Job seekers gettin’ Hacked!
While researching different companies one thing started to loom in the back of my head. How much personal identifiable information is there really out there? How long until you’re researching how to recover from identity theft?
How long until I get Hacked! Elaborate schemes of shell companies postings job positions on career job boards and ask people to literally fill a database with sensitive information!
So what can we do to protect ourselves?
I did a little research on data breaches focused on human resource data to see if anything like this has happened. Malicious users off the dark web have started focusing the same computer resources they were using to shut down huge websites to test hacked passwords and credentials on different websites. The programs logic is, if your yahoo email got hacked, chances are the passwords found will be a similar email address and password used for all your personal / work email, professional / personal social networking sites, mobile phone cloud storage, etc.
Use a solid password and Two-Factor Authentication. First, Do Not Use the Same Password For All Accounts! Unless you want someone poking around in your accounts, locking you out, and then even purchasing a bunch of $150 VISA cash cards with your credit cards. Make sure to be smart about where you use your email and what passwords you use. Two-Factor Authentication is great when available. You enter your credentials, then you get a Text Msg sent to you with a code. After you enter that code you login.
Look into the company you’re applying to make sure that you agree with their mission and privacy policies on their website. Do they have a descriptive and concise mission statement? Leaders that use strategy to complete objectives can then measure and analyze project opportunities.
Watch out for bogus work ads. If the job looks too good to be true it just might be. Be smart. Look where URL’s navigate too before you click on them.
In the end, attackers don’t want to try and hack your Email’s server with it’s huge team of security experts. It’s much easier to fool someone into clicking on a link that masquerades as something else. In cyber security terms it’s called Phishing. Make rationale decisions and remember that not everyone that uses technology is out for a win-win situation. Some get a bit more competitive.