What to Do When a Company Compromises Your Data

What to Do When a Company Compromises Your Data

In today’s digital age, the rampant increase in cyber-attacks has likely left you reeling from more than one notification that your data has been compromised. Despite our best efforts to guard our personal information, the reality is that we are sometimes left vulnerable when a company entrusted with our data suffers a breach. So what should you do when a company compromises your data?

According to a 2023 report by Statista, 52% of all global organization breaches involved customers’ Personally Identifiable Information (PII). This means your personal data — addresses, phone numbers, names, birth dates, Social Security numbers, and more — are the primary targets. A notable example is the ChangeHealthcare breach in February this year, affecting an estimated one-third of Americans and leading to the exposure of sensitive data on the dark web.

So, what are your next steps when you receive the dreaded letter or email stating, “Oops, we got breached”? It’s profoundly unsettling to realize that your data may now be in the hands of cybercriminals.

When such a breach occurs, it’s imperative to take swift and decisive action to safeguard your accounts.

Seven essential steps to follow when a company compromises your data:

Verify the Legitimacy of the Breach Notification

Hackers often impersonate reputable companies to send out fake notifications of data breaches. If you receive such a notification, do not immediately trust the information. Instead, visit the company’s official website or contact them directly using verified contact details. Confirm whether a breach occurred, determine which of your data may have been compromised, and inquire about any supportive measures the company offers, such as free credit monitoring or identity fraud prevention services.

Assess the Scope of the Compromised Data

After verifying the breach, identify what specific data was stolen. Credit card details can be relatively easy to replace, while sensitive information like Social Security numbers require more vigilant monitoring and protection. Knowing what data was compromised is the first step in taking appropriate corrective measures.

Update Passwords and Activate Multi-Factor Authentication (MFA)

Promptly update your passwords for the breached account and any other accounts using similar credentials. If possible, log out all devices from the compromised account. Enable multi-factor authentication (MFA) to add an extra layer of security. This ensures that even if a hacker has your credentials, they cannot access your account without a secondary verification step.

Keep a Close Eye on Your Accounts

Even after securing your accounts, remain vigilant. Monitor for unauthorized updates or purchases, especially if your financial information was compromised. Swiftly address any suspicious activity, as it may be an early sign of identity theft.

Report Any Incidents

If you suspect the company is unaware of the breach, or if you experience fraud due to the breach, report it to the relevant authorities such as local law enforcement or the Federal Trade Commission. They can guide you through the necessary steps to protect your identity and prevent further misuse of your data.

Steer Clear of Phishing Scams

In the aftermath of a data leak, hackers may use your compromised data for phishing attacks. Be cautious of unexpected emails or calls requesting personal or financial information. Avoid clicking on any suspicious links or attachments, and verify the source before sharing any sensitive information.

Consider Identity Theft and Data Breach Protection Services

Following a breach, especially one involving highly sensitive information like your Social Security number, consider enrolling in identity theft protection services. These services can monitor your credit report, alert you of unauthorized activities, and assist in safeguarding your identity.

By taking informed and proactive steps, you can mitigate the risks associated with data breaches and better protect your personal information. As we continue to navigate the complexities of digital security, staying vigilant and prepared is our best defense.