BeSafe: Phone, E-mail, Passwords Secured
But then, one well-thought-out, sophisticated scam targeted directly at a specific person is often all it takes, and suddenly it happens to them too. Not because they are foolish, but because attackers today are very resourceful and work with emotions, trust, and human inattention.
The truth is simple: none of us are 100% safe unless we actively take an interest in our digital security and try to secure what can be secured.
Some people try to protect themselves by deleting or deactivating Facebook, WhatsApp, Instagram, TikTok, Telegram, or other platforms. Often with the feeling that this makes them safe. But unfortunately, that is a mistake. Simply deleting an account does not mean that no data about you exists on the internet.
You may have heard the term "shadow profile". For example, Meta (Facebook, Instagram, WhatsApp) can create basic profiles even for people who do not use Facebook at all. It is enough to visit an e-shop or a website that has embedded elements of this social network, such as a "Like" button, "Share" button, or other tracking code. Even without any interaction, technical information begins to be stored: device type, browser, IP address, approximate location.
Messaging apps work similarly. Even if you don't use WhatsApp, Telegram, or another service yourself, they may have indirect information about you because someone in your family or friends uses it and allows the app access to their contacts. This creates more "shards" of your digital footprint.
It's not about someone knowing that a specific person bought a specific washing machine. It's about systems creating technical identities, anonymous IDs, under which information about behavior, devices, and movement on the internet is stored. Once you create an account, the data can be linked.
And it's not just about Meta. That is just the most visible and frequently mentioned one. Similar principles work across the entire internet. Although today, thanks to the European Union, there are stricter rules and greater pressure for transparency, one thing remains the same: what you put on the internet once leaves a trace.
But this article is not about scaring you or saying you should stop using the internet or modern technology. On the contrary. It's about how to behave on the internet safely, responsibly, and with common sense, because you never know when and how someone might misuse your digital footprint, whether against you personally or as part of a scam.
#besafe
Phone number: the most valuable key to your digital identity
Most of us have our own phone number to stay in touch with family, loved ones, friends, employers, authorities, or various services. To put it simply: a phone number is our digital signature today.
There are various ways to obtain a phone number. Either through a plan with an operator or by purchasing a prepaid SIM card. You can have it registered to a specific person or use it anonymously. In some countries, anonymous SIM cards no longer exist at all, and registration with an ID card or other document is required upon purchase. This has its reasons—fighting terrorism, crime, or fraud—but it also shows what a crucial role the phone number plays.
Whether you have a plan or a prepaid number, one thing is certain: it is very sensitive data. We use our phone numbers to communicate not only with family but also with doctors, authorities, or companies. It is often our primary contact detail because it's faster to call or send a message than to wait for a letter.
The problem begins when we give our number "everywhere"
However, today a phone number is not used just for communication. We use it when registering for:
- Email services
- Social networks
- Messaging apps
- E-shops, contests, loyalty cards
- Do I really need this service?
- Is it necessary to enter a phone number?
- Isn't an email or an authentication app enough?
How a public number becomes an ideal target
- First and last name
- Public phone number
- Date of birth
- Schools attended, employment
- Location where the person moves
- Currently ongoing vacation
- Photos of children, pets
- Did not state the company name
- Is pushing for a quick decision
- Is asking for sensitive data
A phone number can be misused even without your SIM card
- imitate calling from your number (spoofing)
- attempt account recovery via SMS
- misuse the number for targeted attacks
- One private number for banks, authorities, and family.
- A second "disposable" number for registrations, contests, and loyalty programs.
Key Takeaways
- access to your bank
- your ID card
- passwords to your accounts
Email Address: A Key Element of Digital Security
- Website and Service Registrations: always verify that it is really the given company. Scammers create pages that look completely real just to obtain your data.
- Social Networks: do not list your email as public info on your profile. An attacker can easily scrape it and use it for phishing or account hijacking.
- Fake Messages and SPAM: emails like "Inheritance Abroad" or "unpaid shipping fees" can lead to sites that collect your passwords and personal data. They are often so sophisticated that they will display: wrong password, please try again, and save every variation you enter.
Two Email Addresses: How to Use Them
- Primary Email: for official communication, banking, children's school, healthcare...
- Secondary Email: for registering for games, contests, loyalty programs, or less important services...
- Use your primary email to register accounts where you use a payment card.
