blog.avast.com
Open in
urlscan Pro
199.60.103.228
Public Scan
Submitted URL: https://click.emails.avast.com/?qs=33c5ea3f02357ef5a8461a3a0b90bbd337265911a7be47a8736d396081715811083bfdd987b8c13be602958d63fc...
Effective URL: https://blog.avast.com/your-data-is-under-siege.-heres-how-to-win-the-war?utm_content=1404731&utm_term=284431628_10008_...
Submission: On December 08 via api from RU — Scanned from US
Effective URL: https://blog.avast.com/your-data-is-under-siege.-heres-how-to-win-the-war?utm_content=1404731&utm_term=284431628_10008_...
Submission: On December 08 via api from RU — Scanned from US
Form analysis
0 forms found in the DOMText Content
WE VALUE YOUR PRIVACY By clicking "OK" you allow cookies that improve your experience on our site, help us analyze site performance and usage, and enable us to show relevant marketing content. You can manage cookie settings below. See Cookies Policy OK Manage... PRIVACY PREFERENCE CENTER By clicking "Accept all" you allow cookies that improve your experience on our site, help us analyze site performance and usage, and enable us to show relevant marketing content. You can manage cookie settings below. By clicking “Confirm selection” you agree with the current settings. See Cookies policy Accept all MANAGE CONSENT SETTINGS NECESSARY COOKIES Always Active Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies. PREFERENCE COOKIES Preference cookies Preference cookies enable a website to remember information that changes the way the website behaves or looks, such as your preferred language or the region that you are in. De-selecting these cookies may result in improper functionality and setting of the website. PERFORMANCE COOKIES Performance cookies Performance cookies help us improve our website by analyzing how visitors use it and interact with it. De-selecting these cookies may result in poorly-designed content and slow site performance. MARKETING COOKIES Marketing cookies Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers. De-selecting these cookies may result in seeing advertising that is not as relevant to you. * TARGETING COOKIES Switch Label label These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. * SOCIAL MEDIA COOKIES Switch Label label These cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools. Back Button BACK Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Confirm selection 150609292312 Privacy Emma McGowan 13-09-2024 Skip to main content >Close * For home For home Products for PC and mobile phone protection * For business For business Protect your business with Avast * For partners For partners Partner with Avast and boost your business * About us About us Careers, investors, media, contact * Blogs Academy, Blog, Decoded, Forum * Worldwide (English) For home * Security * Free Antivirus Basic protection for all your devices Free Antivirus Basic protection for all your devices Free Antivirus Basic protection for all your devices Free Antivirus Basic protection for all your devices * Premium Security Complete protection against all internet threats * Ultimate Our best security, privacy, and performance apps in one package Looking for a product for your device? Free Antivirus for PC, Free Security for Android, Free Security for Mac, Free Security for iPhone/iPad Looking for a product for your device? Free Antivirus for PC Free Security for Mac Free Security for Android Free Security for iPhone/iPad * Privacy * SecureLine VPN Encrypt your connection to stay safe on public networks * AntiTrack Disguise your digital fingerprint to avoid personalized ads * Secure Browser Enjoy safer browsing that’s up to 4x faster * BreachGuard Protect your personal info from being exposed and sold * Performance * Cleanup Premium Boost your computer’s speed and performance Cleanup Premium Boost your computer’s speed and performance Cleanup Premium Boost your computer’s speed and performance Cleanup Premium Boost your computer’s speed and performance * Driver Updater Automatically update drivers with a single click * Battery Saver Maximize your battery life * Store * Home * Support * Store * Account For business * Solutions * Endpoint Protection Small Businesses 11-100 Safeguard your data, devices, and apps with Next-Gen Antivirus, Patch Management, and Cloud Backup. * All-In-One Protection Medium and Large Businesses 101-1000+ Endpoint Protection Backup and Recovery Endpoint Optimization Cloud Network Security Business Hub Security Platform * Advanced All-In-One Protection Channel Partners MSPs, Resellers, Distributors Endpoint Protection Cloud Network Security CloudCare Security Platform Not sure which solution is right for your business? Help me choose * Business partners * Become a partner * MSP partners * Reseller partners * Distributor partners * Affiliates * Partner locator * Resources * Trials * Store * Home * Contact sales * Support * Store * Account * Business Hub * CloudCare * Reseller portal For partners * Smart Life * Mobile Security * VPN * Threat Intelligence * Knowledge Center About us * About Avast * Careers * Privacy * * Privacy * Expert guides * Privacy blogs * Blog * * Avast News * Business Security * Covid-19 Scams * Diversity & Inclusion * Elders * Privacy * Sandwich Generation * Security News * Threat Research * Tips & Advice * Press center * * Press releases * Events * In the news * Media materials * PR contacts * Investors * Our story * At a glance * Strategy * Technology expertise * Leadership * History * Investors * Overview * Growth & competitive advantage * IPO information * Regulatory news * Share price & tools * Corporate governance * Investor contacts * Financial calendar * Results, reports & presentations * Analyst consensus * Shareholder information * Contact us * Awards * Diversity & Inclusion * * Diversity & Inclusion * Accessibility * Contact us * Blogs * Avast Blog Read about recent news from the security world * Avast Academy Expert tips and guides about digital security and privacy * Avast Decoded In-depth technical articles regarding security threats * Avast Forum Discuss with the community LIST OF AVAILABLE REGIONS MAIN REGIONS * Worldwide (English) * Europe (English) * América Latina (español) AMERICAS * Argentina * Brasil * Canada (English) * Canada (français) * Chile * Colombia * EE.UU. (español) * México * USA (English) * América Latina (español) EUROPE, MIDDLE EAST & AFRICA * België (Nederlands) * Belgique (français) * Česká republika * Danmark * Deutschland * España * France * Italia * Magyarország * Nederland * Norge * Polska * Portugal * Schweiz (Deutsch) * Slovensko (česky) * South Africa * Suisse (français) * Suomi * Sverige * Türkiye * United Arab Emirates * United Kingdom * Ελλάδα * ישראל * Казахстан * România * Россия * Україна (українська) * Украина (русский) * المملكة العربية السعودية * الدول العربية * Europe (English) ASIA & PACIFIC * Australia * India * इंडिया (हिंदी) * Indonesia (English) * Indonesia (Bahasa Indonesia) * Malaysia (English) * Malaysia (Bahasa Melayu) * New Zealand * Philippines (English) * Pilipinas (Filipino) * Singapore * Việt Nam * 日本語 * 대한민국 * 简体中文 * 繁體中文 * ประเทศไทย * Worldwide (English) Close Sections * All * business security * Avast News * Security News * Tips & Advice * Viewpoints * Privacy * Threat Research * Diversity & Inclusion * Diversity & Inclusion * Blog Authors * Visit Avast website * Change language * English * Deutsch * Čeština * Español * Français * Polski * Português * Русский * 日本語 Avast Blog Privacy Your data is under siege. How to protect your data and privacy. YOUR DATA IS UNDER SIEGE. HOW TO PROTECT YOUR DATA AND PRIVACY. Emma McGowan 13 Sep 2024 Data privacy has become a hot topic and with good reason. Now’s the time to turn over a new leaf when it comes to protecting your personal data. I consider myself pretty savvy when it comes to protecting my personal data. But last year I nearly fell for a phone scam from someone purporting to be an IRS agent. In my own defense, it was an impressively creative scam. It was also a reminder that there is no limit to the ingenuity thieves will employ in their quest to steal nuggets of personal information. Data privacy today is a hot issue—so hot that over 18 states rushed to enact comprehensive privacy laws, including Texas, Florida, and Oregon. Now is a good time to spotlight some of the common schemes bad actors will use to get their hands on your data, and to review steps you can take to avoid them. A MASTERCLASS IN SOCIAL ENGINEERING—ALMOST But back to that oh-so-clever IRS scam. The caller launched into his spiel by sharing with me his name and IRS badge number. Meanwhile, in the background I heard the sounds of a busy office—phones ringing, other agents answering calls and talking to customers. The production values were Netflix-worthy; it was largely these that kept me from hanging up. Surely no scammer would go to the trouble of recording a workplace soundtrack! The agent’s acting skills weren’t too shabby either, at least initially. The thrust of his strategy was to get me to give him my current address under the guise of needing to confirm my identity before we could continue the call. He already knew a lot about me, including my name and a previous address. When I balked, he shared some story about my identity having shown up in a drug bust in another state. Even that was vaguely plausible because I’d lost a wallet with my ID and credit cards a year prior. But something didn’t add up. Why would the IRS have this information, and why would they be sharing it with me? It was more likely that my lost wallet had provided a windfall