DOXING THREATENS EVERYONE

 

The security and protection of online data is now a major concern. Research shows that:

 

  • 50% of consumers claim that they would no longer use an online service provider following a data breach
  • 57% express concern over their security and privacy being made vulnerable by ‘smart’ and internet-connected devices.

Doxing, like hacking, ransomware attacks, and any other form of cybercrime, increasingly poses a threat to the safety and security of all online data. Not just for individuals,  but for start-ups, enterprise, and corporates. Put simply, any business can fall prey to doxing.

 

WHAT IS DOXING?

 

According to Wikipedia:

 

Doxing is the act of publicly revealing previously private personal information about an individual or organization, usually through the Internet.

 

What makes doxing possible? There are so many public online platforms such as social media channels, forums, application records and many more, that it’s relatively easy for a hacker with some know-how to steal personal information. Besides searching publicly available databases and social media sites, doxing can also be achieved through hacking and social engineering.

 

BUSINESS EMAIL COMPROMISE

 

One of the most prevalent forms of doxing that threatens companies are Business Email Compromise (BEC) attacks. These attacks are targeted whereby cybercriminals initiate e-mail chains between employees, posing as a member of the company. The intention? To steal confidential information or money from clients and customers.

 

IDENTITY THEFT

 

A popular form of corporate doxing attack is identity theft. Hackers use their information to profile specific employees and steal their identities. New technologies such as deepfake facilitate the execution of such initiatives in the presence of information available on public databases and social media channels such as LinkedIn and Facebook. For example, a realistic deepfake video in the image believed to be an employee of the organization can severely damage the company’s reputation. To accomplish this an attacker needs a clear photo of the targeted employee and some personal information that they can find on social media. That’s all it takes!

HOW CAN YOU OVERCOME DOXING?

 

It may seem difficult to eradicate doxing, particularly since we all live in a world of digital technology often underpinned by sharing data and expressing ourselves online. Nevertheless, for technology to work for us and improve our mental wellbeing, we need to learn how to treat online personal data responsibly. Here are some ideas to help protect your business, your employees and yourself from doxing:

 

  • Monitor your browsing and application tracking
  • Install and manage appropriate privacy tools
  • Use password managers such as LastPass
  • Use privacy-enabling browser extensions
  • Establish strict rules to never discuss business matters outside of official corporate messaging practices
  • Educate and train your employees on all cybersecurity threats

 

Zhero will help and does help. We are cybersecurity experts with risk mitigation and data protection at the core of our being.