How are hackers accessing databases?
Cybercriminals have a number of ways to access large databases of information. Commonly, they use scams, phishing and ransomware. They also match queries with URLs, use obvious passwords and use software to exploit data with the click of a button.
But, these aren’t their only methods. Every day, cybercriminals are finding new ways to retrieve and sell data for personal gain. Take a look at 2019’s biggest data breaches and the impact that targets millions.
My information was found in a data breach. Now what?
Don’t panic. There are ways to protect your data and stop any further damage. Remember, to practice digital safety anytime you’re sharing or viewing information – whether it’s your laptop, phone or smart home devices.
- Check Have I Been Pwned to see if your email and password has been in a batch of data. This is also a good tool to use as you create new unique passwords to avoid using a risky one.
- Sign up for identity theft protection and monitoring services to get automatic alerts if your information is found in a hack or breach.
- Get a password manager to encrypt your login information and safely store all of your passwords. It also takes the worry out of remembering your login information or storing them in an easily hackable space.
- Freeze your credit across all three credit bureaus to prevent anyone from accessing your reports or opening accounts on your behalf.
- Only handle personal matters on a protected and trusted network. Remember to regularly change your password and never save it online.
- Use common online best practices including firewalls, protected networks, and beware of any scams.
Want to learn more about digital safety to protect your data? Check out our guides, tips and articles for advice from our experts. We’ll even help you find the best services and tools to help your family practice online safety just in time for the new year.