The Times Australia
The Times World News

.

What do they have to do with your personal information, and how worried should you be?

  • Written by Merrill Warkentin, James J. Rouse Endowed Professor of Information Systems, Mississippi State University

The headlines are filled with news about ransomware attacks[1] tying up organizations large and small, data breaches[2] at major brand-name companies and cyberattacks[3] by shadowy hackers associated with Russia, China and North Korea. Are these threats to your personal information?

If it’s a ransomware attack on a pipeline company, probably not. If it’s a hack by foreign agents of a government agency, maybe[4], particularly if you’re a government employee. If it’s a data breach at a credit bureau, social media company or major retailer, very likely.

The bottom line is that your online data is not safe. Every week a new major data breach is reported[5], and most Americans have experienced some form of data theft[6]. And it could hurt you. What should you do?

Mildly annoyed or majorly aggrieved

First, was the latest digital crime a ransomware attack[7] or was it a data breach[8]? Ransomware attacks encrypt[9], or lock up, your programs or data files, but your data is usually not exposed, so you probably have nothing to worry about. If the target is a company whose services you use, you might be inconvenienced while the company is out of commission.

If it was a data breach, find out if your information has been exposed. You may have been notified[10] that your personal data was exposed. U.S. laws require companies to tell you if your data was stolen. But you can also check for yourself at haveibeenpwned.com[11].

A data breach could include theft of your online credentials[12]: your user name and password. But hackers might also steal your bank account or credit card numbers or other sensitive or protected information, such as your personal health information, your email address, phone number, street address or Social Security number.

Having your data stolen from a company can be scary, but it is also an opportunity to take stock and apply some common-sense measures to protect your data elsewhere. Even if your data has not been exposed yet, why not take the time now to protect yourself?

How bad is it?

As a cybersecurity scholar[13], I suggest that you make a risk assessment[14]. Ask yourself some simple questions, then take some precautions.

If you know your data was stolen, the most important question is what kind of data was stolen. Data thieves, just like car thieves, want to steal something valuable. Consider how attractive the data might be to someone else. Was it highly sensitive data that could harm you if it were in the wrong hands, like financial account records? Or was it data that couldn’t really cause you any problems if someone got hold of it? What information is your worst-case vulnerability if it were stolen? What could happen if data thieves take it?

Many e-commerce sites retain your purchase history, but not your credit card number, so ask yourself, did I authorize them to keep it on file? If you make recurring purchases from the site, such as at hotel chains, airlines and grocery stores, the answer is probably yes. Thieves don’t care about your seat preferences. They want to steal your credit card info or your loyalty rewards to sell on the black market[15].

What to do

A hand holds a smartphone showing a text message on the screen Two-factor authentication, which typically involves receiving a code in a text message, provides an extra layer of security in case your password is stolen. The Focal Project/Flickr, CC BY-NC[16][17]

If you haven’t already, set up two-factor authentication with all websites that store your valuable data. If data thieves stole your password, but you use two-factor authentication[18], then they can’t use your password to access your account.

It takes a little effort to enter that single-use code sent to your phone each time, but it does protect you from harm when the inevitable breach occurs. Even better, use an authentication app[19] rather than texting for two-factor authentication. This is especially critical for your bank and brokerage accounts. If you think your health-related information is valuable or sensitive, you should also take extra precautions with your health care provider’s website, your insurance company and your pharmacy.

If you used a unique password[20] instead of reusing a favorite password[21] you’ve used elsewhere, hackers can’t successfully use your credentials[22] to access your other accounts. One-third of users are vulnerable because they use the same password for every account[23].

Take this opportunity to change your passwords, especially at banks, brokerages and any site that retains your credit card number. You can record your unique passwords on a piece of paper hidden at home or in an encrypted file you keep in the cloud. Or you can download and install a good password manager[24]. Password managers encrypt passwords on your devices before they’re sent into the cloud, so your passwords are protected even if the password manager company is hacked.

If your credit card number was exposed, you should notify your bank. Now is a good time to set up mobile banking alerts[25] to receive notifications of unusual activity, big purchases and so on. Your bank may want to issue new cards with new numbers to you. That’s considerably less of a hassle than experiencing identity theft[26].

You should also consider closing old unused accounts so that the information associated with them is no longer available. Do you have a loyalty account with a hotel chain, restaurant or airline that you haven’t used in years and won’t use again? Close it. If you have a credit card with that company, make sure they report the account closure to the credit reporting agencies.

Now is a great time to check your credit reports from all three credit bureaus. Do you rarely apply for new credit and want to protect your identity? If so, freeze your credit[27]. Make sure to generate unique passwords and record them at home in case you need to unfreeze your credit later to apply for a loan. This will help protect you from some of the worst consequences of identity theft.

