Back
Cyber Security Training & Software for Companies | MetaCompliance

Products

Discover our suite of personalised Security Awareness Training solutions, designed to empower and educate your team against modern cyber threats. From policy management to phishing simulations, our platform equips your workforce with the knowledge and skills needed to safeguard your organisation.

Cyber Security eLearning

Cyber Security eLearning to Explore our Award-Winning eLearning Library, Tailored for Every Department

Security Awareness Automation

Schedule Your Annual Awareness Campaign In A Few Clicks

Phishing Simulation

Stop Phishing Attacks In Their Tracks With Award-Winning Phishing Software

Policy Management

Centralise Your Policies In One Place And Effortlessly Manage Policy Lifecycles

Privacy Management

Control, Monitor, and Manage Compliance with Ease

Incident Management

Take Control Of Internal Incidents And Remediate What Matters

Back
Industry

Industries

Explore the versatility of our solutions across diverse industries. From the dynamic tech sector to healthcare, delve into how our solutions are making waves across multiple sectors. 


Financial Services

Creating A First Line Of Defence For Financial Service Organisations

Governments

A Go-To Security Awareness Solution For Governments

Enterprises

A Security Awareness Training Solution For Large Enterprises

Remote Workers

Embed A Culture Of Security Awareness - Even At Home

Education Sector

Engaging Security Awareness Training For The Education Sector

Healthcare Workers

See Our Tailored Security Awareness For Healthcare Workers

Tech Industry

Transforming Security Awareness Training In The Tech Industry

NIS2 Compliance

Support Your Nis2 Compliance Requirements With Cyber Security Awareness Initiatives

Back
Resources

Resources

From posters and policies to ultimate guides and case studies, our free awareness assets can be used to help improve cyber security awareness within your organisation.

Cyber Security Awareness For Dummies

An Indispensable Resource For Creating A Culture Of Cyber Awareness

Dummies Guide To Cyber Security Elearning

The Ultimate Guide To Implementing Effective Cyber Security Elearning

Ultimate Guide To Phishing

Educate Employees About How To Detect And Prevent Phishing Attacks

Free Awareness Posters

Download These Complimentary Posters To Enhance Employee Vigilance

Anti Phishing Policy

Create A Security-Conscious Culture And Promote Awareness Of Cyber Security Threats

Case Studies

Hear How We’re Helping Our Customers Drive Positive Behaviour In Their Organisations

A-Z Cyber Security Terminology

A Glossary Of Must-Know Cyber Security Terms

Cyber Security Behavioural Maturity Model

Audit Your Awareness Training And Benchmark Your Organisation Against Best Practice

Free Stuff

Download Our Free Awareness Assets To Improve Cyber Security Awareness In Your Organisation

Back
MetaCompliance | Cyber Security Training & Software for Employees

About

With 18+ years of experience in the Cyber Security and Compliance market, MetaCompliance provides an innovative solution for staff information security awareness and incident management automation. The MetaCompliance platform was created to meet customer needs for a single, comprehensive solution to manage the people risks surrounding Cyber Security, Data Protection and Compliance.

Why Choose Us

Learn Why Metacompliance Is The Trusted Partner For Security Awareness Training

Employee Engagement Specialists

We Make It Easier To Engage Employees And Create a Culture of Cyber Awareness

Security Awareness Automation

Easily Automate Security Awareness Training, Phishing And Policies In Minutes

MetaBlog

Stay informed about cyber awareness training topics and mitigate risk in your organisation.

Doxing – What you need to know about data compromise

Doxing en

about the author

Share this post

Perhaps you have heard of doxing before. Nevertheless, this term may still be unfamiliar to some people. However, whether you are familiar or not, everyone needs to be aware of the dangers associated with a possible doxing attack.

Everyone would like to ensure that their own data present on the internet is protected from identity theft and similar threats. But is doxing really that dangerous, and if so, what can you do to avoid data misuse? How secure is your privacy on the internet in reality?

What exactly is doxing?

The term doxing is short for “dropping dox” or “documents”. Many people equate doxing with classic hacking; however, doxing involves stealing data (documents) that are readily available and visible to anyone.

The objective is to collect information in as targeted a manner as possible. In most cases, this is done without committing any crime, as it is achieved by thoroughly searching the internet for available information. However, the consequence of doxing is closely related to cyberbullying, where criminals seem to be protected under the pretext of doing something good for society.

How does doxing work?

Doxing usually follows a certain procedure. Firstly, the information that is required is collected and collated. The information already exists; however it is usually scattered all over the internet.

Once the information has been collected, the next step is to bundle the information together and check that all relevant information is present. If, for example, you wanted to list all personal data, then you would check whether any information (such as the mobile phone number) is still missing.

If a comprehensive collection of information has been collected, it can be published or used for nefarious purposes such as blackmail. At this point, however, one is operating outside the boundaries of the law. The aim of the attack is to intimidate the persons concerned to such an extent that they are willing to do anything to avoid any (or further) humiliation associated with the publication.

It is often the case that the person concerned faces a campaign of harassment. They may be harassed, threatened and antagonised by mail, in chats or by phone. Criminals want to give the impression that they have found out everything about the person, often threatening them with the most serious crimes such as murder and rape. Many perpetrators even go as far as to spread hate messages and encourage others to partake in frightening the victim further.

In what instances is doxing most likely to be occur?

Generally speaking, doxing can occur in any profession and involve any person. The predominant motive is usually revenge due to a break-up or rejection and professions with a high status in society are particularly affected. These include, for example, politicians and journalists. Politically active people can also quickly become targets.

Some examples of doxing

Doxing offers a wide range of opportunities and can therefore prove to be all the more dangerous.

Relevant examples are:

  1. Personal data is published on the internet. Personal data can include names, places of residence, information about friends and family members. This information is often easier to get hold of than one might expect, especially with social media, which provides an open channel to privacy invasion. Telephone numbers are also easily accessed via telephone books or databases. Further, using a commercial register makes it possible to quickly learn all the necessary information about a person’s financial status or possible negotiations. It is also possible to gather personal data via social engineering.
     
  2. Damage to reputation through publication of information. This example is self-explanatory. Through doxing, information can be made public that damages the reputation of the person concerned. False information, which doxing presents as truth on the internet, can thus also be circulated and have negative consequences for the victim.
     
  3. Private information concerning an individual is published. Similarly to the first point mentioned, private information is made available, such as a private person’s interests or hobbies. This makes the person vulnerable to criticism and can lead to the person becoming the target of a hunt.

How you can protect yourself from doxing

Doxing represents a very cowardly and criminal way of ruining peoples lives. Understandably, you would then want to ensure you are adequately protected to ward off possible doxing attacks.

Here are some possible measures you can take today:

  • Do not open unfamiliar email files or links under any circumstances
  • Encrypt your hard drives and USB sticks
  • Make sure your software is up to date
  • Use adequate virus scanners and firewalls
  • Enter as little private data as possible on the internet
  • Use complex passwords and make sure you use different login details
  • Avoid social logins via social media
  • Check your privacy settings on all social media platforms you use

Conclusion

Doxing is a serious crime that should not be dismissed as a trivial matter. Data misuse can be contained in a variety of ways (such as those mentioned above) to help ensure that you are fully protected. However, it is also clear that anyone who uses social media or the internet generally has a certain residual risk of becoming a victim of doxing. It is essential to manage your own data appropriately and react as quickly as possible in an emergency.

Providing appropriate awareness education also helps to avoid further privacy damage.

Other Articles on Cyber Security Awareness Training You Might Find Interesting