- Use the secondary one for less sensitive services.
- Never share your primary email publicly.
Checking if Your Email Was Compromised
- Have I Been Pwned: https://haveibeenpwned.com ↗
- strong password
- two-factor authentication (2FA)
- do not use public Wi-Fi for sensitive emails without a VPN
- do not send email codes or passwords to anyone
- consider aliases and disposable emails: for example, when registering for less important services
Password: A Unique Secret for Each of Us
- Long: ideally at least 12 - 16 characters.
- Combination of characters: uppercase and lowercase letters, numbers, symbols.
- Unpredictable: no names, dates of birth, favorite teams, or dictionary words.
- Unique for every service: never use the same password on multiple accounts.
- Never share your password: not even with family or friends.
- Use a password manager: secure, generates strong passwords, remembers them for you.
- Regularly change passwords for sensitive accounts: especially email and banking apps.
- Turn on 2FA everywhere you can: particularly for email, social networks, and banking.
- Beware of phishing: never enter your password on pages that do not look official.
Modern Ways of Logging In: The Passwordless Era
Passkeys
- You don't create a password.
- Login takes place via your phone, computer, or tablet.
- Verification is done via fingerprint, Face ID, or device passcode.
- The key is stored locally on your device, not on a server.
- It cannot be intercepted by phishing.
- There is no password database that could leak.
- It is linked directly to your device and your biometrics.
Login via QR Code
- A QR code is displayed on the computer.
- You scan it with the phone where you are already logged in.
- You confirm the login with a fingerprint or Face ID.
- Apple
- Some banking applications
- You don't type any password.
- You minimize the risk of someone eavesdropping or looking over your shoulder.
- Fast and convenient.
Biometric Login (Fingerprint, Face ID)
- Fingerprint
- Facial recognition (Face ID)
- Sometimes even iris recognition
- Does not leave the device.
- Is embedded in a secure chip (e.g., Secure Enclave on Apple devices).
- Serves only for verification, not for data transfer.
- Biometrics is not a password.
- It is only a way to verify that it is really you.
Hardware Security Keys and Encrypted USBs
- YubiKey
- Security USBs with a PIN or fingerprint sensor
- Function as a second factor or a complete password replacement.
- Login occurs only when the key is physically present.
- Some have their own encryption or biometric sensor.
- An attacker cannot log in without the physical key.
- Extremely high level of security.
- Ideal for email, banking, or work accounts.
- Modern methods are more secure.
- They are more resistant to phishing.
- And above all, more convenient for the average user.
- A strong password (stored in a password manager).
- Combined with 2FA.
- And wherever possible, Passkeys or biometrics.
Two-Factor Authentication (2FA): The Next Line of Defense
Types of 2FA
- Simplest form: The service sends a one-time code to your phone.
- Disadvantages: The code can be intercepted via a SIM swap attack or malware.
- Advantage: Easy for average users.
- For example, Google Authenticator, Microsoft Authenticator, Apple Passwords, Authy...
- They generate one-time codes directly on the phone, without SMS.
- Advantage: More secure than SMS, resistant to SIM swap attacks.
- Some services (Apple ID, Google, banking apps) send you a notification: "Do you want to log in?", and you just confirm on your phone.
- Fast and convenient.
- USB or NFC keys (e.g., YubiKey) serve as a second factor.
- You can only log in with the physical key.
- The most secure variant, ideal for banking, email, or work accounts.
- Fingerprint or Face ID, if the service supports them.
- Essentially follows up on Passkeys or push notifications.
Practical Tips for 2FA
- Turn it on everywhere possible. Facebook, Gmail, Instagram, Apple ID, bank accounts: 2FA is a baseline today.
- Prefer apps or keys over SMS: Every account should have a unique second factor.
- Back up your access. For example, recovery codes or a backup key, so you don't get locked out of your own account.
- Store codes securely, not in an email or unprotected notes.
Important Notice: I am not a cybersecurity or systems security expert. This article is written in my own words, based on my knowledge and experience with technology, the web, and the digital world. It serves as informative and educational content for readers and followers, not as an official guide or guarantee of security. The author bears no responsibility for any consequences resulting from the application of the recommendations provided. You may link to this article, but copying or using it otherwise without the author's permission is not allowed. The image used in the article was created as an illustration using ChatGPT.
