Are You Leaking Data?

What You Are Giving Away And Why

leaking data shows man getting sprayed by broken faucet
Picture of Shawn Stewart

Shawn Stewart

Mr. Stewart has 30 years of experience with hundreds of international, commercial, military, and government IT projects. He holds certifications with ISC2, Cisco, Microsoft, CompTIA, ITIL, Novell, and others. He has a Masters in Cybersecurity, a Bachelors in IT, a Minor in Professional Writing, and is a published author.

Leaking dataYou are leaking data!

Immediately, you scoff. “I’m on a Mac!”
 
“I have the most advanced endpoint protection software on the market!”
 
“My global team of security professionals keeps me safe 24/7!”
 
And you’re still leaking data! How can this be? Simple.
 

Leaking By Design

The basics of internet communications use Internet Protocol, or IP Addresses, to communicate. The global entity called the Internet Assigned Numbers Authority (IANA) manages IP addresses. IP address ranges are location-based. For instance, the US has a different IP address range than Mexico and Canada. IP address ranges for the US are broken down by Internet Service Provider, or ISP. The ISP is required BY LAW to attach a physical address or at least a town to the IP addresses in use. Which means, simply by reading this blog, you’ve just told me where you live.
 

leaking data leads to location information - picture shows magnifying glass over a house in a neighborhood, satellite viewLeaking But Not Exact

OK, it’s not accurate, but it can give me your city and state. Try it yourself on our webpage – www.goscnow.com/areyousecure/ – The IP address shown is your actual Internet router. As a hacker, I could target that IP address to see if your home Internet router is secure. When is the last time you updated the firmware on your home or business Internet router? Did you know that nearly all Internet routers have a defect or software bug that could allow unauthenticated access to your network?
 

Not Just Your Address

Your Internet browser is also vulnerable. I can see, for instance, that you’re still running Internet Explorer, which you definitely shouldn’t be. I might gain remote access to your computer just by directing you to malicious code your browser will run. Even with up-to-date security software and monitoring, it looks like you initiated the connection and the system will NOT block it.
 

hacker using leaking data to access a fiewallHide The Leaking

“I use a VPN!” That’s fine, but that just means someone else can look at your data. VPNs, proxies, and Security Service Edge (SSE) software like Zscaler will only protect you from hackers tracking you back to your public IP address. The real problem? You are still vulnerable to drive-by-download attacks on the Internet or through email.
 

Privacy Is Key

Then there are privacy concerns. Have you ever tried to Google your name and city of residence? Try it, but don’t panic at what you see. All that data is why Mark Zuckerburg says privacy is dead. What you see is the culmination of years of companies selling your data to data brokers. Therefore, you get tons of spam and junk mail in real life. Learn how to clean this up in this article.
 

company selling leaking data to a hacker for a bag of moneyBe Certain!

Finally, check haveibeenpwned.com. This handy website lets you search your email address or corporate domain to see if they showed up in any recent data breaches. While you can’t do too much about it, it’s a great indicator you need to change your passwords. Even if you don’t show up on the list, and nearly everyone does, you should still have a different password for every website and change passwords regularly. Learn about password managers here.

Need Help?

Reach out to us! We’re all in this together. Visit our contact page to submit an inquiry. Also, please follow us on social media for the latest updates.

Check Out Our Podcast!

The Hillbilly Hacker Podcast is the hottest new show on the Internet to learn about today’s latest technology in simple words. You can find the Hillbilly Hacker on Spotify, Apple, Amazon, or where ever you find your podcasts. (Link)

Share this post

Leave a Reply

Your email address will not be published. Required fields are marked *