How-to minimize the damage of a data breach

Approximately 68 private user records stolen per second every day.

No one can prevent a data breach from happening, and despite the recent improvements in internet security regulations, digital stores, social media and other service providers on the web do not take enough security measures to protect your data - only around 5% of all breached datasets had some type of encryption to protect user information. This means that once a website is breached and publicly leaked, most of user passwords are open for cyber criminals to use to access your accounts.

A good thing is that you can take some precautionary measures to prevent being immediately affected by data breaches. We at Breach Report urge you to share this practice with your friends and family. Here is a small guide on how to de-risk the consequences of financial and identity theft caused by a data breach.

01

Keep an eye out for breaches that affect you.
Subscribe to a monitoring service like Breach Report that compiles publicly shared data breaches and notifies users who have been found in new data dumps.

02

Use a password manager.
Services such as 1Password, Dashlane, or LastPass will keep all your password safe, encrypted, and protected. Also, it they allow to generate strong passwords and automatically enter them in to websites and apps.

03

Generate strong passwords.
If you prefer generating your own passwords make sure you use at least six characters (and the more characters, the stronger the password) that are a combination of letters, numbers and symbols (@, #, $, %, etc.) if allowed. Short numeric passwords and other quick methods of blocking can be bypassed, alphanumeric code is much safer. The most common digital password is 1234, which is the easiest to crack.

04

Use a unique password for every account.
If you use different passwords you will minimize the negative effect of data breaches. Once a hacker gains access to one of your accounts, they will not have access to any other of your other accounts.

05

Minimize the usage free Wi-Fi hotspots.
Try not to use public networks such as free Wi-Fi zones and do not perform any banking operations through them. Public networks are highly dangerous since a hacker can break into your session via free hotspot by cracking the router. He only needs to duplicate the traffic through a new port and all logins, passwords and data that you enter will pass through his server.

06

Use a VPN service on free Wi-Fi hotspots.
This is a good way to avoid some of the dangers lurking in public Wi-Fi networks: by redirecting your Internet surfing through an intermediary server.

07

Scan your network connections.
Download an app like Little Snitch that monitors your computer's outgoing network connections. It will notify you if your computer tries to send data to an unknown server - this is possibly a sign that your system has been compromised.

08

Enable internal firewall.
Firewall is necessary for the protection of the internal processes of your computer from potential external attacks and malware when you are connected to the internet. Check how to enable firewalls for Windows, MacOS, and Linux.

09

Do not open suspicious links.
When clicking on links sent to your emails, ads and social media pay attention to the link address to make sure that the address matches the URL you are trying to visit. Sometimes hackers substitute the address of the link, transferring the user to a malicious source to infect the computer with a virus and steal data.

10

Use two-factor authentication (2FA) anywhere possible.
Adding an extra layer of security with 2FA means that you will need to add another chunk of data to verify yourself when logging in to your accounts. Think of the verification code or fingerprint that is required when sending money via an e-banking app. 2FA requires a few more seconds to enter the desired account but it keeps you safe from theft, because even if someone gets a hold of your password they can’t access your private information and steal your money, unless they pass the second layer of identification.

11

Use an additional identification layer from another service.
Inform your bank, cable company, cell phone company and Internet service provider, to require a verification code, a password, or a fingerprint proof to confirm your identity. An additional step to accessing your data will make it harder to be stolen.

Searching,
please wait