Data breaches are now daily occurrences and can happen to any business. The April 2021 leak of 533 million Facebook records was one of the largest known data leaks, but even if you weren’t affected by that one, you may still be at risk.
There is no easy way to know if your information has been leaked. When a business is hacked, it typically sends a notification letting you know, but this isn’t guaranteed. And you can’t go in and check the Dark Web. It is difficult to find and dangerous to access, and that is why the bad guys like it.
It’s a good idea to navigate to https://haveibeenpwned.com to see if your email address or phone number is on any data breach files. This isn’t conclusive, but it can help.
Even, if you’re not sure if you’ve been a victim of a data leak, you’ll want to take action.
There are several smart strategies to follow immediately.
#1 Limit your social sharing
It is simple to share on social media – that is part of the fun. You share the pictures of your wedding day or anniversary, or your new house with its address. You’re filling in family and friends in your life, right?
Well, if you are using any of that information to create access credentials, you are sharing too much. Someone with a beloved cat called “Petunia” in every photo who uses the feline’s name as a password gives hackers an edge.
You might think you are sharing harmless information, but those birthday party photos posted on the big day are a clue to your identity that hackers can exploit.
#2 Use Unique Passwords
Would you believe people still use “12345678” and “password” as their passwords? If you are one of them, stop now. We’ve said it before, and we’ll say it again and again: use unique passwords for every one of your accounts. Yes, it is more to remember, but it helps cut the risk of a data breach at one site snowballing to disastrous consequences for you.
You might use a password keeper such as 1Password or LastPass to manage your many passwords. This is more secure than the password manager offered by your Web browser, although those are better than revising passwords or trying (hopelessly) to memorize them.
#3 Add Two-Factor Authentication (2FA)
Enabling two-factor authentication (2FA) makes it more challenging for the bad actor. Now, they will need to obtain access not only to log in credentials but also to your personal device. However, since phone numbers are often included in a data leak, this isn’t the best solution. If the hacker has your name, address, and birthdate from the Dark Web, they can take over your phone number, too. They call the company and say, “I lost my phone. Can I get another SIM card.” Then, they are the ones to get those verification codes via message, not you.
Better still, use a 2FA app to confirm your identity. Authy or LastPass are good authenticator apps. After you attempt to log in, you will need to enter a time-sensitive code generated by the app to complete access.
#4 Stop Signing into Other Sites Using Social
Sure, it is convenient to use your Facebook or other social media account to sign in to connected applications, because you have fewer passwords to remember. Some of your data is automatically transferred, so signup is streamlined, too. Yet you are increasing the risk of account compromise.
The hacker may access the third-party application and use that as a stepping stone to get into your social account. That’s where the trove of data is.
#5 Develop an Alternate Ego
It all sounds super spy, but you might have one email account you open to be a burner account for social media. You could also use a fake birth date, a fake alma mater, and other alternative facts to fill out the social profile.
Don’t fabricate personal details for an employer, or a financial or educational institution. But you might use a fake identity for entertainment, gaming, and social sites that bad guys may mine for personal data.
Need help securing your social media or other online activity? Our experts can help. Contact us today at 570-243-9205
Throw a stone and you are bound to hit an I.T. Company that uses automation tools to provide support these days. You will find an equal amount telling you how special their tools are.
Underdog uses similar tools as our competitors but we find them less interesting and more importantly so do you!
Those tools are just a means to performing mundane automated tasks that require very little human interaction. We Add:
Level of Security that protects our clients from threats both online and offline
Add in a layer of Human Intervention – for the times when automation fails and stuff happens
Combine with best practices and industry standards. This allows us to advise, steer and adopt new technology.
By doing so, it allows us to help you reduce risk, stay productive and increase profits. That is the value Underdog brings to your business.
We found it very easy to work with Underdog. He gave a very clear and professional quote, he has been promptly responsive in all communications, and the network is working great. I feel very good about using his company for any future IT needs for our business.
Pam Watkins, Forks Bistro
Barton Heights had a very successful computer upgrade due to Underdog. I met with him 2-3 months before the project and he gave us an estimate of the entire upgrade process involving 31 computers and a server. He advised us and placed the order. He also worked with us and ended up revising the estimate twice to completely satisfy our computer upgrade needs. He added true value to his service as he was willing to perform the upgrade in the evening when we were closed to minimize our down time as we are a paperless business and rely 100% on our computers. Carmine stepped up and took care of those problems as well, even though that was not his responsibility. He always responds quickly to any issue that occurs. I would highly recommend him to anyone!
Dr. Jeremy Wentz., Barton Heights Veterinary Hospital
I HAVE WORKED WITH CARMINE FOR MANY YEARS. HE HAS DONE EVERYTHING FROM NETWORK SERVER INSTALLATION TO PROGRAM TROUBLESHOOTING. HIS QUALITY OF WORK AND KNOWLEDGE ARE OUTSTANDING. YOU CAN ALWAYS COUNT ON Underdog TO WORK HARD FOR YOU.
Tim Stump, Shawnee Mountain Ski Area
Underdog makes you feel that you are his first concern if you have a Server down or you have a small printing question. We have been with Carmine for 16 years and have only received quality service.
Dee McConnel, Straub Metal International
Thank you Underdog. Will recommend you from the rooftops.
Law Office of Maria T. Candelaria, Maria Candelaria
12 years in business and I have been there and done that with other IT / Computer biz, and finally found one that listens, asks questions, and comes up with a plan.
If you are having issues or just want to see if there are options for and avenues of improvement for your computer / networking needs, checkout Underdog Computer and Network Support LLC.
There are some others that are good, but I cannot express the difference enough – they actually get it! Every business IS different with different needs and processes, and they take the time to find what is best for you instead of what they think is best for you!
Thank you, Carmine J. Corridore, for allowing me to have a stress free vacation this year! I look forward to working with you in the near future for some serious upgrades!
Carollee Streeter Kidd, CLK Transcription
“Underdog Computer and Network Support are amazing. They go over and above to help the small business owner Thank you Carmine for all you do”
Jennifer Narkavich, My Girl Managed Services - Marketing Consultant
Underdog Came out to install our Phone System. They made a complicated process easy. Brian Davis, Full Circle Removal.
Brian Davis, Full Circle Removal
We have used Underdog Computer and Networking for business and personal use. We have found them easy to schedule an appointment, very responsive, professional, and quick to isolate the problem and/or identify our real need. We highly recommend Underdog.
Denise Flietman, Spread Eagle Realty
Jill Reeder, Pearl S Buck International
Want More Information Fill out this form
For Immediate Answers to your Questions Click on the Icon in the Lower Right. You can Chat| Video or Call right from this website.