The Times Australia
The Times World News

.

What do they have to do with your personal information, and how worried should you be?

  • Written by Merrill Warkentin, James J. Rouse Endowed Professor of Information Systems, Mississippi State University

The headlines are filled with news about ransomware attacks[1] tying up organizations large and small, data breaches[2] at major brand-name companies and cyberattacks[3] by shadowy hackers associated with Russia, China and North Korea. Are these threats to your personal information?

If it’s a ransomware attack on a pipeline company, probably not. If it’s a hack by foreign agents of a government agency, maybe[4], particularly if you’re a government employee. If it’s a data breach at a credit bureau, social media company or major retailer, very likely.

The bottom line is that your online data is not safe. Every week a new major data breach is reported[5], and most Americans have experienced some form of data theft[6]. And it could hurt you. What should you do?

Mildly annoyed or majorly aggrieved

First, was the latest digital crime a ransomware attack[7] or was it a data breach[8]? Ransomware attacks encrypt[9], or lock up, your programs or data files, but your data is usually not exposed, so you probably have nothing to worry about. If the target is a company whose services you use, you might be inconvenienced while the company is out of commission.

If it was a data breach, find out if your information has been exposed. You may have been notified[10] that your personal data was exposed. U.S. laws require companies to tell you if your data was stolen. But you can also check for yourself at haveibeenpwned.com[11].

A data breach could include theft of your online credentials[12]: your user name and password. But hackers might also steal your bank account or credit card numbers or other sensitive or protected information, such as your personal health information, your email address, phone number, street address or Social Security number.

Having your data stolen from a company can be scary, but it is also an opportunity to take stock and apply some common-sense measures to protect your data elsewhere. Even if your data has not been exposed yet, why not take the time now to protect yourself?

How bad is it?

As a cybersecurity scholar[13], I suggest that you make a risk assessment[14]. Ask yourself some simple questions, then take some precautions.

If you know your data was stolen, the most important question is what kind of data was stolen. Data thieves, just like car thieves, want to steal something valuable. Consider how attractive the data might be to someone else. Was it highly sensitive data that could harm you if it were in the wrong hands, like financial account records? Or was it data that couldn’t really cause you any problems if someone got hold of it? What information is your worst-case vulnerability if it were stolen? What could happen if data thieves take it?

Many e-commerce sites retain your purchase history, but not your credit card number, so ask yourself, did I authorize them to keep it on file? If you make recurring purchases from the site, such as at hotel chains, airlines and grocery stores, the answer is probably yes. Thieves don’t care about your seat preferences. They want to steal your credit card info or your loyalty rewards to sell on the black market[15].

What to do

A hand holds a smartphone showing a text message on the screen Two-factor authentication, which typically involves receiving a code in a text message, provides an extra layer of security in case your password is stolen. The Focal Project/Flickr, CC BY-NC[16][17]

If you haven’t already, set up two-factor authentication with all websites that store your valuable data. If data thieves stole your password, but you use two-factor authentication[18], then they can’t use your password to access your account.

It takes a little effort to enter that single-use code sent to your phone each time, but it does protect you from harm when the inevitable breach occurs. Even better, use an authentication app[19] rather than texting for two-factor authentication. This is especially critical for your bank and brokerage accounts. If you think your health-related information is valuable or sensitive, you should also take extra precautions with your health care provider’s website, your insurance company and your pharmacy.

If you used a unique password[20] instead of reusing a favorite password[21] you’ve used elsewhere, hackers can’t successfully use your credentials[22] to access your other accounts. One-third of users are vulnerable because they use the same password for every account[23].

Take this opportunity to change your passwords, especially at banks, brokerages and any site that retains your credit card number. You can record your unique passwords on a piece of paper hidden at home or in an encrypted file you keep in the cloud. Or you can download and install a good password manager[24]. Password managers encrypt passwords on your devices before they’re sent into the cloud, so your passwords are protected even if the password manager company is hacked.

If your credit card number was exposed, you should notify your bank. Now is a good time to set up mobile banking alerts[25] to receive notifications of unusual activity, big purchases and so on. Your bank may want to issue new cards with new numbers to you. That’s considerably less of a hassle than experiencing identity theft[26].

You should also consider closing old unused accounts so that the information associated with them is no longer available. Do you have a loyalty account with a hotel chain, restaurant or airline that you haven’t used in years and won’t use again? Close it. If you have a credit card with that company, make sure they report the account closure to the credit reporting agencies.

Now is a great time to check your credit reports from all three credit bureaus. Do you rarely apply for new credit and want to protect your identity? If so, freeze your credit[27]. Make sure to generate unique passwords and record them at home in case you need to unfreeze your credit later to apply for a loan. This will help protect you from some of the worst consequences of identity theft.

