Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

How to protect your private photos, videos, and information from online leaks

How to protect your private photos, videos, and information from online leaks

How to protect your private photos, videos, and information from online leaks

Knowing how to keep your data secure online is one of the most important things to know in this digital age. A lot of us become complacent because of the convenience technology offers, that we forget to take extra measures to secure our data against online leaks.

Unless you have absolutely nothing to hide (hence, a very cautious or boring life), you should know how to protect yourself from people who want to do something dastardly to you.

Read about how to disappear from the internet here.

How do leakers get into your data?

There are different ways for hackers to get into your accounts. Here are some ways:

  1. They steal your devices and try to crack them while in their possession. This is doubly dangerous if they got access not only to your phone, but also your computer and other devices.
  2. They hack into your online accounts to hijack your account and gain access.
  3. They extract files from a backup of your account where it’s been stored.
  4. They impersonate you using your own credentials against you, most probably gleaned through nefarious means. They could have employed apps, devices, or good old snooping on how you type your passwords or answer your security questions.

Also read: 6 Simple Tips on Cyber Safety at Home

Photo from Shutterstock.

So how do you protect yourself from people with nefarious goals when it comes to your personal data?

The truth is, if someone truly wanted to get into the information, photos, videos, and other data you have, they just need a lot of time and money. But that doesn’t mean that it’s going to be easy. The harder you make it for them to access your photos, the less attractive (and profitable) the prospect will be.

Here are some ways to keep your personal photos, videos, and information as secure as they can be:

  1. Use two-factor authentication. Take the few minutes to set up a mobile phone, alternate email address or login device and token to lock your account. Adding another layer to your login process makes things undoubtedly more difficult (but not impossible) for hackers.
  2. Do not send sensitive material over normal chat apps and messaging services. These won’t get encrypted and can easily be seen by people handling the network or system.
  3. Change your passwords regularly. A change of password every few months can protect you from large data leaks where hackers target the company holding your information instead of you.
  4. Do not automatically sync your photos with the cloud. You can change these in settings for Apple iCloud or Google Drive.
  5. If you need to send sensitive information, photos, or videos, do so using special apps that encrypt messages or are locked between you and one recipient only. Some of these types of apps are Signal, Telegram, and Threema.

But what do you do when your private information has been leaked?

Still, if someone really wanted to get to your photos, what can you do? You can ask the person who has posted the photos to take them down. If they won’t, you can go to the web hosting services and notify them of the photo leak.

There is simply no other way to stop an information or media leak unless you go to every single place that the media has been posted and ask the people who posted it to take it down. You can hire a lawyer who can facilitate this sort of process.

Learn more about Christabel Chua and her life story so far here.

Also read: Free 8 Steps Checklist for Companies to Prevent Data Breach

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us