{"id":27533,"date":"2022-05-09T15:26:16","date_gmt":"2022-05-09T15:26:16","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=27533"},"modified":"2025-05-08T21:31:07","modified_gmt":"2025-05-08T21:31:07","slug":"what-is-dumpster-diving-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/what-is-dumpster-diving-in-cybersecurity\/","title":{"rendered":"What is Dumpster Diving in Cybersecurity?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Organizations that want adequate security should go beyond internal controls, management strategies, and privilege policies. The proper destruction of business data and documents is essential.. Even with the high-end innovation tools available at hackers\u2019 disposal, <\/span><b>dumpster diving <\/b><span style=\"font-weight: 400;\">remains one of the popular methods used to gather information.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Never dump documents or other sensitive information in your trash.\u00a0 Identity thieves can use it with other illegal means to plan cyberattacks against your business. Statistics show that Americans receive more than <\/span><a href=\"https:\/\/lifelock.norton.com\/learn\/identity-theft-resources\/dumpster-diving\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">4 million spam emails every year<\/span><\/a><span style=\"font-weight: 400;\">, and more than 88% of the information was obtained via <\/span><b>dumpster diving<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For that reason, organizations should have a comprehensive understanding of dumpster diving in cybersecurity, and how to prevent it. This article discusses everything you need to know.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s dive in! Firstly, <\/span><b>what is dumpster diving<\/b><span style=\"font-weight: 400;\">?<\/span><\/p>\n<h2><b>What is Dumpster Diving?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Getting familiar with the <\/span><b>dumpster diving definition<\/b><span style=\"font-weight: 400;\"> is the first step to fight this attack. Here, cyberattackers take the idiom \u201cOne man\u2019s trash is another man\u2019s treasure\u201d to a whole new realm.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dumpster diving in cybersecurity is the process of investigating an individual or organization&#8217;s trash to retrieve information that could be used to compromise network resources or plan a cyberattack.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A person going through your trash can gather enough data to create a complex profile and commit identity theft. Aside from physical trash, cyberactors can also access recycle or electronic waste bins for sensitive information that can severely compromise your company. Cybercriminals often use malware to achieve this.<\/span><\/p>\n<h3><b>What Data Can Dumpster Divers Obtain?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">When a dumpster diver goes through your trash, they\u2019re looking for any information to execute a cyberattack. Some of the data such criminals can obtain from your trash include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Domicile or email addresses<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Private passwords, PINs, or any other sensitive data<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Bank account statements<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Digital signatures<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Duplicate copies of driver&#8217;s license, pan cards, or other identity cards<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Policy manuals, employees\u2019 phone numbers, and strategic printouts<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Medical reports, former employees\u2019 biometric info<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cell phone numbers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Financial statement information, such as ledger accounts, balance sheets, and audit reports<\/span><\/span><\/li>\n<\/ul>\n<h2><b>What Attacks Start with Dumpster Diving?<\/b><\/h2>\n<p><b>Dumpster diving<\/b><span style=\"font-weight: 400;\"> is the first step in many kinds of cyberattacks. One of them is social engineering, which is the use of human interaction to lure victims into divulging sensitive information.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The main aim of a<\/span><a href=\"https:\/\/easydmarc.com\/blog\/social-engineering-a-complete-guide\/\"><span style=\"font-weight: 400;\"> social engineering attack<\/span><\/a><span style=\"font-weight: 400;\"> is to build trust with the target before getting them to reveal confidential data or act on fraudulent instructions <\/span><b>Dumpster diving<\/b><span style=\"font-weight: 400;\"> is one of the numerous ways social engineer attackers can gather information to establish trust.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, if they retrieve a receipt for restocking a product, they can disguise themselves as an employee with the same name and time as the expected delivery to gain access to sensitive resources. They can use this access to install a keylogger or other malware to gain access to system resources.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another attack that utilizes <\/span><b>dumpster diving<\/b><span style=\"font-weight: 400;\"> is <a href=\"https:\/\/www.aura.com\/learn\/what-to-do-if-your-identity-is-stolen\">identity theft<\/a>. These thieves search trash cans for information, such as bills or other paperwork with sensitive information. They can use such data to open new credit card accounts, impersonating you and possibly accessing funds from your account.<\/span><\/p>\n<h2><b>How to Prevent Dumpster Diving in Cybersecurity?