Cyber Defense eMagazine May Edition for 2022
Cyber Defense eMagazine May Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine May Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
- No tags were found...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Application of measures<br />
Depending on the degree of risk, data protection methods include creating strong passwords or<br />
passphrases, hiding geolocation, filling the account with false in<strong>for</strong>mation and fictional stories, or deleting<br />
data completely. However, control is an illusion. Everything that got on the Internet stays there <strong>for</strong>ever.<br />
Even if you follow the main rule of safety and silence, the result is not guaranteed. The following rules<br />
will protect against basic in<strong>for</strong>mation gathering, but if someone is seriously interested in you, they find<br />
everything.<br />
Basic rules of operational security<br />
• Divide accounts. Come up with random e-mail account names <strong>for</strong> personal use. Create separate<br />
accounts <strong>for</strong> financial transactions, social media registrations, and general purposes.<br />
• Don't repeat passwords. Use the password manager to generate different passwords <strong>for</strong> each<br />
online service. For additional protection, set up two-factor authentication.<br />
• Delete metadata and hide geolocation. In 2012, programmer and businessman John McAfee was<br />
wanted on suspicion of murder. Hiding from Belize police, McAfee ran an escape blog with Vice<br />
Magazine, a journalist of Vice Magazine. McAfee's location in Guatemala revealed a photo in the<br />
post as it had been taken on an iPhone and contained EXIF metadata, including geolocation.<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>May</strong> <strong>2022</strong> <strong>Edition</strong> 162<br />
Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.