Mother of all breaches: Now What?
What should you do when everyone's names, emails, and passwords are easily accessible to malicious actors, data brokers, or services in one place? Yes, I'm referring to every person in the world with an online account.
On January 23rd, security researchers discovered a massive data breach file compiled from thousands of previous breaches. This file contained 26 billion records, including data from major companies like Tencent, Weibo, MySpace, Twitter, LinkedIn, Zynga, Adobe, and government organizations from various countries. Remarkably, only 30% of this data is new.
To put this into perspective, the world has 8 billion people, yet this breach list comprises 26 billion records. In 2023 alone, over two thousand breaches occurred, affecting 234 million victims. This frequency and scale of data breaches are unprecedented, making it easier for hackers to exploit this information.
As a consumer, it's challenging to know how to react. Despite changing passwords frequently, using multi-factor authentication, employing password managers, monitoring for dark web activity, subscribing to identity protection services, using VPNs for sensitive websites, and avoiding suspicious emails and links, the threat remains. Our data, even when entrusted to companies making their best efforts to protect it, is still vulnerable.
领英推荐
On top of the basic safety guidelines I mentioned above, I plan to use additional proactive strategies:
We find ourselves in a relentless battle to safeguard our digital identities. It's a solitary struggle, but by utilizing every tool at our disposal, we can fortify our defenses against the inevitable breaches of our online personal information. Let's stay vigilant and empowered in this digital age.
Baker, thanks for sharing!
Principle Software Architect
10 个月Baker’s first and second recommendations go together. A password manager usually provides a password generation tool so that passwords can be unique and be at the upper limits of character length with additional character types when possible. Remember that passwords are the worse method of proving identity. Always use MFA when possible and consider moving to a different service if they do not provide MFA.
Principle Software Architect
10 个月I would also recommend services that provide individuals with cybersecurity intelligence services like those found in applications like ID Watchdog and NordPass. Many other applications provide this service which is used to determine how individuals are impacted by a breach and some basic guidance and what to do as a result of the breach.