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">To prevent dumpster divers from learning any valuable information about you or your organization, establish a disposal policy Ensure all unwanted information, documents, notes, and hardware is properly destroyed. Below are a few practices to prevent <\/span><b>dumpster diving in cybersecurity<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><b>Implement a Trash Management Plan<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Implement a plan to effectively manage your trash and recycle bins as part of your <\/span><a href=\"https:\/\/easydmarc.com\/blog\/6-best-data-loss-prevention-strategies\/\"><span style=\"font-weight: 400;\">Data Loss Prevention<\/span><\/a><span style=\"font-weight: 400;\"> strategy. Trash can be in two forms: Digital and physical. Determine how to discard unwanted documents, notes, books, and hardware. The plan should also detail what information to keep and discard.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For instance, if a customer or employee is no longer with your organization, it\u2019s important to properly delete their data. In the case of physical trash, you can shred or burn paperwork.<\/span><\/p>\n<h3><b>Practice Storage Media Deletion<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Practice strict and consistent storage media deletion. Get rid of DVDs and CDs or any other drives containing personal identifiable information such as photos, videos, or any other sensitive information. If you have computers, laptops, or other hardware to discard, dispose of them properly and wipe all files and programs to prevent future damages.\u00a0<\/span><\/p>\n<h3><b>Enforce a Data Retention Policy<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Enforce a data retention policy that governs and monitors how long information must be kept and disposed of when it\u2019s no longer relevant. Additionally, ensure the policy encompasses the purpose of processing information.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Employees should always know how to handle, store, and discard company data in all its forms. . Moreover, a certificate of destruction for sensitive data is also crucial.\u00a0<\/span><\/p>\n<h3><b>Use a Shredder<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Place secure shredder bins next to every trash can within your work environment. Don\u2019t just tear and dump your paperwork in bins as attackers can easily join them together and retrieve information to plan a cyberattack. The shredder completely destroys documents with sensitive information.\u00a0<\/span><\/p>\n<h3><b>Educate Employees<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Conduct regular educational programs to train employees on proper information disposal and other <\/span><a href=\"https:\/\/easydmarc.com\/blog\/how-to-prevent-ransomware-attacks\/\"><span style=\"font-weight: 400;\">attack prevention strategies<\/span><\/a><span style=\"font-weight: 400;\">. Explain what your data retention policy entails and how they must abide by it. Employees should never take printouts, photocopies, old computers, or any other company information home for disposal.\u00a0<\/span><\/p>\n<h3><b>Keep Trash in a Safe Location Before Disposal<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">It may sound simple, but it\u2019s extremely important to keep your trash in a safe location before disposal. You can use locked recycling bins or trash cans.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can also build a fence around the dumpster to avoid any intrusion. While this can\u2019t guarantee 100% security, it does create a barrier to prevent perpetrators from accessing and retrieving information.\u00a0<\/span><\/p>\n<h3><b>Use Trusted Recycling Companies<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">If you want to employ a recycling company to help handle your waste disposal, ensure it\u2019s a trusted company. Perpetrators can disguise themselves as recycling companies to gain access to your information. Conduct adequate research on the company before entrusting them with your waste.<\/span><\/p>\n<h2><b>Final Thoughts<\/b><\/h2>\n<p><b>Dumpster diving <\/b><span style=\"font-weight: 400;\">remains one of the many ways used by attackers to gather information about their targets. If you want to prevent dumpster diving criminals from getting any valuable company information, implement all the prevention tips discussed in this article.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Use a shredder to destroy all paperwork containing sensitive data and create adequate awareness by training your staff to prevent such an attack.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Organizations that want adequate security should go beyond &#8230;<\/p>\n","protected":false},"author":1,"featured_media":32730,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[204,290,199],"tags":[],"class_list":["post-27533","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is Dumpster Diving in Cybersecurity? | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Dumpster diving is just one efficient way cyberattackers gain information about victims.. Find out the details in this guide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/what-is-dumpster-diving-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Dumpster Diving in Cybersecurity?\" \/>\n<meta property=\"og:description\" content=\"Dumpster diving is just one efficient way cyberattackers gain information about victims.. Find out the details in this guide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/what-is-dumpster-diving-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-09T15:26:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-08T21:31:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/05\/What-is-Dumpster-Diving-in-Cybersecurity_-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"911\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dumpster-diving-in-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dumpster-diving-in-cybersecurity\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"What is Dumpster Diving in Cybersecurity?