Hacked.com icon

hacked.com

How to avoid being targeted by hackers: reduce identity exposure and recovery risk

a hacker in a phone call and on a computer

Most attackers do not “pick victims” by personality. They pick by access cost and expected payout. If your email, phone, and public identifiers make it easy to verify you and reset your accounts, you look expensive to defend and cheap to attack.

Reduce targeting pressureDo thisWhy it changes outcomes
Control-plane hardeningSecure your primary email and enable strong 2FAEmail controls resets for most accounts
Phone number stabilityHarden your carrier account and reduce public phone exposurePhone takeover breaks SMS recovery and SIM-based 2FA
Limit public identifiersRemove public email/phone/address from profiles and biosReduces phishing, impersonation, and doxxing leverage
Constrain inbound channelsRestrict DMs, message requests, and taggingBlocks the easiest social engineering path
Make compromise noisyTurn on sign-in alerts and review sessionsShortens time-to-detection

Key idea: most “targeting” starts with exposed identity and easy recovery paths. Reduce exposure and harden recovery to become a worse return on effort.

Start with the control plane: email, then everything else

Most account recovery, impersonation cleanup, and fraud response depends on one thing: the email inbox that receives security alerts and reset links.

  • Secure email with a unique password and 2FA.
  • Remove risky mailbox rules (forwarding, delegates) and review recent sign-ins.
  • Prefer stronger authentication methods when available: passkeys and security keys reduce phishing risk materially.

Reduce the ways strangers can reach you

Attackers need a channel. If strangers can DM you, tag you, email you directly, or call you from a number they found on your profile, you have a direct path for social engineering pressure.

  • Restrict DMs and message requests on social platforms.
  • Limit tagging and mention permissions to people you follow or friends only.
  • Use separate emails for public contact versus account logins. Avoid using your login email as your public contact email.

Public information that increases targeting

“Attack surface” is not only software. It is also the set of facts attackers can use to verify you, pressure you, or impersonate you.

Public signalHow attackers use itSafer alternative
Phone number in bioSIM swap attempts, vishing, WhatsApp/Telegram takeoversUse a separate public number or remove the number entirely
Personal email addressPhishing, credential stuffing correlationUse an alias for sign-ups and keep your primary inbox private
Home address or location routineDoxxing, stalking, coercionRemove address hints and avoid posting real-time location patterns
Same username everywhereCross-platform correlation and impersonationUse different usernames for different contexts when safety matters
Public family and employer detailsConvincing pretexting and “I know you” scamsLimit the level of detail, especially on less secure platforms

Make account takeovers harder to monetize

Most targeting is driven by what attackers can do after they get in: steal money, run ads, scam your contacts, or sell access. You reduce targeting pressure when compromise yields less value.

  • Use unique passwords, stored in a password manager, to stop breach cascades.
  • Turn on sign-in alerts for key accounts, especially email, financial, and social accounts used for identity.
  • Review active sessions periodically and sign out anything unfamiliar.
  • Minimize connected apps and revoke third-party access you do not need.

Common mistake: chasing perfect anonymity. Practical controls reduce real targeting without making day-to-day life harder.

When targeting is personal (harassment, stalking, or extortion)

If you are dealing with targeted harassment, you are solving two problems at once: safety and visibility. Avoid direct engagement with hostile accounts and preserve evidence before you start removing things.

  • Preserve evidence (screenshots, URLs, timestamps) and keep it private.
  • Lock down your accounts and remove public contact info.
  • Use a structured response: what to do about online harassment.

Practical next steps

Being “hard to target” is mostly being hard to social-engineer. When contact surfaces are constrained and recovery channels are protected, attackers lose their easiest levers.

The stable endpoint is a smaller footprint, strong authentication, and fewer pathways for strangers to verify your identity through public details.

That endpoint does not require paranoia. It requires consistent rules that you follow when you are tired, busy, or stressed. Those are the moments attackers count on.