In 2024, human errors accounted for nearly 68% of reported data breaches, highlighting a critical vulnerability in cybersecurity defenses. This alarming statistic was detailed in the Verizon 2024 Data Breach Investigations Report, recently referenced in a specialized article on Eset’s Romanian blog. Most breaches stemmed from phishing and pretexting schemes, with many individuals unwittingly falling prey to a myriad of social engineering tactics, including various email scams and extortion attempts.
One particular method that has garnered less attention in recent discussions is pretexting. As cybersecurity expert Mark Szabo of Eset explains, pretexting involves an attacker fabricating a scenario, or ‘pretext’, designed to manipulate the victim into revealing sensitive information or transferring funds. This approach leverages the vast amount of publicly accessible personal data, exploiting it to deceive targets into unwittingly compromising their financial security or sharing confidential information such as account credentials.
A specific variant of this deception is Business Email Compromise (BEC), particularly CEO fraud, where attackers impersonate high-ranking executives to trick employees—usually in finance or accounting—into transferring money or disclosing sensitive business data. The prevalence of such tactics underscores the heightened need for robust data privacy measures in our increasingly digital world. Szabo emphasizes the importance of overseeing one’s personal information, particularly for those concerned about privacy and security. Understanding how to minimize one’s digital footprint can serve as an essential safeguard against these threats.
In light of these security challenges, cybersecurity professionals have proposed strategies for reducing digital footprints, especially in search engine results. Google has proactively responded to these concerns, developing various resources for users to remove their personal information from public view. One such resource, known as “About You,” enables users to track their online presence and identify any sensitive details—like home addresses and phone numbers—displayed in search results.
To utilize this feature, users must possess a Google account and can access it via a web browser or the Google app on their mobile devices. The process of navigating to the “About You” section involves specific steps that ultimately guide users to the desired functionality. Additionally, individuals can submit direct requests to Google to remove search results that expose personal information. The process is straightforward: users need only to complete a removal request form outlining the details they wish to keep private.
If Google requires clarification on any submission, users can expect to receive an email prompting for further information to resolve the issue. This proactive approach by Google serves as a critical tool for users seeking to enhance their personal data security and privacy amid the ongoing threat landscape.
Amid the evolving tactics in cyberattacks, employing the MITRE ATT&CK framework can help identify the adversary methods likely used during such breaches. Techniques related to social engineering and initial access tactics are prevalent in attacks like pretexting and phishing. As the digital landscape evolves, continued vigilance and strategic action will be paramount for individuals and businesses alike in safeguarding against potential cyber threats.