I must get a notice once a quarter that some of my personal information was compromised in a data breach. Some cyberthief hacked a database and stole it.
This is one area of modern life where it happens so often it makes one numb to the reality that someone pilfered something of value to me. It could be anything from medical records to credit card information, much of which is brokered to other thieves. It’s a big global business.
According to the Identity Theft Resource Center (ITRC), “through the first half of the year, the ITRC has tracked 1,393 compromises, higher than the total compromises reported every year between 2005 and 2020 except for 2017. This puts 2023 on pace to set a record for the number of data compromises in a year, passing the all-time high of 1,862 compromises in 2021.”
What can you do? I’m going to sound like your dentist, but you can practice good “cyberhygiene.” This is what the ITRC recommends:
1. Get educated about the terms of service and other policies. Understanding the terms of service and other policies is important because you may have agreed to have your information stored and sold, automatic renewals, location-based monitoring, and more once you checked the box.
2. You can use paid anti-virus, but it is likely not needed. Anti-virus software can scan, detect and delete viruses from a computer. It protects your computer against malware that is deployed by cybercriminals and bots. Once anti-virus is installed, the software usually runs automatically in the background to provide real-time protection against known attacks. However, with the advancement of cloud-based software and modern mobile devices, most computers and laptops have anti-virus built into the operating system. I update my anti-virus software every year and also check my credit record.
3. Set up all online accounts (email, financial, shopping, etc.) with two-factor or multi-factor authentication. Two-factor authentication (2FA) or multi-factor authentication (MFA) adds an extra layer of protection to your accounts. They require at least two separate verification steps to log into an account, like a text code, phone call, or through an app. This is a little more time-consuming, but it will help protect your information.
4. Use secure payment methods when shopping online. Only shop on trusted websites and use trusted payment methods. Don’t use payment portals or shop on websites you are not familiar with, even if they were found on a social media platform. If you have to shop on an unfamiliar site, use a payment instrument with a dispute resolution process – like a reputable credit card.
Read the full article here