The Underestimated Digital Fingerprint
Executives live in a paradox: On one hand, they must be visible – for business, networks, and their professional reputation. On the other hand, this very visibility makes them attractive targets for cybercriminals, fraudsters, and other malicious actors.
What many don't realize: Just ten data categories are enough to create a detailed profile that can be exploited for identity theft, social engineering, or targeted attacks.
This data is often easier to find than you think.
At corma, we analyze daily what information about high-profile individuals can be found online. The results are revealing – and sometimes alarming.
The 10 Critical Data Categories in Detail
1Mobile Phone Numbers and Email Addresses
What attackers find:
- •Current and historical mobile numbers
- •Business and private email addresses
- •Links to online accounts and services
Common sources:
- •Data brokers and commercial databases (often the most valuable source)
- •Outdated contact information on websites
- •Leaked address books and contact lists
- •Whois databases for domain registrations
Risk assessment: HIGH
This data enables direct contact and serves as the foundation for phishing attacks and social engineering.
Immediate protection:
Use separate email addresses for public and private purposes. Regularly check archived website versions for outdated contact data.
2Residential and Business Addresses
What attackers find:
- •Current and previous residential addresses
- •Business headquarters and office locations
- •Holiday homes and secondary residences
- •Real estate ownership and property details
Risk assessment: HIGH
Addresses enable not only unwanted contact attempts but also the planning of physical attacks. They help criminals understand your habits and routines.
Immediate protection:
Use post office boxes for business correspondence.
3Professional Information and Career Details
What criminals find:
- •Current position and company
- •Career path and previous employers
- •Salary information and compensation structures
- •Business partners and industry contacts
Risk assessment: MEDIUM-HIGH
This information helps attackers develop credible pretexts for social engineering. They can impersonate business partners, vendors, or colleagues.
Immediate protection:
Limit professional details in public profiles. Use generic titles instead of specific position designations.
4Family Information and Personal Relationships
What criminals find:
- •Names of spouses and children
- •Schools and recreational activities of family members
- •Family relationships and contacts
- •Family habits and routines
Risk assessment: VERY HIGH
Family information is particularly dangerous as it provides emotional pressure points for extortion and can endanger the safety of your loved ones.
Immediate protection:
Avoid publishing family photos with identifiable details. Educate your family about social media risks.
5Photos and Visual Content
What criminals find:
- •Current and historical photos
- •Metadata with location and time information
- •Biometric data for facial recognition
- •Private moments and intimate images
Risk assessment: MEDIUM-HIGH
Photos often reveal more than you realize: whereabouts, habits, contacts, and private details. They can be misused for deepfakes and identity deception.
Immediate protection:
Remove metadata from photos before publication. Check your appearance in Google Image Search.
6Social Media Profiles and Online Activities
What criminals find:
- •Complete social media histories
- •Personality profiles and preferences
- •Political and social views
- •Contacts and network connections
Risk assessment: HIGH
Social media profiles are a goldmine for attackers. They provide deep insights into your personality, your habits, and your social environment.
Immediate protection:
Review all privacy settings. Limit personal information in public profiles.
7Compromised Passwords from Data Breaches
What criminals find:
- •Hacked passwords from databases
- •Email/password combinations
- •Reused login credentials
- •Security questions and answers
Risk assessment: VERY HIGH
Compromised passwords enable direct access to your accounts. Many people use the same passwords for multiple services – a critical mistake.
Immediate protection:
Use a password manager and unique passwords. Enable two-factor authentication everywhere possible.
8Interests, Hobbies and Recreational Activities
What criminals find:
- •Sports activities and club memberships
- •Collecting interests and hobbies
- •Vacation destinations and travel habits
- •Cultural and social interests
Risk assessment: MEDIUM
This information is used for personalized attacks. Attackers can pose as like-minded individuals and gain your trust.
Immediate protection:
Use pseudonyms in hobby communities. Be careful about disclosing personal details in interest groups.
9Movement Patterns and Routines
What criminals find:
- •Regular jogging or walking routes
- •Work and leisure routines
- •Frequently visited places and venues
- •Travel patterns and locations
Risk assessment: HIGH
Movement patterns make you predictable and vulnerable. Criminals can exploit your absence or target you at specific locations.
Immediate protection:
Deactivate automatic location sharing. Post activities with a time delay, not in real-time.
10Online Identities and Pseudonyms
What criminals find:
- •Alternative usernames and handles
- •Links between different identities
- •Private online activities under pseudonyms
- •Historical account connections
Risk assessment: MEDIUM-HIGH
Even supposedly anonymous online identities can be traced back to your real identity. These connections often reveal embarrassing or compromising details.
Immediate protection:
Use completely separate email addresses for different online identities. Maintain consistent anonymization practices.
Risk Assessment: Evaluating Your Individual Threat Level
VERY HIGH (7-10 categories affected)
Your digital fingerprint is comprehensive and dangerously detailed. Immediate action required for systematic protective measures.
HIGH (4-6 categories affected)
You are an attractive target with considerable attack surface. Targeted optimization required.
MEDIUM (1-3 categories affected)
Basic precautionary measures are sufficient, regular review recommended.
What Can You Do Now?
The good news: You are not helplessly exposed to this risk. With the right strategies, you can systematically reduce your digital attack surface.
At corma, we have learned through over 35 years of investigative experience: The best defense begins with understanding your own vulnerability. Only those who know what information about them is circulating online can take effective protective measures.
Your Next Steps
Do you have questions about your digital protection?
corma GmbH · Digital Close Protection
Hammer Str. 19 · 40219 Düsseldorf · Germany
In a world where information means power, ignorance about one's own digital presence is a risk that no one can afford.