The Times Australia
The Times World News

.

What do they have to do with your personal information, and how worried should you be?

  • Written by Merrill Warkentin, James J. Rouse Endowed Professor of Information Systems, Mississippi State University

The headlines are filled with news about ransomware attacks[1] tying up organizations large and small, data breaches[2] at major brand-name companies and cyberattacks[3] by shadowy hackers associated with Russia, China and North Korea. Are these threats to your personal information?

If it’s a ransomware attack on a pipeline company, probably not. If it’s a hack by foreign agents of a government agency, maybe[4], particularly if you’re a government employee. If it’s a data breach at a credit bureau, social media company or major retailer, very likely.

The bottom line is that your online data is not safe. Every week a new major data breach is reported[5], and most Americans have experienced some form of data theft[6]. And it could hurt you. What should you do?

Mildly annoyed or majorly aggrieved

First, was the latest digital crime a ransomware attack[7] or was it a data breach[8]? Ransomware attacks encrypt[9], or lock up, your programs or data files, but your data is usually not exposed, so you probably have nothing to worry about. If the target is a company whose services you use, you might be inconvenienced while the company is out of commission.

If it was a data breach, find out if your information has been exposed. You may have been notified[10] that your personal data was exposed. U.S. laws require companies to tell you if your data was stolen. But you can also check for yourself at haveibeenpwned.com[11].

A data breach could include theft of your online credentials[12]: your user name and password. But hackers might also steal your bank account or credit card numbers or other sensitive or protected information, such as your personal health information, your email address, phone number, street address or Social Security number.

Having your data stolen from a company can be scary, but it is also an opportunity to take stock and apply some common-sense measures to protect your data elsewhere. Even if your data has not been exposed yet, why not take the time now to protect yourself?

How bad is it?

As a cybersecurity scholar[13], I suggest that you make a risk assessment[14]. Ask yourself some simple questions, then take some precautions.

If you know your data was stolen, the most important question is what kind of data was stolen. Data thieves, just like car thieves, want to steal something valuable. Consider how attractive the data might be to someone else. Was it highly sensitive data that could harm you if it were in the wrong hands, like financial account records? Or was it data that couldn’t really cause you any problems if someone got hold of it? What information is your worst-case vulnerability if it were stolen? What could happen if data thieves take it?

Many e-commerce sites retain your purchase history, but not your credit card number, so ask yourself, did I authorize them to keep it on file? If you make recurring purchases from the site, such as at hotel chains, airlines and grocery stores, the answer is probably yes. Thieves don’t care about your seat preferences. They want to steal your credit card info or your loyalty rewards to sell on the black market[15].

What to do

A hand holds a smartphone showing a text message on the screen Two-factor authentication, which typically involves receiving a code in a text message, provides an extra layer of security in case your password is stolen. The Focal Project/Flickr, CC BY-NC[16][17]

If you haven’t already, set up two-factor authentication with all websites that store your valuable data. If data thieves stole your password, but you use two-factor authentication[18], then they can’t use your password to access your account.

It takes a little effort to enter that single-use code sent to your phone each time, but it does protect you from harm when the inevitable breach occurs. Even better, use an authentication app[19] rather than texting for two-factor authentication. This is especially critical for your bank and brokerage accounts. If you think your health-related information is valuable or sensitive, you should also take extra precautions with your health care provider’s website, your insurance company and your pharmacy.

If you used a unique password[20] instead of reusing a favorite password[21] you’ve used elsewhere, hackers can’t successfully use your credentials[22] to access your other accounts. One-third of users are vulnerable because they use the same password for every account[23].

Take this opportunity to change your passwords, especially at banks, brokerages and any site that retains your credit card number. You can record your unique passwords on a piece of paper hidden at home or in an encrypted file you keep in the cloud. Or you can download and install a good password manager[24]. Password managers encrypt passwords on your devices before they’re sent into the cloud, so your passwords are protected even if the password manager company is hacked.

If your credit card number was exposed, you should notify your bank. Now is a good time to set up mobile banking alerts[25] to receive notifications of unusual activity, big purchases and so on. Your bank may want to issue new cards with new numbers to you. That’s considerably less of a hassle than experiencing identity theft[26].

You should also consider closing old unused accounts so that the information associated with them is no longer available. Do you have a loyalty account with a hotel chain, restaurant or airline that you haven’t used in years and won’t use again? Close it. If you have a credit card with that company, make sure they report the account closure to the credit reporting agencies.

Now is a great time to check your credit reports from all three credit bureaus. Do you rarely apply for new credit and want to protect your identity? If so, freeze your credit[27]. Make sure to generate unique passwords and record them at home in case you need to unfreeze your credit later to apply for a loan. This will help protect you from some of the worst consequences of identity theft.

