Cyber Security: Online Breaches Cyber security attacks vary over the scope and severity of consequence of their action: from obtaining users' personal information, to attacking critical national infrastructure and obtaining companies' proprietary data. Millions of records containing email adresses, date of birth, address, and passwords get stolen from the data bases of companies and shared on the internet every year. The 'Dark Web' sells information that criminals can use to access your accounts - and if a security breach (stolen data) occurs with one company you need to act swiftly to prevent criminals using that data to access other accounts and to be on the look out for phishing attempts. Attacking online identitiesThese attacks may well have compromised your data: Adobe Systems Breach (2013)
Instagram Breach 2019
Facebook Breach 2019
Ecuador (whole population)!
It is therefore a good idea not to use just one simple password for everything and to regularly change your passwords. There is plenty of advice on the web for creating strong passwords - but generally they should contain a mixture of upper and lower case letters, some numbers and symbols. You may get informed by the company concerned if a data breach occurs, and asked to change your password - but there is a very useful site that will inform you of security breeches that contain your email even if the company does not inform you. You can check and see whether your account has been part of a reported data breach that included your email address by visiting:
Is my password 'out there' on the Dark Web?You can also use this site to check whether a password that you use has also been found in a data breach visit.
Security Breaches - Companies InvolvedThe site also allows you to see which companies have suffered data security losses and when the breach occured. Listed in alphabetical order, you are sure to find some company you are associated with - from Adobe to Facebook, Ancestry.co.uk to Sony.... hundreds of major breaches of data are listed. Industrial EspionageMost 'hacks' are not concerned with 'Joe Public' - those are for minor cyber criminals - but rather to hack into company files, to steal secrets or hobble the company on the world stage. See Attacking Industrial Systems
|
|