The Underestimated Digital Fingerprint
Executives live in a paradox: On one hand, they must be visible – for business, networks, and their professional reputation. On the other hand, this very visibility makes them attractive targets for cybercriminals, fraudsters, and other malicious actors.
What many don't realize: Just ten data categories are enough to create a detailed profile that can be exploited for identity theft, social engineering, or targeted attacks.
This data is often easier to find than you think.
At corma, we analyze daily what information about high-profile individuals can be found online. The results are revealing – and sometimes alarming.
The 10 Critical Data Categories in Detail
1Mobile Phone Numbers and Email Addresses
What attackers find:
- •Current and historical mobile numbers
- •Business and private email addresses
- •Links to online accounts and services
Common sources:
- •Data brokers and commercial databases (often the most valuable source)
- •Outdated contact information on websites
- •Leaked address books and contact lists
- •Whois databases for domain registrations
Risk assessment: HIGH
This data enables direct contact and serves as the foundation for phishing attacks and social engineering.
Immediate protection:
Use separate email addresses for public and private purposes. Regularly check archived website versions for outdated contact data.
2Residential and Business Addresses
Risk assessment: HIGH
Addresses enable not only unwanted contact attempts but also the planning of physical attacks.
3Professional Information and Career Details
Risk assessment: MEDIUM-HIGH
This information helps attackers develop credible pretexts for social engineering.
4Family Information and Personal Relationships
Risk assessment: VERY HIGH
Family information provides emotional pressure points for extortion and can endanger the safety of your loved ones.
5Photos and Visual Content
Risk assessment: MEDIUM-HIGH
Photos can be misused for deepfakes and identity deception.
6Social Media Profiles and Online Activities
Risk assessment: HIGH
Social media profiles are a goldmine for attackers.
7Compromised Passwords from Data Breaches
Risk assessment: VERY HIGH
Compromised passwords enable direct access to your accounts.
8Interests, Hobbies and Recreational Activities
Risk assessment: MEDIUM
This information is used for personalized attacks.
9Movement Patterns and Routines
Risk assessment: HIGH
Movement patterns make you predictable and vulnerable.
10Online Identities and Pseudonyms
Risk assessment: MEDIUM-HIGH
Even supposedly anonymous online identities can be traced back to your real identity.
Risk Assessment: Evaluating Your Individual Threat Level
VERY HIGH (7-10 categories affected)
Immediate action required for systematic protective measures.
HIGH (4-6 categories affected)
Targeted optimization required.
MEDIUM (1-3 categories affected)
Basic precautionary measures are sufficient.
Your Next Steps
Do you have questions about your digital protection?
corma GmbH · Digital Close Protection
Hammer Str. 19 · 40219 Düsseldorf · Germany