< IMG SRC = "/Uploads/Blogs/57/67/IB-FRS4201le_e2d66d6d.jpg" Alt = "How to avoid the leakage of personal and combat data: tips of the Ministry of Defense"/> ~ ~ < P >< Strong > In the information era, the protection of personal and service data has become critical, especially for servicemen. Honor intelligence is constantly looking for ways to obtain valuable information that can disclose plans, location or personal data on personnel. 0 ~/p > < p >Ministry of Defense of Ukraine & nbsp; nbsp & nbsp; a number of tips on how to prevent information leakage.

< p >< strong > How opponent collects information 0 ~/p > < P > The enemy actively uses several basic methods to obtain data on Ukrainian servicemen. Among them are phishing, breaking information systems and social engineering. More about these technical methods can be found from the previous material.

< P > However, special attention should be paid to the fact that the enemy actively analyzes open sources of information. According to small fragments of data scattered by the Internet, the attackers are able to make a detailed profile of a serviceman.

< p >Even seemingly innocent details & mdash; City of residence, educational institution, friends, subscribers, photos & mdash; Together, they make it possible to determine the place of service, the circle of communication and other important things. With enough of such & laquo; brick & raquo; The attacker can build an accurate picture and move the danger from the virtual world to real.

< P >< Strong > safety of smartphones and other gadgets 0 ~/p > ~ > 62 > 62 < p > It is difficult to imagine a modern person without a smartphone. These devices are constantly connected to the Internet, which makes information on them vulnerable. To protect data on electronic devices, it is important to follow a few simple rules.

< p >Always block your device & mdash; This is the easiest way to protect information. Use a password or PIN code (at least 6 digits) that you are comfortable with a memorization & Rsquo; to flee. Biometric authentication and simple foam codes look comfortable, but they are extremely vulnerable to fractures. Face recognition on budget smartphones is easy to deceive with a regular photo, and short foam codes can be taken over by several attempts.

< P > Control the established applications and permits for them. Applications should be downloaded exclusively from official stores and only those that are actually used. You should not grant the applications full permission to the device, especially carefully should be permitted to work with media, surveying, camera and microphone.

~ < p > wireless with & rsquo; unity & mdash; Another vulnerable place. Wireless modules on not only give out the presence of electronic devices in a certain spectrum, but also create potential & laquo; doors & raquo; for malefactors. Only switch on Wi-Fi and Bluetooth as needed and only connect to proven networks. Mode & laquo; in the aircraft & raquo; not always guaranteed to turn off these functions, so check their condition manually.

< p > Do not do & laquo; jailbreak & raquo; (iPhone) or & laquo; rut & raquo; (Android) of your phone. Although such unlocking removes manufacturers' restrictions and opens additional opportunities for users, it is accompanied by a significant set of risks for safety. Some of them include:

< Ul > < li > Loss of built -in cybersecurity protection

< li > inability to access the operating system's safety updates

< li > Loss of validity of the guarantee on the device.

< p > The main thing is that & laquo; jailbreak & raquo; and & laquo; ruting & raquo; grant the administrator rights not only to you but also to a potential harmful code that can get unlimited access to all private information on the device.

< p >Avoid public charging ports in cafes, gas stations and other public places. Hackers can compromise them with the method & laquo; Jecking & raquo;. Using a broken charging port you run the risk of giving the attackers full access to your device, because USB-Rosquo; Rsquo; EM on your phone is not only intended for charging but also data transmission.

< P > It is best to charge your smartphone with your own charging through a regular socket, or use Data Blockker & ndash; A small device that blocks data transmission while charging through USB port.

< P >< Strong > Photos, Video and Cloud Services

~ ~ < P > Special attention should be paid to the camera and photos. Do not shoot or send photos that contain sensitive information. Obligy & Rsquo; Typically turn off geotegs that automatically store information about the place where the photo was made.

< p >Even if there is no getegs, the landscape, buildings or other parts can help determine the shooting location. If necessary, blur or edit characteristic items in the photos.

< P > Check the Gallery Settings: Are your photos unloaded to cloud services automatically. Standard galleries often suggest synchronization with iCloud, Google Cloud or other cloud storage facilities. If your account is broken, the attacker can access your entire gallery. Therefore, auto -load is better off, especially for service images.

< P >< Strong > Safety in social networks and messengers 0 ~/p > ~ > 62 > 62 < p >Social networks & mdash; a powerful source of information. For safe use, close the profile from outsiders, add only familiar people to friends or subscribers. Check Privacy Settings regularly as platforms can change them without warning.

< P > Before publishing any content, think about whether it reveals sensitive information. Avoid mention of service, moving, plans and tasks. Do not publish photographs in military uniforms with visible distinguishing signs or on the background of military OB & Rsquo; Also avoid photos against the background of civilian OB & Rsquo; Ents in which the military are placed and the areas where the tasks are performed.

< p >Particular caution should be exercised in messengers. Regularly check the composition of the participants of the official chat. Personnel in groups may remain people who no longer need access to the information under discussion. Do not trust unfamiliar chats, even if they have official names such as & laquo; command in/h & raquo;. It is better to check in competent persons, whether you really had to add to a particular group.

< P > During telephone conversations, follow the principle of a minimum of information. Do not disclose the details about your movements, tasks and dislocation even to loved ones. Pam & Rsquo; Father any unprotected Channel & Rsquo; Lands can potentially listen.

< p >< strng > The correct destruction of files

< P > It is important not only to store it safely but also to reliably delete. The usual deletion of files from the electronic device is insufficient to fully destroy the data. First, make sure that the deleted files are not left in the basket. On the computer; Rsquo; RSERRI, they can be stored indefinitely, and on the smartphone & mdash; about 30 days.

< p >However, even cleaning the cart does not guarantee the complete destruction of information. In fact, the file is not removed from the drive, but only the reference is removed for the operating system. Data will be stored on carriers until they are written new.

< P > Using special programs that are freely available and do not require any special knowledge for their use, the attacker can restore deleted files if they have not been overwritten.

< P > Use special programs like Eraser or Bleachbit to reliably delete data. They & laquo; clean & raquo; The disk, writing down the free place of random information that makes it impossible to restore previous data. In critical cases, a more reliable method remains physical destruction of the carrier.

< p >< strng > What to do in the case of data leak

~ < P > Despite all precautions, information leaks can still happen. In this case, immediately inform the management to evaluate the scale of the problem. Change all passwords, especially for critical resources.

< P > After that you should contact the specialized units that are engaged in cybersecurity.

< p > Protection of personal and combat data & mdash; It is not a one -time action, but a constant process that requires attention and discipline. By following the basic safety rules, you can significantly reduce the risk of compromising sensitive information.

< P > Pam & Rsquo; Pit: Your caution in digital space protects not only you but also your brothers.

Natasha Kumar

By Natasha Kumar

Natasha Kumar has been a reporter on the news desk since 2018. Before that she wrote about young adolescence and family dynamics for Styles and was the legal affairs correspondent for the Metro desk. Before joining The Times Hub, Natasha Kumar worked as a staff writer at the Village Voice and a freelancer for Newsday, The Wall Street Journal, GQ and Mirabella. To get in touch, contact me through my natasha@thetimeshub.in 1-800-268-7116