References

  1. ^ ransomware attacks (www.csoonline.com)
  2. ^ data breaches (www.kaspersky.com)
  3. ^ cyberattacks (theconversation.com)
  4. ^ maybe (abcnews.go.com)
  5. ^ a new major data breach is reported (www.gearbrain.com)
  6. ^ have experienced some form of data theft (www.pewresearch.org)
  7. ^ ransomware attack (www.techrepublic.com)
  8. ^ data breach (www.lifelock.com)
  9. ^ encrypt (www.cloudflare.com)
  10. ^ notified (privacyrights.org)
  11. ^ haveibeenpwned.com (haveibeenpwned.com)
  12. ^ credentials (www.pcmag.com)
  13. ^ cybersecurity scholar (www.misprofessor.us)
  14. ^ risk assessment (www.researchgate.net)
  15. ^ sell on the black market (theconversation.com)
  16. ^ The Focal Project/Flickr (flickr.com)
  17. ^ CC BY-NC (creativecommons.org)
  18. ^ two-factor authentication (authy.com)
  19. ^ authentication app (www.pcmag.com)
  20. ^ unique password (www.webroot.com)
  21. ^ favorite password (theconversation.com)
  22. ^ credentials (www.pcmag.com)
  23. ^ use the same password for every account (www.digicert.com)
  24. ^ password manager (www.wsj.com)
  25. ^ mobile banking alerts (www.thebalance.com)
  26. ^ experiencing identity theft (www.identitytheft.gov)
  27. ^ freeze your credit (www.consumer.ftc.gov)

Read more https://theconversation.com/ransomware-data-breach-cyberattack-what-do-they-have-to-do-with-your-personal-information-and-how-worried-should-you-be-162404

Times Magazine

Building a Strong Online Presence with Katoomba Web Design

Katoomba web design is more than just creating a website that looks good—it’s about building an online presence that reflects your brand, engages your audience, and drives results. For local businesses in the Blue Mountains, a well-designed website a...

September Sunset Polo

International Polo Tour To Bridge Historic Sport, Life-Changing Philanthropy, and Breath-Taking Beauty On Saturday, September 6th, history will be made as the International Polo Tour (IPT), a sports leader headquartered here in South Florida...

5 Ways Microsoft Fabric Simplifies Your Data Analytics Workflow

In today's data-driven world, businesses are constantly seeking ways to streamline their data analytics processes. The sheer volume and complexity of data can be overwhelming, often leading to bottlenecks and inefficiencies. Enter the innovative da...

7 Questions to Ask Before You Sign IT Support Companies in Sydney

Choosing an IT partner can feel like buying an insurance policy you hope you never need. The right choice keeps your team productive, your data safe, and your budget predictable. The wrong choice shows up as slow tickets, surprise bills, and risky sh...

Choosing the Right Legal Aid Lawyer in Sutherland Shire: Key Considerations

Legal aid services play an essential role in ensuring access to justice for all. For people in the Sutherland Shire who may not have the financial means to pay for private legal assistance, legal aid ensures that everyone has access to representa...

Watercolor vs. Oil vs. Digital: Which Medium Fits Your Pet's Personality?

When it comes to immortalizing your pet’s unique personality in art, choosing the right medium is essential. Each artistic medium, whether watercolor, oil, or digital, has distinct qualities that can bring out the spirit of your furry friend in dif...

The Times Features

How much money do you need to be happy? Here’s what the research says

Over the next decade, Elon Musk could become the world’s first trillionaire[1]. The Tesla board recently proposed a US$1 trillion (A$1.5 trillion) compensation plan, if Musk ca...

NSW has a new fashion sector strategy – but a sustainable industry needs a federally legislated response

The New South Wales government recently announced the launch of the NSW Fashion Sector Strategy, 2025–28[1]. The strategy, developed in partnership with the Australian Fashion ...

From Garden to Gift: Why Roses Make the Perfect Present

Think back to the last time you gave or received flowers. Chances are, roses were part of the bunch, or maybe they were the whole bunch.   Roses tend to leave an impression. Even ...

Do I have insomnia? 5 reasons why you might not

Even a single night of sleep trouble can feel distressing and lonely. You toss and turn, stare at the ceiling, and wonder how you’ll cope tomorrow. No wonder many people star...

Wedding Photography Trends You Need to Know (Before You Regret Your Album)

Your wedding album should be a timeless keepsake, not something you cringe at years later. Trends may come and go, but choosing the right wedding photography approach ensures your ...

Can you say no to your doctor using an AI scribe?

Doctors’ offices were once private. But increasingly, artificial intelligence (AI) scribes (also known as digital scribes) are listening in. These tools can record and trans...