Wednesday, July 24, 2024

You’ve been breached

 

So you’ve been breached

It’s easy to push aside news of a data breach; there are just so many, it’s all turned into white noise. The Change Healthcare hack alone exposed one-third of Americans. Spoiler: I alert you to a breach affecting Taylor Swift fans below.

So, what do you do if your data is exposed? Your No. 1 goal is to protect yourself from future scams.

Do these things right away

Make a list of your data that was exposed. Keep a document, Post-it, a note on your phone — whatever. Be suspicious of anyone who references it in an email or phone call to prove they’re legit. Say your home address was leaked and someone contacts you about an issue with your mortgage. Yep, it’s probably a scam.

Watch your money, honey. Update your PIN and banking login credentials. Even if they weren’t involved directly in the breach, hackers can use your personal info to access it. Keep an eye on your bank and credit card statements.

Freeze your credit. This will keep scammers from opening a credit card or loan in your name. Like setting up a fraud alert, you'll need to contact each of the three credit bureaus.

Crooks love to play the long game

They’ll wait until your guard is down and target you months after the initial breach.

  • Be wary of any email requests. Even if a request ends up being legit, it’s OK to take your time to figure it out. If it’s the first you’re hearing of something, it’s not urgent. Better safe than sorry.
  • Watch out for health care-related requests. If you receive an explanation of benefits (EOB) or a bill for services you didn't receive, contact your health care provider and insurance company right away.
  • If you get an out-of-the-blue message from an old friend, be extremely cautious. Hackers love to use your info to pose as friends or family.

Take these steps to protect yourself now, and share this with fam, friends and coworkers. Future you will thank you.

Friday, July 12, 2024

This Hack Will Rock You

 

The Cyber Shield 365/24/7

You might want to sit down for this one. Hackers posted a file named RockYou2024.txt to a dark web forum on July 4. The file includes a mind-numbing 9,948,575,739 passwords.

Wondering if this attack puts you at risk? Yup, it does. The RockYou2024 leak is made up of passwords from both old and new data breaches.

Give ‘em stuffin’ to talk about

Credential stuffing is no joke. This is when crooks take your leaked passwords and try to break into as many services, sites, accounts and apps as they can. They’re hoping you got lazy at least once and reused that password somewhere else.

Recent attacks on big names like Ticketmaster, Advance Auto Parts and Santander Bank were all the result of this technique. Any system that isn't protected against brute-force attacks is at risk, and this goes beyond smartphones and computers. Even internet-connected cameras and industrial equipment are on the hackable list.



What are your next steps?

If you have time, visit Cybernews' Leaked Password Checker to see if your passwords were exposed. HaveIBeenPwned is another option. Enter your email address into either one, and I’ll bet you’ll find yourself on the list.

Reset the passwords for every single account associated with those leaked passwords. Now, virtually shake my hand and promise me you won’t reuse your passwords — ever.

Your browser can help

Your browser’s password manager can alert you if your passwords have been involved in a breach. Here’s how to view or enable this feature in three popular browsers:

§  Google Chrome: Password alerts are enabled by default. If you think you might’ve missed one, head to Google’s Password Manager and run a Password Checkup.

§  Microsoft Edge: You’ll need to turn on Edge’s Password Monitor. To do this, go to Settings and more (the three-dot menu at the top right of your browser window) > Settings > Profiles > Passwords. Then, toggle on the switch for Show alerts when passwords are found in an online leak.

§  Apple Safari: Password monitoring is on by default for browsers running on MacOS 14 or iOS 14 and later. To check for alerts on your iPhone or Mac, and to update any compromised passwords, go to Settings > Passwords > Security Recommendations > Change Password on Website.




Oh, and this is important to remember: Any random two-factor authentification (2FA) codes you receive via email or text that you didn’t ask for could mean someone is trying to access your accounts.

I’m willing to bet just about everyone you know is impacted by this latest password dump. Do your loved ones a favor and use the buttons below to share these security tips.

 

Saturday, July 6, 2024

Cyber Security Best Practices

                             The Cyber Shield 365/24/7 



The digital literacy basics for everyday life and work

as a useful definition of the foundational digital skills everyone needs to 

navigate 21st-century life with ease. These include things like:

Being able to turn on a device

Connecting a device to a safe and secure Wi-Fi network

Searching online, and finding and using websites

Communicating with others using email and messaging apps

Setting up and using video calling platforms such as Skype, Zoom, 

and FaceTime

Sharing documents with others

Posting on social media

Understanding that passwords and personal information have value 

and need to be kept safe

Updating and changing passwords when necessary

Cyber security best practices for individuals and organizations.

Cyber security is not just a concern for governments and large corporations; it is equally crucial for individuals and small organizations. In today’s digital age, where cyber threats are constantly evolving, implementing best practices is essential to protect sensitive information and maintain data integrity. This article will discuss some of the top cyber security best practices that individuals and organizations should follow.

1. Strong and Unique Passwords: One of the simplest yet most effective ways to enhance cyber security is by using strong and unique passwords. Avoid using common passwords or personal information that can be easily guessed. Consider using a password manager to generate and securely store complex passwords.




2. Two-Factor Authentication: Enable two-factor authentication (2FA) whenever possible. This adds an extra layer of security by requiring a second verification step, such as a code sent to your mobile device, in addition to your password.

3. Regular Software Updates: Keeping all software and operating systems up to date is crucial. Software updates often include patches for known vulnerabilities, which hackers can exploit. Set up automatic updates to ensure that you are always running the latest versions.

4. Secure Wi-Fi Networks: Protect your home or office Wi-Fi network with a strong and unique password. Additionally, consider enabling network encryption, such as WPA2, to secure the communication between devices and the network.

5. Employee Training and Awareness: Organizations should prioritize cyber security training and awareness programs for their employees. This helps ensure that everyone understands the importance of following security protocols and recognizes potential threats like phishing emails or suspicious links.

6. Regular Data Backups: Regularly backing up important data is crucial in case of a cyber attack or data loss. Store backups on separate devices or in the cloud, and test the restoration process periodically to ensure the data can be recovered.

7. Firewalls and Antivirus Software: Install and regularly update firewalls and antivirus software on all devices. These security tools provide an additional layer of protection against malware, viruses, and other cyber threats.

8. Secure Web Browsing: Be cautious when browsing the internet. Avoid clicking on suspicious links or downloading files from untrusted sources. Use reputable web browsers and consider using browser extensions that provide additional security features.

By implementing these cyber security best practices, individuals and organizations can significantly reduce the risk of falling victim to cyber attacks and protect sensitive information from unauthorized access. Stay vigilant, stay informed, and stay secure!


Understanding Cyber Security Technology

Understanding Cyber Security Technology The cyber shield 365/24/7 In today’s digital age, cyber security technology plays a vital role in pr...