4 Steps to Securing your Personal Data After a Breach


Protecting your personal data is a growing concern in our society. There is news of cyber attacks and data leaks being reported constantly and we are all potential victims.


Take the recent LinkedIn data breach for example, 92% of users on the platform were affected by that breach. While it is a terrifying reality that data breaches like this are projected to only increase, rest assured that there ARE steps you can take to keep your personal data as secure as possible.


Follow these 4 steps to secure your data in the event of a data breach:


1.       Be in the Know

Stay informed by consuming cyber news from a trusted source. The sooner you know of data breach, the sooner you can act.


2.       React Quickly

Be quick to react. As soon as you learn of a reported cyber attack against any organization you have an account with, begin to research to determine if you were affected by the breach and what type of data was leaked. http://www.haveibeenpwned.com is a great resource for this, you simply enter your email address to view a report of data breaches containing that email with a brief description of the information that was leaked. Do keep in mind that data breaches are not immediately updated, so if it is a new report, it may not appear on the site.

If you determine that log-in credentials were not released, we recommend you still change your passwords out of precaution. If you are using a password manager, you can autogenerate the new password to make sure it is as secure as possible!


3.       Take Action Depending on the Type of Data Leaked

As a rule, always update log-in credentials such as passwords in the event of a data leak. Other actions taken will depend on the type of information that was released. Reference the graphic below as a guide on what you may need monitor or update.

Image title

4.       Be Prepared

Not all cybercriminals will use your data for harm immediately after at attack, some may even wait years. However, continued cyber hygiene can help you to be prepared. The more information about you that is released online, the more criminals will know and they will likely use that information to create sophisticated phishing attempts. Knowing how to detect a phishing scheme and monitoring your credit are wise practices in protecting your data.


 


 








ReplyForward















Sign Up for Our E-Newsletter

Every month, we'll send you our latest blogs, news and announcements.

News & Articles

Howard University suffers cyberattack, suspends online classes in aftermath

The university suffered a ransomware attack, however there is no evidence so far of data being accessed or stolen. The post Howard University suffers cyberattack, suspends online classes in...

Read More

ProtonMail forced to log user’s IP address after an order from Swiss authorities

Following the incident the company has updated its website and privacy policy to clarify its legal obligations to its userbase The post ProtonMail forced to log user’s IP address after...

Read More

BladeHawk group: Android espionage against Kurdish ethnic group

ESET researchers have investigated a targeted mobile espionage campaign against the Kurdish ethnic group, and that has been active since at least March 2020. The post BladeHawk group: Androi...

Read More
 

Call or Text

1-833-YOUR PCA

Business texting is possible with VoIP. Learn more today!

Nashville Virtual Office

Main Office

12824 Cantrell Road, Suite 200
Little Rock, AR 72223
View on a map

Bentonville Office

Grit Studios
125 West Central Avenue, Suite 200
Bentonville, Arkansas 72712
View on a map

How can we help your business?

Top