Archives - Personal Information


Don’t leave yourself open to swatting attacks

A nightmare scenario for any streamer or gamer is a swatting attack. This is when someone finds out who you are, where you live and calls in a fake threat to a local police station. The police take every threat seriously, and more than one person has died as a result of a swatting attack. […]

Avoid accidentally revealing personal information online

Be careful when streaming, gaming, chatting online, taking photos, or doing anything else that might compromise your privacy. It’s extremely easy to accidentally reveal your identity and location online. Whether you’re a streamer who does business from their home, a gamer with a microphone or showing yourself online in any form, take steps to conceal […]

Watch out for shoulder surfing

When you are in public areas cybercriminals can simply glance over your shoulder as you type. By just watching you, they can steal sensitive or personal information. Screen protectors which prevent shoulder-surfers from seeing your device screen can be purchased for a small expense. For smaller devices, such as phones, be aware of your surroundings […]

Be cautious using public Wi-Fi

Be cautious about what you do on public Wi-Fi and use a VPN if possible. Another option is to look for semi-public networks with passwords that are provided by staff or on printed receipts, like at restaurants or coffee shops. Up-to-date security software is also a must-have to safeguard you from any malware you might […]

Use more than one email account

Your email account is one of the most important sources of personal information there are. If someone were to break into it, your confidential data could be decisively compromised. You should have a minimum of two email accounts, with one being a secure backup in case one email account is compromised and you need to […]

Don’t overshare on the Internet

There is such a thing as too much information. Oversharing is more than simply irritating. When a criminal decides to target someone for an identity theft scheme, they may initiate their attack by simply researching the person’s social media accounts. If the intended victim doesn’t have privacy settings set up, or if they do but […]