{"id":85363,"date":"2024-08-09T10:45:50","date_gmt":"2024-08-09T17:45:50","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=85363"},"modified":"2024-08-16T10:42:52","modified_gmt":"2024-08-16T17:42:52","slug":"how-to-avoid-getting-hacked-after-data-breaches","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/","title":{"rendered":"What to do after a data breach\u2014and how to avoid getting hacked\u2014in 9 easy steps"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-85372\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Hackers-hit-leading-to-data-breach-600x300.jpg\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Hackers-hit-leading-to-data-breach-600x300.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Hackers-hit-leading-to-data-breach-600x300-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Hackers-hit-leading-to-data-breach-600x300-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>You&#8217;ve undoubtedly heard about some high-profile data breaches; some of the biggest companies in the world have had user login credentials or other sensitive account data stolen, from usernames and e-mail addresses to passwords, credit card details, home addresses, social security numbers, and more.<\/p>\n<p>There&#8217;s only so much you can do to ensure that companies handle your data securely. But there are some things you can do to help avoid getting hacked whenever a new data breach comes to light. You&#8217;ll want to find out whether your data was exposed. And you&#8217;ll also want to verify that you use good password hygiene along with two-factor authentication.<\/p>\n<p>Let&#8217;s explore how to prepare for\u2014and recover from\u2014a data breach. Here&#8217;s everything you need to know to get started developing your personal data breach response plan. (Note: If your Social Security Number has leaked, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#alerts\">freeze your credit first<\/a>.)<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#whatis\">What is a data breach?<\/a><\/li>\n<li><a href=\"#findout\">How can I find out if my information was included in a data breach?<\/a><\/li>\n<li><a href=\"#leaked\">Was my password leaked in a data breach? Should I change it?<\/a><\/li>\n<li><a href=\"#recover\">What can I do to recover from a data breach? 9 key steps<\/a>\n<ul>\n<li><a href=\"#hibp\">1. Register your e-mail addresses with Have I Been Pwned<\/a><\/li>\n<li><a href=\"#pwm\">2. Choose a password manager that comes with data breach monitoring<\/a><\/li>\n<li><a href=\"#longpw\">3. Use a long, unique password for each site; never reuse passwords<\/a><\/li>\n<li><a href=\"#2fa\">4. Enable two-factor authentication on all your accounts<\/a><\/li>\n<li><a href=\"#contact\">5. Contact the breached company, if necessary<\/a><\/li>\n<li><a href=\"#scams\">6. Beware of data breach-related phishing scams<\/a><\/li>\n<li><a href=\"#alerts\">7. Set up fraud alerts, and consider freezing your credit<\/a><\/li>\n<li><a href=\"#idprot\">8. Consider using an identity theft protection service<\/a><\/li>\n<li><a href=\"#pii\">9. Whenever possible, avoid sharing personally identifiable information (PII)<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"whatis\"><\/a><\/li>\n<\/ul>\n<h3>What is a data breach?<\/h3>\n<p>A <strong>data breach<\/strong> is an incident in which an attacker obtains unauthorized access to a company&#8217;s systems, resulting in the exposure of sensitive information. Data breaches are also called data leaks, security breaches, or unauthorized disclosures. Sometimes, leaks of sensitive data occur due to poor security controls on a company&#8217;s server; other times, they result from a broad or targeted attack against a company. Occasionally, the source of a leak is an &#8220;insider threat,&#8221; meaning a rogue employee or contractor.<\/p>\n<p>Regardless of what you call it, or how unauthorized parties obtain access to the data, data breaches are a serious problem in the world today. Fortune 500 companies, banks, hospitals, and schools are being attacked every day, and many of these attacks result in system compromise and data exposure.<a name=\"findout\"><\/a><\/p>\n<h3>How can I find out if my information was included in a data breach?<\/h3>\n<p>When you hear about a specific data breach incident that might affect you, the first thing you&#8217;ll likely want to do is find out whether your personal information was leaked. Thankfully, there&#8217;s a tool for that.