KIM KOMANDO

What happens to your personal info after a data breach?

Jul 30, 2023, 5:00 AM

photo of iphone on flat surface...

(Pexels File Photo)

(Pexels File Photo)

Your most sensitive data is online. Sure, you don’t just post your banking details and medical records just anywhere, but hackers still find them — then sell them to anyone willing to pay.

It’s not just tech geniuses getting away with this stuff, either. Sophisticated software is available for purchase or monthly subscription. Here’s how much criminals pay to target you.

Are you wondering how many times you’ve been exposed? This is the best website to check. Pro tip: Check all your email addresses.

Back in the day, news of a breach or hack was shocking and scary. Now, it happens so often that you might not think twice when you get that notification. That’s a mistake.

Join over 500,000 people who get free daily tech news to their in-box.

How often does this stuff happen?

Way more often than you’d think. In 2022, there were 1,802 reported data breaches, affecting over 422 million individuals — just under the record high in 2021.

Cybercriminals get their hands on a host of your data through hacks, leaks, physical theft, human error, phishing attacks, ransomware, and other means. That includes Social Security numbers, bank account and credit card details, health records, passwords, device info and lots more.

Companies and institutions are legally required to disclose data breaches, so if you’ve been involved, you’ll get some kind of communication informing you what was accessed (if that info is available at the time).

So, what should you do?

If you’re in the habit of ignoring data breach alerts, this list will seem like overkill — but trust me here. It’s worth taking steps to safeguard your data after you’ve been exposed. It can, and very well might, get worse if you don’t.

  • Call your bank and credit card providers. Freeze and replace all your cards.
  • Place a fraud alert on your credit file. You only need to contact one of the three major credit bureaus: Equifax, Experian or TransUnion. The FTC lists the real websites and phone numbers here.
  • Monitor your bank and credit card statements for any suspicious activity. It could take time for anything strange to show up, so stay vigilant on this one.
  • Change your account passwords. It’s a pain, but this is your first line of defense. Remember, once a password is exposed, it’s off-limits for any other accounts.
  • Consider an identity theft monitoring or protection service. In the case of a major breach, the exposed company will often offer this for free. Take advantage. These services do a lot of the hard work for you.

A little prevention goes a long way

Being smart about how you react is one thing, but it pays to be proactive, too.

  • Using strong, unique passwords: Your passwords should be a mix of uppercase and lowercase letters, numbers, and special characters and should be different across your accounts.
  • Run a regular credit report: You can do this once a year for free at AnnualCreditReport.com. Look for any suspicious loans, lines of credit or anything else suspicious.
  • Use multi-factor authentication everywhere: Adding another step to the login process is annoying, but it’s worth it. Make this mandatory for any financial or medical accounts. Bonus points if you do this for every single account that allows it.
  • Stay up to date: Regular updates are your best protection against flaws and security vulnerabilities. Judging by the number of patches in the tech world this year alone, security pros and hackers are working equally hard. Don’t wait if you see a new update for your phone, tablet, computer, smart speaker or anything else.
  • Encrypting sensitive data: You’re making a mistake if you have medical records, financial docs or other info sitting on your desktop that could put you at risk. Today’s malware is sophisticated enough to steal all that if it sneaks onto your computer. Encrypting makes data unreadable to anyone who doesn’t have the password to unlock it.
  • Let cloud storage do the work: Not everyone is comfortable encrypting their own data. Fair enough. I highly recommend finding an encrypted cloud storage solution you can trust. My pick is IDrive, a sponsor of my national radio show.

Keep your tech-know going

Check out my podcast “Kim Komando Today” on Apple, Google Podcasts, Spotify or your favorite podcast player.

Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Listen on 425+ radio stations or get the podcast. And join over 400,000 people who get her free 5-minute daily email newsletter.

Kim Komando

politics and elections...

Kim Komando

Election fraud alert: Steps to safeguard your vote

Whenever politics and elections are in the news, fraudsters come crawling out of the woodwork to turn public fears into theft opportunities.

4 days ago

If family videos are on VHS, keeping them can be a pain. Even worse, every year that goes by, those...

Kim Komando

Do this thing with your family videos before it’s too late

I cleaned out a cabinet a few years ago and found a stack of old Super 8 tapes. I’ll never forget the way Mom’s face lit up after I digitized videos of her late brother Harold Jr.’s wedding. Tragically, he died in a car accident a week after his wedding day. Memories like those are […]

11 days ago

A person writing a to-do list....

Kim Komando

3 checks you should do once a year

Here are three important tasks Kim Komando does that she said people should add to their to-do list once a year.

18 days ago

An Optus public service message is displayed inside an Optus store in Sydney, Australia. 2024 has b...

Kim Komando

Here’s a look at the biggest data breaches of 2024 and how you can protect yourself

Here's a look at the biggest data breaches of 2024 and what consumers can do to protect themselves from the fallout.

25 days ago

Kim Komando has an explainer on how to delete apps that might violate your privacy. (Pexels photo)...

Kim Komando

Here’s how to get rid of useless apps from your phone

Some apps have access to a lot of your personal data, and Kim Komando is here to explain how to get rid of ones you don't want anymore.

1 month ago

AI tech tools and tricks from Kim Komando...

Kim Komando

Exciting AI tools and games you can try for free

Some AI tech is kind of freaky, but many of the new AI tools out there are just plain fun. These free tools will help you create.

2 months ago

Sponsored Articles

...

DAY & NIGHT AIR CONDITIONING, HEATING AND PLUMBING

It wouldn’t hurt to get your AC checked after Arizona’s excruciating heat wave

A well-maintained air conditioning unit is vital to living a comfortable life inside, away from triple-digit heat in Arizona.

...

Day & Night Air Conditioning, Heating and Plumbing

Beat the heat, ensure your AC unit is summer-ready

With temperatures starting to rise across the Valley, now is a great time to be sure your AC unit is ready to withstand the sweltering summer heat.

...

COLLINS COMFORT MASTERS

Here are 5 things Arizona residents need to know about their HVAC system

It's warming back up in the Valley, which means it's time to think about your air conditioning system's preparedness for summer.

What happens to your personal info after a data breach?