What happens to your personal info after a data breach?

Jul 30, 2023, 5:00 AM

photo of iphone on flat surface...

(Pexels File Photo)

(Pexels File Photo)

Your most sensitive data is online. Sure, you don’t just post your banking details and medical records just anywhere, but hackers still find them — then sell them to anyone willing to pay.

It’s not just tech geniuses getting away with this stuff, either. Sophisticated software is available for purchase or monthly subscription. Here’s how much criminals pay to target you.

Are you wondering how many times you’ve been exposed? This is the best website to check. Pro tip: Check all your email addresses.

Back in the day, news of a breach or hack was shocking and scary. Now, it happens so often that you might not think twice when you get that notification. That’s a mistake.

Join over 500,000 people who get free daily tech news to their in-box.

How often does this stuff happen?

Way more often than you’d think. In 2022, there were 1,802 reported data breaches, affecting over 422 million individuals — just under the record high in 2021.

Cybercriminals get their hands on a host of your data through hacks, leaks, physical theft, human error, phishing attacks, ransomware, and other means. That includes Social Security numbers, bank account and credit card details, health records, passwords, device info and lots more.

Companies and institutions are legally required to disclose data breaches, so if you’ve been involved, you’ll get some kind of communication informing you what was accessed (if that info is available at the time).

So, what should you do?

If you’re in the habit of ignoring data breach alerts, this list will seem like overkill — but trust me here. It’s worth taking steps to safeguard your data after you’ve been exposed. It can, and very well might, get worse if you don’t.

  • Call your bank and credit card providers. Freeze and replace all your cards.
  • Place a fraud alert on your credit file. You only need to contact one of the three major credit bureaus: Equifax, Experian or TransUnion. The FTC lists the real websites and phone numbers here.
  • Monitor your bank and credit card statements for any suspicious activity. It could take time for anything strange to show up, so stay vigilant on this one.
  • Change your account passwords. It’s a pain, but this is your first line of defense. Remember, once a password is exposed, it’s off-limits for any other accounts.
  • Consider an identity theft monitoring or protection service. In the case of a major breach, the exposed company will often offer this for free. Take advantage. These services do a lot of the hard work for you.

A little prevention goes a long way

Being smart about how you react is one thing, but it pays to be proactive, too.

  • Using strong, unique passwords: Your passwords should be a mix of uppercase and lowercase letters, numbers, and special characters and should be different across your accounts.
  • Run a regular credit report: You can do this once a year for free at Look for any suspicious loans, lines of credit or anything else suspicious.
  • Use multi-factor authentication everywhere: Adding another step to the login process is annoying, but it’s worth it. Make this mandatory for any financial or medical accounts. Bonus points if you do this for every single account that allows it.
  • Stay up to date: Regular updates are your best protection against flaws and security vulnerabilities. Judging by the number of patches in the tech world this year alone, security pros and hackers are working equally hard. Don’t wait if you see a new update for your phone, tablet, computer, smart speaker or anything else.
  • Encrypting sensitive data: You’re making a mistake if you have medical records, financial docs or other info sitting on your desktop that could put you at risk. Today’s malware is sophisticated enough to steal all that if it sneaks onto your computer. Encrypting makes data unreadable to anyone who doesn’t have the password to unlock it.
  • Let cloud storage do the work: Not everyone is comfortable encrypting their own data. Fair enough. I highly recommend finding an encrypted cloud storage solution you can trust. My pick is IDrive, a sponsor of my national radio show.

Keep your tech-know going

Check out my podcast “Kim Komando Today” on Apple, Google Podcasts, Spotify or your favorite podcast player.

Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Listen on 425+ radio stations or get the podcast. And join over 400,000 people who get her free 5-minute daily email newsletter.

Kim Komando

(Jopwell Photo/via Pexels)...

Kim Komando

Smart tech life hacks Arizona workers should use to save time and stay safe

I got a text from a number I felt I should have known not long ago, but it wasn’t saved in my phone. There’s a smart trick I used to find it.

3 days ago

a group of people are smiling in the direction of an iPhone...

Kim Komando

Here are 20 Google search tricks, hidden utilities, games and freebies

Remember when talking to yourself got you weird looks? Using your voice can make a task like writing up a letter or outline a lot easier.

10 days ago

(Andres Ayrton Photo/via Pexels)...

Kim Komando

Plug in your address to see if you’re overpaying for the internet

If you think you're overpaying for the internet in your home, apartment, office or business, try this trick before you start packing.

17 days ago

child coloring on paper...

Kim Komando

3 lifesaving tech essentials for every school child – Parents, read this now

Back-to-school time meant loading up on school supplies and taking your kiddo to get new shoes...and now, there's more.

24 days ago

person holds phone while looking at watch...

Kim Komando

Your phone tracks everywhere you’ve been – See (and delete) it

Google knows more about you than your best friends. That includes (if you have the right settings enabled) where you go and even the pictures you take at that location. You have to check out this map. It’s stunning to see your history laid out in one spot. Apple users, you’re not immune. Your iPhone […]

1 month ago

phone displaying Google sign...

Kim Komando

Google security check: 60 seconds to kick out snoops and hackers

There are plenty of reasons to check your Google account’s security. It only takes a minute and will reveal who has access to your account.

1 month ago

Sponsored Articles



Importance of AC maintenance after Arizona’s excruciating heat wave

An air conditioning unit in Phoenix is vital to living a comfortable life inside, away from triple-digit heat.

Sanderson Ford...

Sanderson Ford

Sanderson Ford congratulates D-backs’ on drive to great first half of 2023

The Arizona Diamondbacks just completed a red-hot first half of the major league season, and Sanderson Ford wants to send its congratulations to the ballclub.



At Ability360, every day is Independence Day

With 100 different programs and services, more than 1,500 non-medically based home care staff, a world-renowned Sports & Fitness Center and over 15,000 people with disabilities served annually, across all ages and demographics, Ability360 is a nationwide leader in the disability community.

What happens to your personal info after a data breach?