Protect Your Privacy Online. Learn How to Prevent Doxing
At its best, social networking allows families and friends to stay in touch or reconnect with people with whom they’ve lost contact. In addition, some online platforms permit a level of anonymity, where opinions can be shared without revealing identities. Now, however, malicious cyber attackers use “doxing” to unmask such users and expose them to nefarious acts such as public humiliation, vengeance and vigilantism.
What is Doxing?
Doxing is using the internet and its resources to find and reveal private information about previously anonymous users for the intent of online public humiliation, extortion and vigilante vendettas to hinder users’ lives.
By accessing online databases, social networking comments, public records and other online activity, cyber harassers discover the real name, address, telephone numbers, emails and work addresses of people who wish to remain anonymous. Here are a few types of doxing:
- Exposing of Wrongdoing – Exposing of private documents or photographs to prove that the target is guilty of an illicit act. This is a form of cyber vigilantism.
- Identification Doxing – Posting of pictures of people attending controversial events or behaving inappropriately in private photos; these are usually people whose privacy or reputation can be compromised by such doxing.
- Revenge Doxing – Using doxing to exact revenge on someone, particularly internet “trolls” who have harassed others, by exposing their identifying information such as their real name, address, phone numbers, email addresses, other screen names, etc.
- Harmful Random Doxing – Randomly doxing someone as a destructive prank. It might be difficult to imagine, but these attackers are just doxing for the “fun of it” or just because they can.
How to Prevent Doxing
- Use Strong Passwords – Passwords are the guardians of the front gates of cyber security. Strong passwords, in tandem with multi-factor authentications, are the first step toward preventing doxing. The extra effort is well worth the time for the protection it provides.
- Change the Privacy Settings on Your Social Media Accounts
- Do not list your address or where you work. Also, avoid listing any general location information that could help someone piece together where you live or work.
- Protect your usernames and profiles, so they are not “public.”
- Set the audience of your posts to “friends only."
- Avoid online posts and chats that could be spun to be used against you or present bad optics about your reputation.
- Use a Virtual Private Network (VPN) – Using a VPN whenever you use a WiFi connection will provide a higher level of cyber security, significantly reducing your chances of becoming a victim of doxing. Good VPNs use military-grade encryption to conceal your data and hide the true location of your IP address.
- Do Not Use the Same Password(s) Across All Online Platforms – Varying your passwords across your online platforms will help mitigate the impact of doxing.
- Do Not List Domain Registration Contact Information – Domain databases, such as WHOIS, that serve as directories for all registered domains should not display your contact information.
- Install and Maintain Up-to-Date Cyber Security – Cyber security is not guesswork. A robust, layered approach to protecting your data and online work is an essential part of securing your business in today’s expanded remote-access work environment.
Swatting
Swatting is a byproduct of doxing, whereby the attackers hijack addresses obtained through doxing to call in fake emergencies to police departments or medical services. The hackers make it seem as if the call is coming from the unwitting target’s address, sending responders to that address thinking they’re responding to a real emergency when, in fact, it’s a hoax. Swatting is a criminal act and a federal offense. The FBI https://www.fbi.gov/ news/ stories/ the-crime-of-swatting-fake-9-1-1- calls-have-real-consequences1 warns against the dangerous consequences of swatting and investigates and charges more swatting cases every year.
The recent dramatic increase in remote-access work has exposed many new network vulnerabilities and has produced new forms of cyberattacks. As the hackers get better, we must stay one step ahead. And as your business grows, expands its network and adds more devices such as smart controls, wireless access and remote access, your network vulnerability and need for regular Network Cyber Security will grow, too. From the little details of preventing doxing to the vast undertaking of protecting your network and hard-earned data from severe cyberattacks, your business cannot afford to ignore these ever-evolving threats. Since the pandemic, the importance of remote workforce access, technology and security management and ensuring proper protections are in place has never been greater.
Whether you work at a home office or remotely, there are affordable solutions to help manage all your IT needs. GEEK-AID® Computer and Network Support specializes in customized Managed IT Services for small to midsized businesses. In addition, GEEK-AID® knows how to protect your privacy online. GEEK-AID®’s team of experts is comprised of specialists in different areas of IT services, serving clients on-site and remotely. The GEEK-AID® team doesn’t clock out at five o’clock on Friday. They are available 24/7 to ensure your computers, network and data stay healthy and secure. Hardware and software installation and maintenance, repair, security and network protection must be consistent, proactive and not wait for a system failure or data breach.
Call (877) GEEK-AID (877-433-5243) to evaluate and discuss your IT needs. Remember, we are here for you 24/7.