Do you know someone who uses the same username across multiple social media sites? What about friends that share their personal information with anyone in the world by not securing their online profiles? Attackers commonly gather data from victim profiles prior to attacking them with phishing emails, identity theft attempts and other cyber attacks. We will look at common techniques attackers use to gain access to personal information and how, upon aggregation, that bit of data about a target that may be scattered across many websites becomes much more useful. Finally, we will discuss method of making it more difficult for attackers to execute these techniques on you, your family and your friends.