Reporting Elections, Safety and Security of Journalists

or visible on screens in a photo. Even the type of laptop,
email client, browser or phone system you use could fuel
an informed and convincing phishing attack.
Personal posts can result in professional attacks: a new
car photo in front of your house can reveal your address
and other information. Credit cards, driver’s licenses,
passports, and any other personal identifiers can be
found in the background (or forefront) of images on social
media.
All of this personally identifiable information (PII), can put
your identity at risk, and it can be used
to impersonate you to your employer for a corporate
attack.
Any photo with geolocation enabled can let criminals
know you’re out of town and your home is
empty. And photos can be easily reverse searched to find
out additional information.
Having a phone number and email address associated
with your social media accounts may be required for the
account or requested for security purposes, but check the
settings to make sure they don’t make you or the account
vulnerable.
1.2 Practice good account hygiene
Because software that cracks passwords is always getting
better, what we used to think was a strong password may
no longer be enough to keep us safe.
Passphrases are much stronger than passwords – the more

45

Select target paragraph3