Security Behaviour Database
/

Personal Exposure

Personal exposure is the extent to how much someones personal information is available online.


Behaviours

SB009: Ensures online accounts that are no longer needed are de-activated

SB009: Ensures online accounts that are no longer needed are de-activated

Dormant accounts may still hold or provide access to sensitive data. Security teams should be notified when ...

SB011: Uses a search engine to see what personal information is accessible online

SB011: Uses a search engine to see what personal information is accessible online

Personal information can be used during social engineering attacks. Search engines can show what personal data can ...

SB015: Completes assigned security awareness training successfully

SB015: Completes assigned security awareness training successfully

Security Awareness training is an important part of organisational security. Completing awareness training ensures ...

SB036: Secures devices with automatic screen locks

SB036: Secures devices with automatic screen locks

Devices can be protected with screenlocks (like pins, patterns and passwords). This can help prevent unauthorised ...

SB036a: Secures mobile devices with automatic screen locks

SB036a: Secures mobile devices with automatic screen locks

Mobile devices (e.g. phones and tablets) can be protected with screenlocks (like pins, patterns and passwords). ...

SB036b: Secures laptop and desktop devices with automatic screen locks

SB036b: Secures laptop and desktop devices with automatic screen locks

Laptops and desktops can be protected with screenlocks (like pins, patterns and passwords). This can help prevent ...

SB037: Locks devices when they're not in use

SB037: Locks devices when they're not in use

Locking devices when not in use prevents unauthorised access. This is especially important in common areas, such ...

SB037a: Locks mobile devices when they're not in use

SB037a: Locks mobile devices when they're not in use

Locking mobile devices when not in use prevents unauthorised access. This is especially important in common areas, ...

SB037b: Locks laptop or desktop device when not in use

SB037b: Locks laptop or desktop device when not in use

Locking laptops and desktops when not in use prevents unauthorised access. This is especially important in common ...

SB050: Does not allow sensitive work-related matters to be overheard in shared spaces

SB050: Does not allow sensitive work-related matters to be overheard in shared spaces

Sensitive topics should not be discussed in shared spaces. This includes public spaces and workspaces frequented ...

SB061: Regularly backs up data

SB061: Regularly backs up data

Data is valuable and should be backed up regularly. Lost or corrupted data can be restored from backups. Data ...

SB067: Securely disposes documents containing sensitive data once no longer needed

SB067: Securely disposes documents containing sensitive data once no longer needed

Documents containing sensitive data should be disposed of securely after use. Such as by shredding or using ...

SB070: Reviews privacy settings and permission levels for apps and online services

SB070: Reviews privacy settings and permission levels for apps and online services

Some apps and online services will request information from devices for use. Reviewing privacy settings and ...

SB071: Regularly reviews privacy settings on social media accounts

SB071: Regularly reviews privacy settings on social media accounts

Privacy settings on social media accounts should be reviewed regularly to make sure personal data is not exposed ...

SB075: Requests photos are removed if posted online without consent

SB075: Requests photos are removed if posted online without consent

Photos posted online without consent can increase digital exposure. Taking steps to remove sensitive photos posted ...

SB082: Uses known contact details to verify suspicious messages

SB082: Uses known contact details to verify suspicious messages

Contact details can be spoofed. Receiving a message that breaks any norms should be met with suspicion. Using ...

SB083: Checks before “blindly” forwarding messages to workplace contacts

SB083: Checks before “blindly” forwarding messages to workplace contacts

Messages from workplace contacts are more likely to be trusted than messages from other sources. Forwarding ...

SB195: Completes policy attestation

SB195: Completes policy attestation

Most organizations today have multiple compliance requirements and contractual obligations that require all ...

Case study

Uber, 2016

In 2016, criminals gained access to 2.7 million UK Uber accounts thanks to what was described by the UKs Information Commissioner's Office (ICO) as “a series of avoidable data security flaws”.

Criminals first gained access to Amazon Web Services, a cloud-based storage system operated by Uber’s US parent company. They then leaked all the contact details they found, including phone numbers and email addresses.

The breach led to huge losses for Uber. Admitting it did not have up-to-date security in place, Uber's Chief Security Officer resigned from the company. Uber was fined £385,000 as it failed to immediately disclose the attack. A ICO report also found that Uber paid the attackers £78,294 to destroy the compromised data.

EasyJet, 2020

In May 2020 Britain’s biggest budget airline, EasyJet, reported it had suffered a cyber attack that compromised the data of 9 million customers.

After harvesting the confidential data, criminals leaked the victims' travel information and email addresses. The leak allowed others to access victims’ bank and other online accounts.

An initial investigation found that at least 2,208 victims had already had their bank accounts compromised. The UKs Information Commissioner's Office warned EasyJet customers to look out for phishing scams or signs of secondary account compromise in the near future.

EasyJet claimed criminals seemed to be after the company’s intellectual property, rather than information that could be used in identity theft. Still, the company stands to lose a huge sum of money as a result: the ICO can impose a fine of 4% of EasyJet’s turnover in 2019, amounting to almost £255m, and aggrieved customers are likely to defect to rival organisations.

Privacy Affaris Report

In 2020, a report from Privacy Affairs revealed in shocking detail what can happen to stolen personal data.

The report found cyber criminals on the Dark Web will pay £800 on average for a full range of stolen documents that enable them to steal identities. In particular, hacked Facebook accounts were priced at about £60.

Other information for sale included credit card data (CVVs, PINs, login information), hacked payment processing services, forged documents (driving license, national ID cards, passports), and hacked social media accounts

The report concludes by advising people to secure their information. It recommends people install antivirus systems on all internet-connected devices, avoid divulging sensitive information over the phone or via SMS, check ATMs for potential skimming devices, and use different passwords across different accounts. All reduce the risk of personal details appearing on the Dark Web.

SebDB is brought to you byCybSafe| © 2023 CybSafe Ltd