SOURCE: Wombat Security Technologies

Wombat Security Technologies, Inc. logo

June 18, 2015 09:09 ET

So Your Personal Data Has Been Compromised. Now What?

PITTSBURGH, PA--(Marketwired - June 18, 2015) - With the massive recent U.S. federal government data breach and increasingly frequent healthcare and retailer breaches, more and more individuals are facing the annoyances of life after a personal data compromise. Many are likely asking themselves: Now what?

When larger organizations face a breach of their customers’ or employees’ data, they often offer free credit monitoring services to affected individuals. If you are given this opportunity, you should absolutely take advantage of it. It's a great way to keep track of your personally identifiable information (PII).

But what if you don’t receive this offer from an organization? Or what if your PII breach is on a smaller scale -- say, for example, you fell for a phishing email or a voice phishing (vishing) call? Or maybe you lost your mobile phone or wallet, even for a short time? What then?

Stay Proactive With These DIY Tips

It’s important to be proactive about minimizing the impact of a PII security breach, whether yours is one of many compromised records or you are the victim of a limited-scope breach. With the latter, if you have the motive and the means to enroll in a credit monitoring service on your own dime, it could be well worth the peace of mind to know that someone is looking out for you. Regardless, the following do-it-yourself activities will help you mitigate some of the damage caused by a breach -- as well as prevent future damage.

Change Affected Passwords

If you’ve been alerted to an account breach -- or you suspect you’ve fallen for a phishing email that prompted you to reveal credentials for a login-protected site like webmail, online banking, or social media -- change your password posthaste. And if you happen to use that same password on other sites (shame, shame), be sure to update those logins as well. Hackers will often cross-check stolen passwords on multiple sites in hopes of getting a hit.

Alert Appropriate Account Reps

For cases in which you personally discover or suspect a data security breach, contact the help lines for affected accounts right away. Be sure to use trusted customer service channels (e.g., phone numbers from your credit cards or billing statements).

Be Extra Diligent About Unsolicited Emails, Texts, and Phone Calls

In many cases, it’s not just account numbers that hackers and scammers scoop up. They often grab names, email addresses, and phone numbers to use in follow-up attacks. (The phishing emails that appeared shortly on the heels of the Chase breach are great examples of this.)

In these attacks, fraudsters will put together multiple pieces of information they have about individuals to make their messages and calls seem more legitimate and more believable. It’s important to be on high alert once you know your data is already in the hands of the bad guys.

Check Your Mail

With all the ado about cyber security attacks, it can be easy to become complacent about snail mail. But consider the prior point about email addresses and phone numbers and you’ll see that the leap to a mail-based attack isn’t hard to make.

If scammers obtain your name, address, and other identifying information, it can be easy for them to send compelling and seemingly genuine letters, bills, payment notices, and other mailers. It’s critical that you verify the validity of unsolicited mail that asks for any type of remittance.

We’re experts in changing end-user’s cyber security behaviors. Find out your organization’s level of risk and see how the Wombat Continuous Training Methodology can help you improve your security posture.

Image Available: http://www.marketwire.com/library/MwGo/2015/6/18/11G045205/Images/Wombat_PersonalData2015-875486403730.jpg

Contact Information