<\/p>\n<p><a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener\">Have I Been Pwned<\/a> (HIBP) is a site that offers a free lookup and notification service for data breaches and data dumps. (&#8220;Pwned&#8221; is hacker lingo for &#8220;owned&#8221;\u2014i.e. hacked, or compromised by a hacker.) The site was developed by Troy Hunt, a leading expert on data breaches. You can safely enter your e-mail address at HIBP to see a list of any notable breaches and dumps that contain your e-mail address. Of course, it&#8217;s important to note that not every data breach necessarily contains e-mail addresses.<\/p>\n<p>Additionally, even if e-mail addresses were among the leaked data, it can sometimes take time before new breaches are added to HIBP; it may not happen the same day as the breach hits the news. But when you enter your e-mail address on the site, you can optionally subscribe to receive notifications about future dumps that contain your address.<a name=\"leaked\"><\/a><\/p>\n<h3>Was my password leaked in a data breach? Should I change it?<\/h3>\n<p>You might be worried about whether your password was exposed. There are a couple of ways to determine whether one of your passwords may have leaked in a data breach.<\/p>\n<p>Have I Been Pwned also has a &#8220;<a href=\"https:\/\/haveibeenpwned.com\/Passwords\" target=\"_blank\" rel=\"noopener\">Pwned Passwords<\/a>&#8221; lookup page where you can\u2014brace yourself!\u2014type in your passwords one by one and check to see if they&#8217;ve ever appeared in a password dump.<\/p>\n<p>If the idea of typing your passwords into a third-party site makes you uncomfortable, that&#8217;s excellent\u2014it should! You&#8217;d be perfectly justified in being suspicious. Hunt has <a href=\"https:\/\/www.troyhunt.com\/ive-just-launched-pwned-passwords-version-2\/#cloudflareprivacyandkanonymity\" target=\"_blank\" rel=\"noopener\">taken precautions<\/a> to safeguard passwords, and has cleverly engineered the page to not actually send any passwords typed on the page to his server.<\/p>\n<p>If you&#8217;re still uncomfortable typing your passwords into HIBP&#8217;s Pwned Passwords site, it may give you some comfort to know that major password managers partner with HIBP to utilize the feature. So, if you prefer, you can have your password manager do the work for you. (This should also save you a lot of time.)<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-85360\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/1Password-logo-150x150.png\" alt=\"1Password logo\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/1Password-logo-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/1Password-logo-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/1Password-logo-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/1Password-logo-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/1Password-logo-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/1Password-logo-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/1Password-logo-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/1Password-logo.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>The popular password manager <a href=\"https:\/\/1password.com\/\" target=\"_blank\" rel=\"noopener\">1Password<\/a> has partnered with HIBP to offer a feature called <a href=\"https:\/\/support.1password.com\/watchtower\/\" target=\"_blank\" rel=\"noopener\">Watchtower<\/a>; it can look up whether your passwords have appeared in a dump. Some other password managers may offer a similar feature; if yours doesn&#8217;t, you may wish to submit a feature request to the developer and point them to <a href=\"https:\/\/haveibeenpwned.com\/API\/v2#PwnedPasswords\" target=\"_blank\" rel=\"noopener\">this page<\/a> for details on how they can integrate with HIBP.<\/p>\n<p>If you don&#8217;t currently use 1Password, and if your current password manager doesn&#8217;t offer a similar feature, there&#8217;s another option. You can export your passwords from your current password manager, and then <a href=\"https:\/\/support.1password.com\/import\/\" target=\"_blank\" rel=\"noopener\">import<\/a> them into a 14-day <a href=\"https:\/\/start.1password.com\/sign-up\" target=\"_blank\" rel=\"noopener\">trial<\/a> of 1Password so you can try out Watchtower. (Note: 1Password isn&#8217;t a sponsor, and this is not an endorsement\u2014but we do recommend using a trustworthy\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/\" target=\"_blank\" rel=\"noopener\">password manager<\/a>.)<\/p>\n<p><strong>If your password has been found in a data breach, change it immediately.<\/strong> If you&#8217;re unable to find out for sure whether your password was exposed, it doesn&#8217;t hurt to change it anyway, just as a precaution. You&#8217;ll also want to follow the guide below.