Keeping Confidential Personal Data Out of Hackers' Hands

Advertisement
By Molly Wood, The New York Times | Updated: 7 August 2014 13:04 IST
The numbers sound abstract: hundreds of millions of email addresses and other types of personal identification found in the hands of Russian hackers.

For people worried that they are caught in the mix, however, the discovery by Hold Security of a huge database of stolen data is highly personal. But personal does not mean helpless. There are common-sense steps everyone can take to keep the effect of hackers to a minimum.

Q: How do I know if my personal information is part of the stolen material?

A: Assume it is. The latest breach is enormous, and similar attacks and smaller thefts are happening all the time.

Advertisement

Hold Security is creating a tool to allow consumers to see whether their records have been stolen, but the company is not certain when it will be ready.

Advertisement

At this point, it is wisest to improve your online security immediately.

Q: Let me guess: I should change my password?

A: The first step, as always, is to change passwords for sites that contain confidential information like financial, health or credit card data. Do not use the same password across multiple sites.

Advertisement

Q: How do I create stronger passwords?

A: Try a password manager like LastPass, or Password Safe, which was created by the security expert Bruce Schneier.

Advertisement

These services create a unique password for each website you visit and store them in a database protected by a master password that you create. That sounds dangerous, but password managers reduce the risk of reused passwords or those that are easy to decode.

If you must create your own passwords, make sure they are not based on dictionary words. Even a word obscured with symbols and numbers can be cracked relatively quickly.

Schneier suggests creating an anagram from a sentence, and using symbols and numbers to make it more complicated. For example, the sentence "One time in class I ate some glue" could become "1TiC!AsG."

Create the strongest passwords for the sites that contain the most sensitive information and do not reuse them anywhere.

Q: Are passwords enough?

A: Passwords are not enough. If a site offers additional security features like secondary or two-factor authentication, enable them. Then, when you enter your password, you'll receive a message (usually a text) with a one-time code that you must enter before you can log in.

Many bank sites and major sites like Google and Apple offer two-factor authentication. In some cases, the second authentication is required only if you're logging in from a new computer.

Q: How can I stop my information from being stolen in the first place?

A: Increasingly, you cannot. Regular monitoring of financial records can help minimize the damage if someone gets your information. But only the companies storing your personal data are responsible for securing it. Consumers can slow down hackers and identity thieves, but corporate computer security and law enforcement are the biggest deterrents.

© 2014 New York Times News Service

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Hackers, Hacking, Internet, Password
Advertisement

Related Stories

Popular Mobile Brands
  1. Vivo X300 FE Reportedly Bags IMDA and TUV Certifications Ahead of Launch
  2. Poco X8 Pro Spotted on Geekbench With This Dimensity 8000 Series Chipset
  3. Deals on iPhone 17, Google Pixel 10 and More During Flipkart Sale
  4. Xiaomi 17 Series Leak Hints at Imminent Launch Ahead of MWC at These Prices
  5. Anthropic's First Indian Office in Bengaluru Is Now Open
  6. Oppo K14x 5G With 6,500mAh Battery Goes on Sale in India: See Price, Offers
  7. Samsung Galaxy A27 5G Lands on IMEI Database, Could Launch Soon
  8. Tecno Spark 50 4G Launch Timeline, Design, Colourways, Key Features Leaked
  1. Sony Could Reportedly Delay PS6 to as Late as 2029 Due to RAM Shortage
  2. iPhone 18 Series to Drop SIM Card Slot in Europe to Make Room for Slightly Larger Battery: Report
  3. Poco X8 Pro Spotted on Geekbench With MediaTek Dimensity 8500 Ultra SoC, Android 16
  4. Xiaomi 17, Xiaomi 17 Ultra Global Price Details, Launch Date and Colour Options Leaked
  5. X Building Smart 'Cashtags' to Let Users Check Cryptocurrency Prices in Real-Time
  6. Samsung Galaxy A27 5G Listing on IMEI Database Suggests a Galaxy A26 Successor Is on the Way
  7. Anthropic Inaugurates First Indian Office in Bengaluru, Starts Hiring Local Talent
  8. Apple Tipped to Adopt Samsung's Privacy Display Technology for MacBook Models by 2029
  9. Oppo Find X10 Series Tipped to Launch in H2 2026 With Built-In Magnets for Wireless Charging
  10. AMD and TCS to Co-Develop Helios AI Data Centre Architecture, Deliver 200MW Data Centre Blueprint
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.