top of page

360 TECH Talk: Responding to a Breach Notification


responding to a breach

Data breaches are becoming more common every day, with a new breach being discovered weekly (BetMGM, Toyota, WhatsApp, and Twitter just this month) or new data records released. What does that mean for you, and what are you supposed to do about it? According to an article on BleepingComputer, the email addresses of over 200 million Twitter users were allegedly leaked online. The source of the leak is currently unknown, and it is not clear if any other sensitive information was also compromised during this breach. Additionally, Toyota recently suffered a data breach, with no current reports showing its effect on any US-based customers. Conversely, a data leak effecting WhatsApp reportedly exposed the phone numbers and user IDs of approximately 4.2 million users. It is not yet clear how the leak occurred or who may have been responsible but this type of leak effects clients directly. WhatsApp has stated that the leak did not compromise users' messages or other personal information. When a data breach occurs, the spectrum of what that breach is and what information is involved or compromised, isn't always clear. Here are our recommendations to guide you through the fog of the unknown: If you are a user of a company involved in a data breach, and are concerned about the leak of your email address or other PII, there are a few steps you can take to protect yourself:

  1. Change your password: If you use the same password for multiple accounts, it is especially important to change your password for not only your effected account, but any other accounts it applies. Lastly, create a strong, unique password for each of your accounts.

  2. Enable two-factor authentication: This adds an extra layer of protection to your account by requiring you to enter a code sent to your phone or email in addition to your password when logging in.

  3. Be cautious of phishing scams: After a data leak, it is common for scammers to send out fake emails claiming to be from the company whose data was leaked. These can include asking you to click on a link or enter your login information. Do not click on any links or enter your login information unless you are certain the request is legitimate.

  4. Monitor your accounts for suspicious activity: Keep an eye on your accounts for any unusual activity, such as login attempts from unfamiliar locations or changes to your account settings that you did not make. If you notice anything out of the ordinary, change your password and contact the 360 Privacy for assistance.


In conclusion, the rising frequency of data breaches, as exemplified by recent incidents involving BetMGM, Toyota, WhatsApp, and Twitter, underscores the pressing need for individuals to proactively protect their personal information. The BleepingComputer article highlights a substantial leak of email addresses of over 200 million Twitter users, with an undisclosed source, leaving the extent of potential compromise uncertain. Toyota's breach, while lacking reported effects on US-based customers, adds to the growing list of incidents. Conversely, a WhatsApp data leak exposed the phone numbers and user IDs of 4.2 million users, though the company asserts no compromise of messages or additional personal information.


Navigating the aftermath of such breaches demands user vigilance and strategic actions. Recommendations include changing passwords, especially if reused across multiple accounts, and implementing strong, unique passwords for each. Two-factor authentication serves as an additional safeguard, requiring a secondary code for account access. Awareness of phishing scams is crucial, as scammers may exploit data leaks to send fraudulent emails, attempting to deceive recipients into divulging sensitive information. Monitoring accounts for suspicious activities and promptly addressing any anomalies, such as unfamiliar logins or unauthorized changes, further fortifies individual defenses against potential threats. In a landscape where data breaches are becoming increasingly prevalent, these proactive measures are essential for safeguarding personal information and maintaining digital security.


Comments


bottom of page