Archives - Personal Information


Be careful of requests to confirm or update your personal information

Most organizations – banks, colleges, companies, etc. – don’t ask for your personal information over email. Don’t divulge personally identifiable information (PII) online such as your full name, telephone number, address, credit card information, social security number, or doctor’s name. Avoid opening attachments, clicking on links, or responding to email messages from unknown senders or […]

Only install mobile apps from reputable sources

Jailbreaking, installing apps from unknown sources, and other workarounds that allow free access to paid apps and games can be tempting, but can create large security gaps that allow malware to infect your phone, leaving your personal information at risk.

Keep personal info personal

Be cautious about how much personal information you provide on social networking sites. The more information you post, the easier it may be for a hacker or someone else to use that information to steal your identity, access your data or commit other crimes such as stalking.

Check the privacy policy

Before submitting your name, email address, or other personal information on a website, look for the site’s privacy policy. This policy should state how the information will be used and whether or not the information will be distributed to other organizations. Companies sometimes share information with partner vendors who offer related products or may offer […]

Limit the amount of personal information you post online

Do not post information that could make you vulnerable, such as your address, phone number, email, or information about your schedule or routine. Supplying your email address may increase the amount of spam you receive. Providing details about your hobbies, your job, your family and friends, or your past may give attackers enough information to […]

What is e-skimming?

Skimming online customer payment info from website checkout forms. Cyber criminals introduce skimming code on e-commerce payment card processing web pages to capture credit card and personally identifiable information (PII) and send the stolen data to a domain under their control. The malicious code captures credit card data as the end user enters it in […]