Cybersecurity is now crucial for protecting systems, networks and programs. Don’t risk identity theft, financial losses, and account takeovers caused by cyber criminals exploiting password leaks. Here are the best tactics to combat password breaches.
Hackers and thieves are ecstatic. This past July 2024, nearly 10 BILLION PASSWORDS- the largest compilation of unique passwords ever leaked- was posted on a popular hacking forum. Known as RockYou2024, this leaked list could lead to stolen identity, financial losses, and account takeovers for people all over the world. Are you a potential victim?
How To Know If You’ve Been Hacked
Here are some clues that your information has been compromised:
- You get signed out of your online accounts (social media, email, online banking).
- You cannot log in to accounts with your password anymore.
- You receive emails or texts about login attempts, password resets, or two-factor authentication (2FA) that you did not do.
- You see strange emails in your “Sent” folder- or maybe logins from mobile devices/locations you do not recognize.
- Friends/family have received strange email or social account messages from “you.”
- You receive data breach notifications from a service stating your personal information was leaked.
- There are suspicious charges on credit card or bank statements.
- You get spam emails, sometimes threatening or extorting you.
- There are insurance claims that you have not submitted, accounts you do not recognize, or co-signers you did not authorize.
- Lenders call you to check on loan inquiries you did not make.
- Incorrect employment history shows up on your credit report- possibly a fraudster using your identity to work illegally.
The first thing to do if you suspect that your account has been hacked, is to promptly change ALL your passwords. And make sure NOT to use the same password for all of your accounts.
How Do You Protect Your Passwords From Data Leaks?
Use strong unique passwords– different for each account. This prevents bad actors from using one hacked password to try to access your other accounts that use the same password. An example of a strong password is that it has more than10 characters, with upper and lower case letters, along with numbers and symbols. It must be difficult for someone to guess- with no obvious personal information or common words. (Don’t use 123456, Qwerty, Password or admin!!!)
Use multi-factor authentications (MFA). An extra layer of security is added with MFA- which requires a second form of verification (2FA)-text message, email, authentication app, etc.
Use a password manager that generates high-strength passwords. A secure password manager is a software application for a business or individual that stores MFA codes and auto fills them. Some best password manager apps are NordPass, Keeper, RoboForm, 1Password, or Norton.
Businesses must use strong encryption methods. Companies need to secure their data assets, to protect information from being seen by unauthorized persons. Encryption is applied to data being sent, data stored/at rest, and end-to-end across the entire data lifecycle. There are various data encryption techniques in current use- the 3 most widely used are Symmetric Encryption, Asymmetric Encryptions, and Hashing.
“The RockYou2024 breach is a wakeup call for individuals and organizations alike to reevaluate their cybersecurity strategies, emphasizing proactive measures over reactive responses.”
Anne Cutler, Cybersecurity Evangelist at Keeper Security.
These are some proactive tactics you can take to combat data breaches, weak passwords, and phishing attacks. Reevaluate your cybersecurity strategies, and keep your data safe.