Every copy you make of information is a copy someone else can steal, and every person you send information to is another person who can lose that information. Not every information security weakness is technological. Sometimes the little things we do can have tremendous effects on information security. An important example of this is email […]
Hackers may want information you don’t know you have, or intend to use information in ways you have not thought of.
Unsurprisingly, most people think they know what information they can and cannot access. After all, how could you know something and not know you know it? Trivially, “access” is not “knowledge.” After all, everyone reading this post can also access all information online, but they surely do not know all information online. Even with the information you know you—law abiding citizen—don’t think about information the way malicious actors might.