Archives - Personal Information


Types of Malware: What are Botnets?

Networks of computers infected by malware and controlled remotely by cybercriminals, usually for financial gain or to launch attacks on websites or networks. Many botnets are designed to harvest data, such as passwords, Social Security numbers, credit card numbers, and other personal information.

Delete your Google search history

Chances are you’ve run a good number of searches through Google over the years. Google has a record of all of these queries. By visiting the My Activity page for your Google account, you can select the menu indicated by the three dots icon and choose to delete some or all of this activity to […]

Beware of requests to update or confirm your personal information

Most organizations – banks, universities, companies, etc. – don’t ask for your personal information over email. Do not reveal personally identifiable information online such as your full name, telephone number, address, social security number, insurance policy number, credit card information, or doctor’s name. Avoid opening attachments, clicking on links, or responding to email messages from […]

Recognize social engineering schemes in chats and direct messages

Chats and direct messages are essential features of platforms like social networks and online gaming service. Their popularity makes them common conduits for social engineering scams, though. Never click suspicious links or give out sensitive information in these exchanges, especially not to people you’ve just met.

Do not send personally identifiable information via standard email

There’s no undoing an email (with limited exceptions if you’re in an Microsoft Exchange environment). Plus, email security is not as strong as you might expect, especially if you aren’t using email encryption. For these reasons, never give out your sensitive data in an email.

What are web site certificates?

If a company wants to have a secure web site that uses encryption, it needs to obtain a site, or host, certificate. There are two elements that indicate that a site uses: 1. a closed padlock, which, depending on your browser, may be located in the status bar at the bottom of your browser window […]