10 Essential Steps to Protect Against Cyber Crime

7–10 minutes

read

Organizations and individuals that have already experienced cyber crime face elevated risk of being targeted again. Use this checklist to reduce the information criminals use to impersonate you, open accounts in your name, bypass account recovery, or build believable scams.

Repeat victimization is common. In a National Institute of Justice-supported analysis of scammers’ own records, 62% of victims experienced more than one fraud incident. Data breaches, social media, public websites, and data brokers create a profile criminals use to make scams believable. A scammer does not need every detail from one source. They combine exposed emails, phone numbers, addresses, employer details, family relationships, job history, public posts, and breached passwords to sound legitimate.

Infographic outlining a personal exposure reduction checklist to prevent fraud, featuring ten steps including freezing credit, checking for breaches, removing personal data, and enhancing account security.

1. Freeze and monitor your credit

A credit freeze helps prevent criminals from opening new credit accounts in your name.

Take these steps:

  • Freeze your credit with all three major credit bureaus:
  • Use a credit monitoring service to manage your credit freeze and monitor your credit file.
  • Turn on alerts for:
    • New credit inquiries
    • New accounts
    • Address changes
    • Suspicious activity
  • Review your credit report regularly.

Why this matters:
If your name, address, phone number, or Social Security number has been exposed, a credit freeze reduces the risk of someone opening new accounts using your identity.


2. Check whether your information has appeared in breaches

Known breaches give criminals verified information about you.

Take these steps:

  • Use Have I Been Pwned to check:
    • Personal email addresses
    • Business email addresses
    • Old or forgotten email addresses
  • Sign up for breach alerts.
  • Change reused passwords connected to exposed accounts.
  • Treat any exposed email address as compromised for targeting purposes.
  • Prioritize:
    • Email accounts
    • Bank accounts
    • Social media
    • Cloud storage
    • Business tools
    • Shopping accounts with saved payment methods

Why this matters:
A breached email address may be paired with old passwords, phone numbers, names, addresses, employers, or other details. Criminals use that information to build more credible scams.


3. Remove personal information from data brokers

Data brokers and people-search sites often publish home addresses, relatives, phone numbers, age, aliases, and prior locations.

Take these steps:

  • Use DeleteMe for personal and organizational data removal.
  • Prioritize removal of:
    • Home addresses
    • Personal phone numbers
    • Personal email addresses
    • Relatives
    • Prior locations
    • Age and date-of-birth clues
  • Recheck exposure regularly because brokered data often reappears.

For organizations, prioritize:

  • Owners
  • Executives
  • Finance staff
  • Information technology staff
  • Legal staff
  • Human resources staff
  • Executive assistants
  • Anyone with access, approval authority, or public visibility

Why this matters:
Brokered personal data helps criminals impersonate family members, defeat weak identity checks, target executives, and make social engineering attempts sound personal.


4. Limit or delete social media

Social media gives criminals timing, emotion, relationships, habits, and context.

Take these steps:

  • Delete accounts that are not necessary.
  • Limit LinkedIn exposure where possible.
  • Remove or restrict:
    • Personal phone numbers
    • Family details
    • Travel plans
    • Children’s activities
    • Job-change details
    • Workplace frustrations
    • Personal milestones
    • Health or family stressors
  • Do not post screenshots showing:
    • Emails
    • Calendars
    • Badges
    • Dashboards
    • Internal tools
    • Documents
    • Customer or vendor names
  • Hide friend lists, follower lists, and personal contact details.

If social media is necessary for business:

  • Keep private accounts under aliases.
  • Do not reuse profile photos across professional and private accounts.
  • Do not reuse usernames across platforms.
  • Do not connect private accounts to business profiles.
  • Do not use the same phone number or email address for private and professional accounts.

Why this matters:
Breached data tells criminals who you are. Social media tells them what matters to you and when to contact you.


5. Treat social media messages and emails as untrusted

A message is not safe because it arrives through a familiar platform.

Treat unexpected messages as suspicious when they come through:

  • Email
  • Text message
  • LinkedIn
  • Facebook
  • Instagram
  • X
  • WhatsApp
  • Signal
  • Telegram
  • Other messaging apps

Be especially cautious with:

  • Recruiter messages
  • Vendor outreach
  • Media requests
  • Investor interest
  • Event invitations
  • Refund notices
  • Account alerts
  • Urgent family or friend requests
  • Requests to move to another platform

Do not:

  • Click unexpected links.
  • Open unexpected attachments.
  • Call phone numbers sent in unexpected messages.
  • Share verification codes.
  • Share passwords.
  • Share banking details.
  • Provide personal information through messages.

Instead:
Verify through a separate trusted channel, such as a known phone number, official website, or direct contact already saved in your records.

Why this matters:
A real detail in a message is not proof the message is legitimate. It may be proof your information was exposed.


6. Treat published information as compromised

If it is public, assume criminals have it.