<a name=\"recover\"><\/a><\/p>\n<h3>What can I do to recover from a data breach? 9 key steps<\/h3>\n<p>Of course, there isn&#8217;t any way to expunge your personal information that has already been exposed on the Internet; data is infinitely copiable, so you have to assume that there will always be copies of it out there.<\/p>\n<p>Generally speaking, you cannot change your social security number. This is unfortunate, because its exposure puts you at significant risk of identity theft.<a name=\"hibp\"><\/a><\/p>\n<p>So what can you do if any of your sensitive personal data has been exposed? Here are <strong>nine easy steps<\/strong> to protecting yourself.<\/p>\n<h4><strong>1. Register your e-mail addresses with Have I Been Pwned<\/strong><\/h4>\n<p>As mentioned earlier, Have I Been Pwned (HIBP) is a free service run by the trusted security researcher Troy Hunt. <a name=\"pwm\"><\/a>HIBP notifies you if your e-mail address appears in a publicly available data dump. The site also allows you to manually check whether individual passwords are known to have been exposed.<\/p>\n<h4><strong>2. Choose a password manager that comes with data breach monitoring<\/strong><\/h4>\n<p>Also mentioned earlier, 1Password&#8217;s Watchtower feature is integrated with Have I Been Pwned. <a name=\"longpw\"><\/a>This partnership means 1Password customers receive a notification if one of their passwords was leaked due to a data breach. Other <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/\">reputable password managers<\/a> may offer similar features.<\/p>\n<h4><strong>3. Use a long, unique password for each site; never reuse passwords<\/strong><\/h4>\n<p>This will help protect you from <a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/\">credential stuffing attacks<\/a>, which are sometimes the source of data breaches. There are different schools of thought on what constitutes a &#8220;strong&#8221; password, but experts agree that having a <em>long<\/em> password (or passphrase) is crucial. Avoid using patterns that an attacker could use to guess your other passwords. <a name=\"2fa\"><\/a>Consider using a unique string of pseudorandom characters generated by your password manager, or by <a href=\"https:\/\/www.grc.com\/passwords.htm\" target=\"_blank\" rel=\"noopener\">GRC&#8217;s Perfect Passwords generator<\/a>; the latter creates new pseudorandom strings each time you reload the page.<\/p>\n<h4><strong>4. Enable two-factor authentication on all your accounts<\/strong><\/h4>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authentication-how-it-works-and-why-you-should-use-it\/\">Two-factor authentication<\/a> (also called multifactor authentication, or two-step verification) will help protect you in case your passwords leak, especially shortly after the breach occurs or after the data becomes widely available, before the company starts requiring password resets and often before HIBP notifies you that your information may have been exposed. The idea behind two-factor authentication is that if someone obtains your password (&#8220;something you know&#8221;), they&#8217;ll also need something else\u2014typically a phone, an app, or a hardware token (&#8220;something you have&#8221;) or less commonly biometric data based on your unique physical characteristics (&#8220;something you are&#8221;). Unfortunately, not every site or service supports two-step verification, but you should definitely enable the additional layer of security where available. Whenever possible, try to avoid <a name=\"contact\"><\/a><a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-sms-how-it-works-why-its-insecure-and-why-we-still-need-it\/\">SMS text messages<\/a> or a call to your mobile phone as your second step, since <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-protect-yourself-from-sim-swapping-attacks\/\">they&#8217;re hijackable via SIM swapping attacks<\/a>\u2014but if those are your only second-step options, they&#8217;re better than nothing, so use them.<\/p>\n<h4><strong>5. Contact the breached company, if necessary<\/strong><\/h4>\n<p>If you hear of a data breach at a company, service, or website with which you have an account, and HIBP doesn&#8217;t have information about the breach, you can try contacting the company to find out if your information was exposed. <a name=\"scams\"><\/a>If so, they may offer services to help you monitor potential abuse of that data; for example, they may offer free identity theft monitoring for a period of time.