of useful data to criminals, and now they needed a few missing items—such as my current address—to complete the theft of my identity. Finally, as I started to hang up, the actor blew it, saying I’d have law enforcement at my door the next day if I didn’t comply. Too bad. He’d been so close to getting my Oscar vote. THINK TWICE BEFORE YOU CLICK, SHARE, OR RESPOND Not all attempts to pilfer the crumbs of your personal information are as elaborate as my IRS call. Some phone phishing scams are as simple as a caller saying, “This is tech support, can you confirm the last four digits of your social security number?” And then there are smishing scams—phishing via SMS—where you get a friendly-seeming text from an unknown number such as, “Hi Brenda, are you still coming over?” If you respond, even in jest, you’ve just helped a scammer confirm your name and/or phone number. Social media is a fertile playground for cybercrooks looking to relieve you of your personal data. Who among us has not come across innocent-seeming quizzes and surveys in our feed like this one: “Your stripper name is your first pet’s name and the street you grew up on”? Sure, you may get a giggle from some of the responses (“Pancake Ascot,” anyone?), but the reality is bad actors use such social-sharing ploys to mine data on you and your friends—data that could help them guess passwords and/or answers to security questions. Avoid clicking on these schemes and do not share them. Other common social media schemes include requests for cash, friend requests from strangers, friend requests from existing friends (these invariably come from a hacked account), and clickbait that takes you to a fake login page in a ploy to capture your credentials, to name a few. HOW TO PROTECT YOUR DATA AND PRIVACY Here are a few basic steps. * Don’t overshare on social media. Limit what you post, especially when it comes to quizzes and games. And make sure the only “friends” you share your data with are your real-life friends. That photo of your new car could include your license plate number, which a criminal might find useful. And that scooter or e-bike route you shared could give away your street address. * Use strong passwords. You’ve heard it a thousand times, and with good reason. Instead of recycling old, easy-to-guess passwords, opt for passwords that are long, random, and unique. You can use a password manager to help you remember them. * Use multifactor authentication (MFA). It’s like double-locking your front door. In addition to a password, MFA requires you to enter a second identifier to authenticate yourself. This can be an app notification, a text message to your smartphone, or a biometric. If a criminal compromises your password (first lock), your second identifier (second lock) can help keep your data safe. * Audit your apps and logins. Delete apps you don’t use anymore or don’t recognize, especially if their data-sharing practices sound offensive. If you want to opt out permanently—for example, if you don’t trust a company—you’ll also want to delete your account. And think twice before using tech giants to automatically log in to your apps and websites. Doing so allows them to harvest even more of your data. * Keep software up to date. Operating systems, browsers, apps, streaming devices, routers—you name it. Updates often include patches to fix bugs and security problems. Running older versions of software exposes you to attack. * Protect your device from malware. As a final backstop against malware and other threats that may have infiltrated your device, install malware protection such as Avast. In 2024, treat your data and privacy as the precious resources they are. RELATED ARTICLES CAN TSA SEARCH YOUR PHONE? KNOW YOUR DIGITAL RIGHTS AT THE AIRPORT | AVAST TSA can make you take off your shoes, but can they search your phone? The answer might surprise you. 12 Jun 2024 10 min read GLITTER AND… FIREWALLS? HOW TO STAY SAFE THIS FESTIVAL SEASON Planning on hitting up a festival or two this summer? Here's everything you need to make sure you stay safe - in the digital realm, that is. 17 Apr 2024 10 min read DATA BROKERS: EVERYTHING YOU NEED TO KNOW Data brokerage is a $156 billion industry that feeds off buying and selling your data. Find out how data brokers get your data and how to stop them here. 3 Jan 2024 5 min read MOST POPULAR THE HIDDEN PITFALLS OF TRAVEL APPS 6 Jun 2024 VIDEO: ACCEPT ALL COOKIES? A RECIPE FOR ONLINE PRIVACY THIS HOLIDAY SEASON 11 Dec 2023 HOW TO USE DISCORD’S ‘FAMILY CENTER’ TO HELP PROTECT YOUR CHILD 24 Jul 2023 AVAST RESEARCHERS UNCOVER DISTURBING CROWDFUNDING SCHEME 28 Jun 2023 YOUR ESSENTIAL CYBERSECURITY CHECKLIST FOR SAFE SUMMER TRAVEL 14 Jun 2023 FOLLOW US 1988 - 2024 Copyright © Avast Software s.r.o. | Sitemap Privacy policy --> -->