Loading ...
Post Single Template - Cybersecurity Education Initiative (CYSED)
Check out

Privacy Week Special: Leave No Crumbs

A click here, a like there, this post created with the “Everyone” section ignored before clicking
the Share button, and that pet you can’t stop bragging about all contribute to your digital
behavior. These trivial activities performed on the Internet reveal preferences and personal
information you do not even realize you’re sharing.
When you surf the Internet, you leave digital crumbs all over the place, just as crumbs are left on
your table after eating a good sandwich at your favorite diner or when you are trying to make
that African burger with your bread and akara. These crumbs are small chunks of your data that
can be taken and utilized maliciously.
What better time to learn about how we overshare our data and expose ourselves to attacks than
Data Privacy Week?

How You Leave Crumbs On The Table

Of course, the cute pictures you take and post of your new apartment or a vacation trip are
wonderful sights to behold, and so is the location information you unintentionally or
intentionally provide. Cybercriminals are constantly roaming through the digital streets, looking
for a good bite of your data to devour.
Unknown to you, you do not need to leave a large quantity of personal information, such as
writing, “This is my BVN xxxxxxxxxxx,” before an attacker becomes interested. They only need
the smallest crumbs you leave on your table.
The first important part of this blog post is the big question, “How do I leave digital crumbs?”
You leave digital crumbs all over the internet through:

  1. Every post, like, comment, and share on social media platforms contributes to your digital
    crumbs, including the content you create, the pages you follow, and the interactions you have.
  2. Each website you visit is recorded in your browsing history. This data can be used to infer
    your interests, shopping habits, and the types of information you seek online.
  3. Geotagging on photos, check-ins, or location-sharing features leaves behind a trail of your
    whereabouts and physical location. This information can be used to build a profile of your daily
  4. The apps on your device and the permissions you grant them often collect data on your usage
    patterns, preferences, and behaviors. This information is used not only for improving the user
    experience but also for targeted ads.
  5. Filling out malicious forms or registering on a malicious website for giveaways or freebies can
    contribute to our digital crumbs, revealing our personal identifiable information (PII)

Your Crumbs Are Somebody Else’s Lunch

The question of how you leave data strewn across the Internet has been answered. This brings us
to the second and more important question: What could my crumbs possibly be used for?
There are several ways the overlooked crumbs you leave on your table can be put to good use.
The comments, posts, likes, and survey answers can be against you if they get into the wrong
hands. Several ways in which your crumbs can be used include:

  1. Cybercriminals can piece together personal identifiable information (PII) from digital crumbs
    to commit identity theft and gain unauthorized access to financial accounts, healthcare records,
    or other sensitive data.
  2. Geotagging and location-sharing data may be exploited for stalking, burglary, kidnapping, or
    other physical malicious activities.
  3. Sharing details about online purchases or financial transactions through social media can make
    individuals targets for financial exploitation.
  4. Attackers can use compiled information from digital footprints to create sophisticated, targeted
    cyberattacks, such as spearphishing efforts or malicious actions designed to exploit particular
    weaknesses discovered through one’s digital behaviors.

Leaving Behind a Clean Table

The third and most important question is, “Can I avoid leaving crumbs?” It is not 100% possible,
but it is extremely important to avoid leaving crumbs on your trail on the Internet. You can
achieve this by following these tips to protect your data, be it a burger size or a sandwich crust

  1. Limit oversharing on social media platforms. Be mindful of your posts, likes, comments, and
    shares. Never post personal information.
  2. Review and adjust privacy settings on social media platforms and applications.
  3. Minimize the way you accept cookies. Even cookies crumble and leave crumbs.
  4. Regularly clear cookies to minimize tracking across websites.
  5. Avoid using public Wi-Fi for sensitive activities to reduce exposure to potential threats.
  6. Think twice before filling out online quizzes and forms from unknown sources, as they may
    harvest personal information.
  7. Regularly update and strengthen passwords to enhance overall online security.
    You are the master of your data. Only you have power over your data. Whatever data a
    cybercriminal gets from you, it is crumbs that you have left on the table.
    Keep it locked, keep it private, TAKE CHARGE OF YOUR DATA, and LEAVE NO CRUMBS.