Review and reduce exposure on:

  • Personal websites
  • Business websites
  • Staff pages
  • Executive bios
  • Old resumes
  • Conference pages
  • Podcast pages
  • Press releases
  • Public filings
  • PDFs
  • Nonprofit pages
  • Vendor pages
  • Online directories

Remove unnecessary:

  • Direct emails
  • Personal phone numbers
  • Mailing addresses
  • Home addresses
  • Tax identification numbers
  • Nonprofit identification numbers
  • Detailed biographies
  • Family references
  • Internal role details

Replace where possible with:

  • Controlled intake forms
  • Shared inboxes
  • Published business numbers
  • Limited bios
  • Role-based contact options

Why this matters:
Published information becomes adversary source material. A public email address may receive phishing. A public phone number may receive scam calls. A detailed bio may support impersonation.


7. Search yourself like an attacker

You cannot reduce exposure you have not seen.

Search for:

  • Your name
  • Business name
  • Email addresses
  • Phone numbers
  • Home address
  • Usernames
  • Old usernames
  • Key employees
  • Executives
  • Family members connected to public records

Search combinations such as:

  • Your name + employer
  • Your name + phone number
  • Your name + address
  • Your name + family member
  • Your name + LinkedIn
  • Business name + staff
  • Business name + vendors
  • Business name + payments
  • Business name + grants
  • Business name + contracts
  • Business name + donations

Use ChatGPT carefully:
Ask it to summarize what an attacker could infer from public information you provide or locate yourself. Do not paste sensitive private information into any tool unless you understand the privacy implications.

Why this matters:
The goal is not curiosity. The goal is to see what an attacker sees.


8. Strengthen account security

Exposure reduction should be paired with stronger account protection.

Take these steps:

  • Use base passwords you can remember like “Cr@3y” and for each new account leverage a base password plus the unique combination or pattern of characters for the new account.
  • I do not recommend password managers because it adds additional exposure and possible avenues for breaches of your most sensitive information. If you must write down passwords go old school and use pen and paper and if possible a locking file cabinet.
  • Turn on multi-factor authentication wherever available.

Multi-factor authentication means the account requires more than a password.
Examples include:

  • A passkey
  • A hardware security key
  • A code from an authentication app
  • A text message code

Use the strongest option available:

  1. Best: passkeys or hardware security keys
  2. Strong: authentication apps such as Microsoft Authenticator, Google Authenticator, Duo, 1Password, or similar tools
  3. Better than nothing: text message codes

Never read, send, or repeat a multi-factor authentication code to anyone.

Also review:

  • Backup email addresses
  • Recovery phone numbers
  • Trusted devices
  • Connected apps
  • Old devices
  • Email forwarding rules

Why this matters:
If criminals control your email, they may control the password reset path for many other accounts.


9. Monitor for misuse

Early detection reduces damage.

Turn on alerts for:

  • Bank transactions
  • Credit card purchases
  • New credit inquiries
  • New logins
  • Password changes
  • Multi-factor authentication changes
  • New devices
  • Changed phone numbers
  • Changed email addresses
  • Changed payment methods
  • Bank account or payout changes

Watch for:

  • Password reset emails you did not request
  • Login alerts from unfamiliar locations
  • New devices added to accounts
  • Fake social media profiles using your name or photos
  • Messages referencing real personal details
  • Unexpected calls claiming to be from banks, platforms, vendors, or support teams

Why this matters:
Social engineering often starts small. A strange login notice, a password reset email, or a realistic support message may be the first visible sign of misuse.


10. Build a verification habit

Criminals use emotion to compress judgment. Verification creates distance.

Pause when a message creates:

  • Fear
  • Urgency
  • Excitement
  • Curiosity
  • Embarrassment
  • Obligation
  • Secrecy
  • Pressure to act quickly

Ask:

  • What action is this message trying to get me to take?
  • What information is being requested?
  • What happens if I slow down?
  • Could this be verified another way?
  • Am I being moved to a different channel?
  • Is this person using authority, familiarity, or urgency to bypass normal process?

Verify by:

  • Going directly to the official website or app
  • Calling a known phone number
  • Contacting the person through a trusted channel
  • Confirming financial, legal, employment, vendor, or account recovery requests out of band

Why this matters:
Attackers do not need you to be careless. They need you to act before verifying.


Example: What exposure enables

A criminal finds your email address in a breach. A people-search site lists your phone number and home address. LinkedIn shows your employer, job title, and recent conference attendance. Your company website lists your direct email and bio.

That criminal can now send a message that references real details:

“Hi, I’m following up from the training platform your team uses. We noticed unusual activity tied to your work email after your recent course registration. Please call support to verify your account before access is suspended.”

The message works because it contains enough truth to feel legitimate.


Bottom line

Your exposed information is not just a privacy issue. It is targeting material.

Freeze and monitor your credit through Experian. Check breach exposure through Have I Been Pwned. Remove brokered personal data through DeleteMe. Limit or delete social media, including LinkedIn where possible. Keep private accounts under aliases. Treat email, text, and social media messages as untrusted until independently verified. Review every public website, profile, document, staff page, and contact listing as if an attacker will use it.

Have you taken any of these steps after a scam, breach, or impersonation attempt? Share this checklist with someone who would benefit from it, or contact Countervail if you need a deeper review of personal or organizational exposure.

Discover more from Countervail

Subscribe now to keep reading and get access to the full archive.

Continue reading