References

  1. ^ ransomware attacks (www.csoonline.com)
  2. ^ data breaches (www.kaspersky.com)
  3. ^ cyberattacks (theconversation.com)
  4. ^ maybe (abcnews.go.com)
  5. ^ a new major data breach is reported (www.gearbrain.com)
  6. ^ have experienced some form of data theft (www.pewresearch.org)
  7. ^ ransomware attack (www.techrepublic.com)
  8. ^ data breach (www.lifelock.com)
  9. ^ encrypt (www.cloudflare.com)
  10. ^ notified (privacyrights.org)
  11. ^ haveibeenpwned.com (haveibeenpwned.com)
  12. ^ credentials (www.pcmag.com)
  13. ^ cybersecurity scholar (www.misprofessor.us)
  14. ^ risk assessment (www.researchgate.net)
  15. ^ sell on the black market (theconversation.com)
  16. ^ The Focal Project/Flickr (flickr.com)
  17. ^ CC BY-NC (creativecommons.org)
  18. ^ two-factor authentication (authy.com)
  19. ^ authentication app (www.pcmag.com)
  20. ^ unique password (www.webroot.com)
  21. ^ favorite password (theconversation.com)
  22. ^ credentials (www.pcmag.com)
  23. ^ use the same password for every account (www.digicert.com)
  24. ^ password manager (www.wsj.com)
  25. ^ mobile banking alerts (www.thebalance.com)
  26. ^ experiencing identity theft (www.identitytheft.gov)
  27. ^ freeze your credit (www.consumer.ftc.gov)

Read more https://theconversation.com/ransomware-data-breach-cyberattack-what-do-they-have-to-do-with-your-personal-information-and-how-worried-should-you-be-162404

Times Magazine

Building an AI-First Culture in Your Company

AI isn't just something to think about anymore - it's becoming part of how we live and work, whether we like it or not. At the office, it definitely helps us move faster. But here's the thing: just using tools like ChatGPT or plugging AI into your wo...

Data Management Isn't Just About Tech—Here’s Why It’s a Human Problem Too

Photo by Kevin Kuby Manuel O. Diaz Jr.We live in a world drowning in data. Every click, swipe, medical scan, and financial transaction generates information, so much that managing it all has become one of the biggest challenges of our digital age. Bu...

Headless CMS in Digital Twins and 3D Product Experiences

Image by freepik As the metaverse becomes more advanced and accessible, it's clear that multiple sectors will use digital twins and 3D product experiences to visualize, connect, and streamline efforts better. A digital twin is a virtual replica of ...

The Decline of Hyper-Casual: How Mid-Core Mobile Games Took Over in 2025

In recent years, the mobile gaming landscape has undergone a significant transformation, with mid-core mobile games emerging as the dominant force in app stores by 2025. This shift is underpinned by changing user habits and evolving monetization tr...

Understanding ITIL 4 and PRINCE2 Project Management Synergy

Key Highlights ITIL 4 focuses on IT service management, emphasising continual improvement and value creation through modern digital transformation approaches. PRINCE2 project management supports systematic planning and execution of projects wit...

What AI Adoption Means for the Future of Workplace Risk Management

Image by freepik As industrial operations become more complex and fast-paced, the risks faced by workers and employers alike continue to grow. Traditional safety models—reliant on manual oversight, reactive investigations, and standardised checklist...

The Times Features

Ricoh Launches IM C401F A4 Colour MFP to Boost Speed and Security in Hybrid Workplaces

Ricoh, a leading provider of smart workplace technology, today launched the RICOH IM C401F, an enterprise-grade A4 colour desktop multifunction printer (MFP) designed for Austral...

Why Diversification Still Matters in a Volatile Economy

Market volatility, geopolitical conflicts, inflation fears—these are only some of the wild cards that render the current financial environment a tightrope to walk. Amidst all thi...

Specialised nutrition gains momentum in supporting those living with early Alzheimer's disease

With high public interest in Alzheimer’s disease, there is growing awareness of the important role nutrition plays in supporting memory and cognitive function in people diagnosed...

From clinics to comfort: how sleep retreats are redefining care in Australia

Australia is amid a sleep health crisis. Nearly 40% of adults report inadequate sleep, and the consequences are far-reaching, impacting everything from cardiovascular health to...

Is our mental health determined by where we live – or is it the other way round? New research sheds more light

Ever felt like where you live is having an impact on your mental health? Turns out, you’re not imagining things. Our new analysis[1] of eight years of data from the New Zeal...

Going Off the Beaten Path? Here's How to Power Up Without the Grid

There’s something incredibly freeing about heading off the beaten path. No traffic, no crowded campsites, no glowing screens in every direction — just you, the landscape, and the...