD’S ‘FAMILY CENTER’ TO HELP PROTECT YOUR CHILD

24 Jul 2023


AVAST RESEARCHERS UNCOVER DISTURBING CROWDFUNDING SCHEME

28 Jun 2023


YOUR ESSENTIAL CYBERSECURITY CHECKLIST FOR SAFE SUMMER TRAVEL

14 Jun 2023




FOLLOW US



1988 - 2024 Copyright © Avast Software s.r.o. | Sitemap Privacy policy


--> -->