\",\"datePublished\":\"2022-05-09T15:26:16+00:00\",\"dateModified\":\"2025-05-08T21:31:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dumpster-diving-in-cybersecurity\\\/\"},\"wordCount\":1061,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dumpster-diving-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/What-is-Dumpster-Diving-in-Cybersecurity_-1.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dumpster-diving-in-cybersecurity\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dumpster-diving-in-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dumpster-diving-in-cybersecurity\\\/\",\"name\":\"What is Dumpster Diving in Cybersecurity? | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dumpster-diving-in-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dumpster-diving-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/What-is-Dumpster-Diving-in-Cybersecurity_-1.jpg\",\"datePublished\":\"2022-05-09T15:26:16+00:00\",\"dateModified\":\"2025-05-08T21:31:07+00:00\",\"description\":\"Dumpster diving is just one efficient way cyberattackers gain information about victims.. Find out the details in this guide.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dumpster-diving-in-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dumpster-diving-in-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dumpster-diving-in-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/What-is-Dumpster-Diving-in-Cybersecurity_-1.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/What-is-Dumpster-Diving-in-Cybersecurity_-1.jpg\",\"width\":1440,\"height\":911,\"caption\":\"Blue cover\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dumpster-diving-in-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"What is Dumpster Diving in Cybersecurity?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Dumpster Diving in Cybersecurity? | EasyDMARC","description":"Dumpster diving is just one efficient way cyberattackers gain information about victims.. Find out the details in this guide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/what-is-dumpster-diving-in-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"What is Dumpster Diving in Cybersecurity?","og_description":"Dumpster diving is just one efficient way cyberattackers gain information about victims.. Find out the details in this guide.","og_url":"https:\/\/easydmarc.com\/blog\/what-is-dumpster-diving-in-cybersecurity\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-05-09T15:26:16+00:00","article_modified_time":"2025-05-08T21:31:07+00:00","og_image":[{"width":1440,"height":911,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/05\/What-is-Dumpster-Diving-in-Cybersecurity_-1.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/what-is-dumpster-diving-in-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-dumpster-diving-in-cybersecurity\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"What is Dumpster Diving in Cybersecurity?","datePublished":"2022-05-09T15:26:16+00:00","dateModified":"2025-05-08T21:31:07+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-dumpster-diving-in-cybersecurity\/"},"wordCount":1061,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-dumpster-diving-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/05\/What-is-Dumpster-Diving-in-Cybersecurity_-1.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/what-is-dumpster-diving-in-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/what-is-dumpster-diving-in-cybersecurity\/","url":"https:\/\/easydmarc.com\/blog\/what-is-dumpster-diving-in-cybersecurity\/","name":"What is Dumpster Diving in Cybersecurity? | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-dumpster-diving-in-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-dumpster-diving-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/05\/What-is-Dumpster-Diving-in-Cybersecurity_-1.jpg","datePublished":"2022-05-09T15:26:16+00:00","dateModified":"2025-05-08T21:31:07+00:00","description":"Dumpster diving is just one efficient way cyberattackers gain information about victims.. Find out the details in this guide.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-dumpster-diving-in-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/what-is-dumpster-diving-in-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/what-is-dumpster-diving-in-cybersecurity\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/05\/What-is-Dumpster-Diving-in-Cybersecurity_-1.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/05\/What-is-Dumpster-Diving-in-Cybersecurity_-1.jpg","width":1440,"height":911,"caption":"Blue cover"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/what-is-dumpster-diving-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"What is Dumpster Diving in Cybersecurity?"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/05\/What-is-Dumpster-Diving-in-Cybersecurity_-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/27533","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=27533"}],"version-history":[{"count":1,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/27533\/revisions"}],"predecessor-version":[{"id":47409,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/27533\/revisions\/47409"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/32730"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=27533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=27533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=27533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}