{"id":10772,"date":"2017-12-08T08:45:02","date_gmt":"2017-12-08T16:45:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/12\/08\/news-4544\/"},"modified":"2017-12-08T08:45:02","modified_gmt":"2017-12-08T16:45:02","slug":"news-4544","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/12\/08\/news-4544\/","title":{"rendered":"How to Protect Yourself After the Next Big Corporate Hack"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5a29a08c15e73c599bf953fc\/master\/pass\/SecurityVideo-CorporateHack-FINAL.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Fri, 08 Dec 2017 12:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">At this point, <\/span>it&#x27;s safe to assume that everyone&#x27;s been affected by one megabreach or another. But when the next Equifax debacle happens, know that there&#x27;s plenty you can do to help dampen the fallout.<\/p>\n<p>When a big company that has your personal information\u2014like passwords or credit card numbers\u2014gets hacked, it means, in a way, that you got hacked too. At the very least, it means some of your most sensitive information out there in the ether, just waiting for a hacker or identity thief to make your life miserable.<\/p>\n<p>The most frustrating part of these breaches, whether they affect 70 million people like the <a href=\"https:\/\/www.wired.com\/2014\/01\/target-hack\/\">2014 Target hack<\/a>, 143 million, like the <a href=\"https:\/\/www.wired.com\/story\/how-to-protect-yourself-from-that-massive-equifax-breach\/\">recent Equifax bungle<\/a>, 500 million, like a <a href=\"https:\/\/www.wired.com\/2016\/09\/hack-brief-yahoo-looks-set-confirm-big-old-data-breach\/\">Yahoo hack<\/a> disclosed last year, or <a href=\"https:\/\/www.wired.com\/story\/yahoo-breach-three-billion-accounts\/\"><em>three billion<\/em> people<\/a>, like \u2026 yet another Yahoo attack, is that there\u2019s nothing you can do to prevent them, other than becoming an internet hermit, so that no one has your info in the first place.<\/p>\n<p>As nice as that sounds, it\u2019s also totally impractical. But don\u2019t give up hope! While there&#x27;s only so much you can do, the options available to you can make a big difference.<\/p>\n<p>First, confirm if you\u2019ve been directly impacted. For the biggest breaches, like Equifax, companies will often set up a dedicated website that crosschecks your info against impacted accounts. (Unlike Equifax, they usually don&#x27;t <a href=\"https:\/\/www.wired.com\/story\/equifax-breach-response\/\">screw it up<\/a> to an alarming degree.)<\/p>\n<p>You should also check out a site called <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\">HaveIBeenPwned<\/a>, and yes that\u2019s the real name. Security researcher Troy Hunt has made it his mission to collect info from as many breaches as possible; so far it\u2019s logged nearly five <em>trillion<\/em> accounts.<\/p>\n<p>HaveIBeenPwned shows you not just if you\u2019ve been impacted, but the specific <em>type<\/em> of information that may have been exposed. That way you&#x27;ll know if it&#x27;s time to change your password, or cancel your credit cards, or both.<\/p>\n<p>Speaking of which: If your info was caught up in a breach, change your passwords not just for whichever company or service leaked them, but anywhere else you might reuse it. And speaking of <em>that:<\/em> <a href=\"https:\/\/www.wired.com\/2016\/05\/password-tips-experts\/\">Don\u2019t reuse passwords<\/a>. <a href=\"https:\/\/www.wired.com\/2016\/01\/you-need-a-password-manager\/\">Get a password manager<\/a> instead.<\/p>\n<p>If the breach potentially includes extra-sensitive information, like credit card or <a href=\"https:\/\/www.wired.com\/story\/the-equifax-breach-exposes-americas-identity-crisis\/\">Social Security numbers<\/a>, companies sometimes offer free credit monitoring for a year, maybe more. Go ahead and sign up for that; it\u2019ll help you act fast in the event that someone uses your info to try to open a credit account in your name. Just remember that the threat doesn\u2019t fade after the free monitoring does, especially in the most dramatic cases. Pilfered data can float around the dark web for years. And Social Security numbers aren\u2019t like passwords; they\u2019re really hard to change. So keep a close eye on your bank accounts, basically&#8230; forever.<\/p>\n<p>In fact, the most galling part of all of this is that you should probably be doing that sort of monitoring anyway; large companies are notoriously slow to fully disclose breaches. <a href=\"https:\/\/www.wired.com\/story\/uber-paid-off-hackers-to-hide-a-57-million-user-data-breach\/\">Uber even paid off hackers<\/a> to hide a 57 million user breach for a full year.<\/p>\n<p>Breaches are frustrating and scary, but also so common these days that it\u2019s easy to just throw up your hands. But it\u2019s worth a little vigilance to help stave off the serious headaches that having your identity stolen, or accounts taken over, would cause.<\/p>\n<p class=\"related-cne-video-component__dek\">The only way to be truly secure on Facebook is to delete your account. But that&#39;s crazy talk! Here&#39;s how to lock down your privacy and security and bonus, keep targeted ads at bay.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/how-to-protect-yourself-after-the-next-big-corporate-hack\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5a29a08c15e73c599bf953fc\/master\/pass\/SecurityVideo-CorporateHack-FINAL.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Fri, 08 Dec 2017 12:00:00 +0000<\/strong><\/p>\n<p>The next megabreach is coming. Here&#8217;s how you can cope if and when your info gets swept up.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-10772","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10772"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10772\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10772"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}