How Information Is Found
- Individuals can reduce the risk of identity theft and unwanted tracking by limiting the sharing of personal information on public websites
- Information found in photos, names, dates, etc. can be used to impersonate others
Preventing attacks
- Using secure internet connections when sending sensitive information is being transferred
- Using VPNs while on public and unsecure networks
- Being cautious about emails and messages form unknown senders to prevent phishing attacks
- Phishing attacks are when a malicious actor tries to trick the recipient to click on a link that downloads malicious software onto the device to find sensitive information