Acting Smart With Your Phone: Steps After a Data Breach
Data breaches are a constant threat. Cybercriminals are finding new ways to gather personal information such as: names, addresses, emails, phone numbers and even Social Security numbers or financial information. Here we take a look at a recent data breach and offer steps to take after a compromise.
Recent Breach in the News:
Major corporations are not immune to hackers. Just this month, a cyberattack on AT&T compromised approximately 110 million customers’ information. Phone records of nearly all their users from May 2022 through October 2022 and January 2023 were unlawfully accessed. Although AT&T stated that the content of the calls or texts were not exposed, it is possible to link phone numbers and names online.
How to Protect Yourself:
Our smartphones store our most sensitive information, that’s why mobile device attacks account for more than 60% of digital fraud. Take the initiative to protect your information. Here are some easy steps that can help minimize your risk:
- Verify the Breach Is Real: Phishing remains one of the most popular ways to compromise data. Scammers like to create a sense of urgency that cause you to act fast without thinking. Do not click suspicious links claiming a breach. Instead of clicking the link, directly open the company’s webpage to ensure you are visiting a trusted site.
- Secure Your Password: It seems too simple to be true, but a unique password is one of the most beneficial ways to secure yourself. According to a Google poll, more than half of Americans reuse their passwords across platforms. That means once one site is breached, a hacker can try your password to gain access to your information on different sites.
- Enable MFA: Multi-factor Authorization is an added layer of protection. It requires a code verification via your phone or email in addition to your password. This extra step is a tough barrier for a hacker to bypass.
- Monitor Your Accounts: Regularly review your account statements for unauthorized activity. Of course, if something is out of the ordinary make sure to report it as soon as possible.
Cybersecurity is a shared responsibility. Businesses must prioritize robust security measures, while employees need to practice cyber safety every day. Contact us at [email protected] to find out how else we can help you protect information.