Been hacked? Here’s how to regain control of your personal data

In the first half of the year, there have been 1,571 breaches impacting customers’ personal data from the likes of AT&T. This represents a 14% increase over the same period last year, continuing year-over-year trends of increased security concerns as even more of our data lands in the wrong hands. 

Most recently, a background-check company called Jericho Pictures, also doing business as National Public Data (NPD), has made headlines for being a part of one of the biggest data leaks in history. The personal information of nearly three billion people—including Social Security numbers, emails, addresses, phone numbers, relatives, physical addresses, and more—has made its way to the dark web.  

While this is yet again another wake-up call for individuals and organizations to rethink how we share and gather personal data, it’s not the data itself that is the issue. It’s the fact that massive data aggregators like NPD are sitting on trillions, if not quadrillions, of pieces of our personal data without the guardrails in place to sufficiently keep it—or us—secure from the ever-growing sophistication of today’s hackers.   

Look everywhere

With so much information in the wild, there’s a real chance your personal data from accounts and devices could be hacked, even in your “secure” work environment. Perhaps you’re already seeing suspicious bank transactions, unapproved software downloads, increased spam, outgoing phone calls you didn’t make, or two-way authentications you didn’t request. If so, take immediate steps to start minimizing the damage and regain control of your personal information with the following actions:  

Update

Immediately replace passwords on critical accounts such as Gmail, Apple, banking, and travel with strong alternatives. These don’t have to be complicated, but should be long and unique to each account. Ensure operating systems are updated to minimize vulnerabilities and maximize security while editing account recovery options for added protection.   

Report

Warn those around you who may be impacted by the hack, such as friends, family, and colleagues, that your email or other personal information has been compromised and not to respond to suspicious activities. For financial concerns, let your bank or credit card provider know. Close jeopardized accounts and freeze your credit activity for a few months (if not permanently) until you’re looking to open a new credit card or utilize a credit score. Don’t forget to file a report with the Federal Trade Commission (FTC) to help fight any fraudulent charges.  

Scan

Use anti-virus or anti-malware programs to scan and remove any malicious software that may have been installed on your devices. Run a credit check to ensure your personal data isn’t used to secure credit cards or large purchases. Then regularly check for unauthorized activity and repeat the above steps if any is found.   

Secure

Make your devices and systems less susceptible to hacking by enabling two-factor authentication (2FA). Add a password to your home router and consider setting up a guest Wi-Fi to minimize your risk. In addition, find out where your personal data exists publicly and start to remove access to it.  

Continue taking proactive measures 

Unfortunately, until legislation, corporations, and new technologies make privacy a priority, breaches will continue. Our data will be hacked, leaked to the highest bidder and, most likely, used against us. So it is up to us to take steps to mitigate the risk data breaches cause and to protect ourselves and our families from the personal, financial, and professional fallout they bring. 

If you’ve avoided being hacked up to this point, consider taking proactive measures to stay ahead of the nightmare and inevitable next breach.

Start by sharing less.

  • Think twice before you give the new restaurant or store your telephone or email.
  • Ask yourself if it is necessary, then get comfortable with saying “no.”
  • Read privacy policies.
  • Object to cookies.
  • Don’t agree to the collection of your data when given the chance. 

Consider using password managers, VPNs, and alternative digital identities in place of your real details. This will protect your digital footprint and improve your privacy instantly by poisoning the well of personal data being collected on you by data brokers and aggregators.

Doing this, while deleting the information that is already out there, will make your data indecipherable and untraceable to you over time.

If you want to take it a step further, invest in identity-theft insurance to ensure you’re covered if your data becomes compromised. 

A privacy-first mindset can be your solution to finding comfort in an increasingly insecure world. Read the fine print. Make sure you’re aware of how your data is being used and take the time to build simple, new habits that can help mitigate the risks for you and your family.   

https://www.fastcompany.com/91177510/been-hacked-heres-how-to-regain-control-of-your-personal-data?partner=rss&utm_source=rss&utm_medium=feed&utm_campaign=rss+fastcompany&utm_content=rss

созданный 11mo | 23 авг. 2024 г., 10:50:07


Войдите, чтобы добавить комментарий

Другие сообщения в этой группе

Is ChatGPT making us stupid? Depends on how it’s used

Back in 2008, The Atlantic sparked controversy with a provocative cover story: “Is Google

27 июл. 2025 г., 08:50:07 | Fast company - tech
LinkedIn’s Aneesh Raman says the career ladder is disappearing in the AI era

As AI evolves, the world of work is getting even better for the most c

26 июл. 2025 г., 12:10:04 | Fast company - tech
This Florida company’s imaging tool helps speed up natural disaster recovery efforts

It has, to date, been a calm hurricane season in the state of Florida, but any resident of the Southeast will tell you that the deeper into summer we go, the more dangerous it becomes.

T

25 июл. 2025 г., 19:50:03 | Fast company - tech
TikTok reacts to alleged shoplifter detained after 7 hours in Illinois Target

TikTok has become obsessed with an alleged shoplifter who spent seven straight hou

25 июл. 2025 г., 15:10:09 | Fast company - tech
Is it safe to install iOS 26 on older iPhones like the 11 and SE?

Apple says the upcoming iOS 26, expected in a polished “release” version in September, will support devices back to the iPhone 11 from September 2019 and second-generation iPhone SE from April 202

25 июл. 2025 г., 15:10:08 | Fast company - tech
‘Democratizing space’ requires addressing questions of sustainability and sovereignty

India is on the moon,” S. Somanath, chairman of the Indian Space Research Organization, announced in

25 июл. 2025 г., 10:30:06 | Fast company - tech
iPadOS 26 is way more Mac-like. Where does that lead?

Greetings, everyone, and welcome back to Fast Company’s Plugged In.

It was one of the best-received pieces of Apple news I can recall. At the company’s

25 июл. 2025 г., 08:20:03 | Fast company - tech