Out of the Box Solutions Blog

Where Does All That Lost Data Go?

Where Does All That Lost Data Go?

The facts are that data is lost, data is stolen, and you have no idea where it has gone. You may come to find out where subsequently, but many times, personal information isn’t much like a cat: once it goes away, you’ll likely never see it again. Today, we will look at the seedy underbelly of the Internet in search of our lost and stolen personally identifiable information.

Before we start our journey, we should come to know where our data is being lost and stolen. Most people that have active online lives have had their personal information compromised at least once. This is a fact. Think about how many major data breaches there have been over the past half-decade, and it seems if you so much as looked at the Internet, you probably have lost some of your personal information along the way.

What is Personally Identifiable Information?
Personally identifiable information (PII) is information that, you guessed it, identifies you as an individual. Examples include your social security number, your address, personal financial data, and credentials to get into your accounts. This information can be used in various nefarious ways. What’s worse, it can also be made available for sale in places that most people dare not go.

The Dark Web
You’ve probably heard of the Dark Web as the place on the Internet where, with access, you can buy an array of subversive and illicit materials including drugs, or more disturbingly, people; and, where you can have your enemies whacked. These things may be true, but not everything on the Dark Web is illegal. The Dark Web is actually a part of a bigger construct known as the deep web and it is hidden from view--that is, it’s not accessible by search engines--and needs specific browsing software to access.

With billions of users from all around the world on the Internet every day, and with many of them having been breached in some fashion in various hacks, there are a lot of people’s information available on the Dark web. How much is this information worth? Typically a hacker selling an individual piece of PII can get about $1 per piece. With many hacks resulting in hundreds of thousands of files being stolen, that’s a king’s ransom right there.

What You Can Do
Unfortunately, once your data is up on the Dark Web, there is little you can do to get it down. The main benefit is the awareness that yes, you were compromised, and now you have the opportunity to identify when it happened and how to shore up your defenses.

Need Additional Security Support?
While we can’t promise that we’ll protect all of your data, we can certainly give you a better chance of keeping more of it off the Dark Web. For a review of your current security and what we can do to optimize it, give Out of the Box Solutions a call at 800-750-4OBS (4627).

Intro to Your Tech: The Blue Screen of Death
Comparing Physical and Virtual Servers
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, April 21 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Productivity User Tips Privacy Tech Term Internet Smartphones Efficiency Microsoft Communication Data Google Hardware Innovation Email Cybersecurity Users Malware Mobile Device Browser Android Passwords Windows 10 IT Support Mobile Devices Cloud Business Business Management Collaboration Ransomware Network Small Business IT Services Communications Holiday Hackers Outsourced IT Backup Saving Money Workplace Tips Managed IT Services Bandwidth Managed IT services Data Backup Software Wi-Fi Data recovery Internet of Things Applications Wireless Apps Social Media Cloud Computing Business Intelligence Employer-Employee Relationship Blockchain Hosted Solutions VoIp Marketing Information Networking Automation Managed IT Service Connectivity Medical IT Remote Computing Chrome Paperless Office Smartphone Patch Management Facebook Artificial Intelligence Computer Password Cost Management Analytics Office Healthcare Virtual Assistant Managed Service Mobility Wireless Charging Office 365 Cortana Data Security Net Neutrality Compliance Virtualization VPN G Suite BDR Gmail Data Management Remote Monitoring and Management Computers Gadgets Save Money Tech Terms Access Control Microsoft Office Dark Web Payment Hard Drive Value Hybrid Cloud Tablet Amazon Eliminating Downtime Physical Security Operating System Company Culture Business Technology Electronic Health Records Staff Dongle Paper Conferencing Wearables Lead Generation Network Attached Storage Movies Authentication Maintenance Analysis Certification Battery Error instant Messaging Processors Cables Excel BYOD eCommerce Laptop Technology Tips Managing Stress Troubleshooting Health Ink SaaS Twitter Telecommuting Authorization Chrome OS Digital Data loss Router Vulnerabilities Vulnerability Machine Learning Database Voice over Internet Protocol Knowledge Plug-In Wireless Internet Online Shopping Streaming Media Tip of the week Environment Phishing Update Government PowerPoint Content Filtering GDPR Inventory Unified Communications Spam Employees Websites Internet Explorer Comparison Training IT Management User Tip Touchscreen Cryptocurrency Spyware Cybercrime Telephony Proactive IT Help Desk Backup and Disaster Recovery Downloads WannaCry Server Management e-waste Data Breach Outlook Big Data Sports Personal Information Data Protection RAM Workers Human Resources Edge Virus Safety Threat Specifications Security Cameras Server Microsoft Office 365 HP Tactics Voice over IP Business Continuity Settings Hard Drives Trends E-Commerce HIPAA disposal Bring Your Own Device Sales Profitability Storage Mobile Security Microsoft Teams Millennials Miscellaneous Employee-Employer Relationship Antivirus Printing Reporting Word Time Management Document Management Telecommute Upgrade IT budget SSD A.I. Printers Quick Tips Disaster Recovery Solid State Drive Regulation Windows 7 Hard Disk Drive Alert