Keeping Confidential Personal Data Out of Hackers' Hands

Advertisement
By Molly Wood, The New York Times | Updated: 7 August 2014 13:04 IST
The numbers sound abstract: hundreds of millions of email addresses and other types of personal identification found in the hands of Russian hackers.

For people worried that they are caught in the mix, however, the discovery by Hold Security of a huge database of stolen data is highly personal. But personal does not mean helpless. There are common-sense steps everyone can take to keep the effect of hackers to a minimum.

Q: How do I know if my personal information is part of the stolen material?

A: Assume it is. The latest breach is enormous, and similar attacks and smaller thefts are happening all the time.

Advertisement

Hold Security is creating a tool to allow consumers to see whether their records have been stolen, but the company is not certain when it will be ready.

Advertisement

At this point, it is wisest to improve your online security immediately.

Q: Let me guess: I should change my password?

A: The first step, as always, is to change passwords for sites that contain confidential information like financial, health or credit card data. Do not use the same password across multiple sites.

Advertisement

Q: How do I create stronger passwords?

A: Try a password manager like LastPass, or Password Safe, which was created by the security expert Bruce Schneier.

Advertisement

These services create a unique password for each website you visit and store them in a database protected by a master password that you create. That sounds dangerous, but password managers reduce the risk of reused passwords or those that are easy to decode.

If you must create your own passwords, make sure they are not based on dictionary words. Even a word obscured with symbols and numbers can be cracked relatively quickly.

Schneier suggests creating an anagram from a sentence, and using symbols and numbers to make it more complicated. For example, the sentence "One time in class I ate some glue" could become "1TiC!AsG."

Create the strongest passwords for the sites that contain the most sensitive information and do not reuse them anywhere.

Q: Are passwords enough?

A: Passwords are not enough. If a site offers additional security features like secondary or two-factor authentication, enable them. Then, when you enter your password, you'll receive a message (usually a text) with a one-time code that you must enter before you can log in.

Many bank sites and major sites like Google and Apple offer two-factor authentication. In some cases, the second authentication is required only if you're logging in from a new computer.

Q: How can I stop my information from being stolen in the first place?

A: Increasingly, you cannot. Regular monitoring of financial records can help minimize the damage if someone gets your information. But only the companies storing your personal data are responsible for securing it. Consumers can slow down hackers and identity thieves, but corporate computer security and law enforcement are the biggest deterrents.

© 2014 New York Times News Service

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Further reading: Hackers, Hacking, Internet, Password
Advertisement

Related Stories

Popular Mobile Brands
  1. IFA 2025 Begins This Week: All the Announcements We Expect
  2. Apple Rolls Out iOS 26 Beta 9 for iPhone Ahead of iPhone 17 Launch
  3. From iPhone 17 to New Apple Watch Models: What to Expect from Apple Event
  4. Lokah Chapter 1: Chandra Will Begin Streaming on This OTT Platform
  1. Scientists Create Stretchy Rubber That Converts Body Heat Into Electricity for Wearables
  2. NASA’s InSight Reveals Ancient Planetary Remains Preserved Deep Inside Mars
  3. Rajinikanth’s Coolie is Coming to OTT Platforms Soon: Know When, Where to Watch it Online
  4. NASA’s Juno Spacecraft Detects Callisto’s Aurora, Completing Jupiter’s Galilean Moons Set
  5. Kalyani Priyadarshan’s Lokah Chapter 1: Chandra OTT Release Date Revealed
  6. Astronomers Discover Calvera, a Runaway Pulsar Racing Above the Milky Way
  7. Itel A90 Limited Edition Launched in India With MIL-STD-810H Durability: Price, Specifications
  8. OKX Faces EUR 2.25 Million Fine By Dutch National Bank for Operating Without Registration
  9. NASA’s OSIRIS-REx Mission Finds Stardust in Asteroid Bennu Older Than the Solar System
  10. Swiggy and Zomato Raise Platform Fees to Up to Rs. 15 Amidst Rise in Festival-Related Demand
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.