References

  1. ^ ransomware attacks (www.csoonline.com)
  2. ^ data breaches (www.kaspersky.com)
  3. ^ cyberattacks (theconversation.com)
  4. ^ maybe (abcnews.go.com)
  5. ^ a new major data breach is reported (www.gearbrain.com)
  6. ^ have experienced some form of data theft (www.pewresearch.org)
  7. ^ ransomware attack (www.techrepublic.com)
  8. ^ data breach (www.lifelock.com)
  9. ^ encrypt (www.cloudflare.com)
  10. ^ notified (privacyrights.org)
  11. ^ haveibeenpwned.com (haveibeenpwned.com)
  12. ^ credentials (www.pcmag.com)
  13. ^ cybersecurity scholar (www.misprofessor.us)
  14. ^ risk assessment (www.researchgate.net)
  15. ^ sell on the black market (theconversation.com)
  16. ^ The Focal Project/Flickr (flickr.com)
  17. ^ CC BY-NC (creativecommons.org)
  18. ^ two-factor authentication (authy.com)
  19. ^ authentication app (www.pcmag.com)
  20. ^ unique password (www.webroot.com)
  21. ^ favorite password (theconversation.com)
  22. ^ credentials (www.pcmag.com)
  23. ^ use the same password for every account (www.digicert.com)
  24. ^ password manager (www.wsj.com)
  25. ^ mobile banking alerts (www.thebalance.com)
  26. ^ experiencing identity theft (www.identitytheft.gov)
  27. ^ freeze your credit (www.consumer.ftc.gov)

Read more https://theconversation.com/ransomware-data-breach-cyberattack-what-do-they-have-to-do-with-your-personal-information-and-how-worried-should-you-be-162404

Times Magazine

DIY Is In: How Aussie Parents Are Redefining Birthday Parties

When planning his daughter’s birthday, Rich opted for a DIY approach, inspired by her love for drawing maps and giving clues. Their weekend tradition of hiding treats at home sparked the idea, and with a pirate ship playground already chosen as t...

When Touchscreens Turn Temperamental: What to Do Before You Panic

When your touchscreen starts acting up, ignoring taps, registering phantom touches, or freezing entirely, it can feel like your entire setup is falling apart. Before you rush to replace the device, it’s worth taking a deep breath and exploring what c...

Why Social Media Marketing Matters for Businesses in Australia

Today social media is a big part of daily life. All over Australia people use Facebook, Instagram, TikTok , LinkedIn and Twitter to stay connected, share updates and find new ideas. For businesses this means a great chance to reach new customers and...

Building an AI-First Culture in Your Company

AI isn't just something to think about anymore - it's becoming part of how we live and work, whether we like it or not. At the office, it definitely helps us move faster. But here's the thing: just using tools like ChatGPT or plugging AI into your wo...

Data Management Isn't Just About Tech—Here’s Why It’s a Human Problem Too

Photo by Kevin Kuby Manuel O. Diaz Jr.We live in a world drowning in data. Every click, swipe, medical scan, and financial transaction generates information, so much that managing it all has become one of the biggest challenges of our digital age. Bu...

Headless CMS in Digital Twins and 3D Product Experiences

Image by freepik As the metaverse becomes more advanced and accessible, it's clear that multiple sectors will use digital twins and 3D product experiences to visualize, connect, and streamline efforts better. A digital twin is a virtual replica of ...

The Times Features

Whole House Water Filters: Essential or Optional for Australian Homes?

Access to clean, safe water is something most Australians take for granted—but the reality can be more complex. Our country’s unique climate, frequent droughts, and occasional ...

How Businesses Turn Data into Actionable Insights

In today's digital landscape, businesses are drowning in data yet thirsting for meaningful direction. The challenge isn't collecting information—it's knowing how to turn data i...

Why Mobile Allied Therapy Services Are Essential in Post-Hospital Recovery

Mobile allied health services matter more than ever under recent NDIA travel funding cuts. A quiet but critical shift is unfolding in Australia’s healthcare landscape. Mobile all...

Sydney Fertility Specialist – Expert IVF Treatment for Your Parenthood Journey

Improving the world with the help of a new child is the most valuable dream of many couples. To the infertile, though, this process can be daunting. It is here that a Sydney Fertil...

Could we one day get vaccinated against the gastro bug norovirus? Here’s where scientists are at

Norovirus is the leading cause[1] of acute gastroenteritis outbreaks worldwide. It’s responsible for roughly one in every five cases[2] of gastro annually. Sometimes dubbed ...

Does running ruin your knees? And how old is too old to start?

You’ve probably heard that running is tough on your knees – and even that it can cause long-term damage. But is this true? Running is a relatively high-impact activity. Eve...