<\/p>\n<h4><strong>6. Beware of data breach-related phishing scams<\/strong><\/h4>\n<p>Once word of data breaches hits mainstream news, scammers may begin to send texts, e-mails, or robocalls, or buy malicious ads in Google search results, to try to phish your data. <a name=\"alerts\"><\/a>If you need to contact the breached company, do so via a bookmark you&#8217;ve previously saved in your browser, or by calling a phone number from a known-valid past communication from the company.<\/p>\n<h4><strong>7. Set up fraud alerts, and consider freezing your credit<\/strong><\/h4>\n<p>You can set up free <strong>fraud alerts<\/strong> with credit bureaus such as Equifax, Experian, and TransUnion. The FTC <a href=\"https:\/\/consumer.ftc.gov\/articles\/what-know-about-credit-freezes-fraud-alerts\" target=\"_blank\" rel=\"noopener\">explains<\/a> that you can place a fraud alert &#8220;when you\u2019re concerned about identity theft. It makes it harder for someone to open a new credit account in your name. It\u2019s free and lasts 1 year.&#8221; After that year expires, you may want to renew it; consider adding an event to your calendar to ensure you don&#8217;t forget.<\/p>\n<p>A step up from fraud alerts is a\u00a0<strong>credit freeze<\/strong> (or\u00a0<strong>security freeze<\/strong>). Data breaches are extremely common, and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/massive-data-leak-2-7-billion-records-of-u-s-canada-uk-residents-including-social-security-numbers\/\" target=\"_blank\" rel=\"noopener\">most adults&#8217; Social Security Numbers have already leaked<\/a>; therefore, <strong>freezing your credit is more important than ever to help prevent fraud.<\/strong> Note that you&#8217;ll need to remember to temporarily unfreeze your credit before applying for credit\u2014and then remember to freeze it again afterward.<a name=\"idprot\"><\/a><\/p>\n<p>Here are the direct links to the pages for freezing (and unfreezing) your credit at <a href=\"https:\/\/www.equifax.com\/personal\/credit-report-services\/credit-freeze\/\" target=\"_blank\" rel=\"noopener\">Equifax<\/a>, <a href=\"https:\/\/www.experian.com\/freeze\/center.html\" target=\"_blank\" rel=\"noopener\">Experian<\/a>, and <a href=\"https:\/\/www.transunion.com\/credit-freeze\" target=\"_blank\" rel=\"noopener\">TransUnion<\/a>.<\/p>\n<h4><strong>8. Consider using an identity theft protection service<\/strong><\/h4>\n<p>After a breach becomes public knowledge, major companies typically offer a free year of credit monitoring to their customers. You can sign up for these services if you wish. Since big data breaches happen fairly often, you may be &#8220;lucky&#8221; enough to get free credit monitoring on an almost yearly basis. Alternatively, you can pay for a service on your own; <a name=\"pii\"><\/a><a href=\"https:\/\/www.aura.com\" target=\"_blank\" rel=\"noopener\">Aura<\/a> is a well-regarded service, but there are many out there. These services typically go beyond basic protections and can offer identity theft insurance, help you to resolve challenges resulting from identity theft or fraud, and more.<\/p>\n<h4><strong>9. Whenever possible, avoid sharing personally identifiable information (PII)<\/strong><\/h4>\n<p>Providing personally identifiable information is often a prerequisite for signing up for banking, a mobile phone, or other services. But whenever it&#8217;s optional, you can choose not to share such data. Do you really need to make your birth date or phone number available to everyone on Facebook? Probably not, so try to avoid oversharing. When filling out forms, look for optional fields, and leave them blank. Sometimes online forms aren&#8217;t clear about which fields are either required or optional until you try to continue. So here&#8217;s a pro tip: Try entering the minimum amount of information and then submitting the form, and only fill in only the fields that it tells you are required to continue.<\/p>\n<p>And a related tip: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-and-answer-security-questions\/\">Don&#8217;t answer &#8220;security questions&#8221; with real answers<\/a>. The true answers to such questions can often be found online or social-engineered from you, so you&#8217;re better off answering with something entirely different; for example, use yet another unique password or passphrase, which you can also store in your password manager. Don&#8217;t use predictable answers to security questions; doing so can become the weak link in the chain that enables a hacker to break into your accounts.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>For additional tips, check out these related articles:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/\" target=\"_blank\" rel=\"noopener\">8 Things to Do Right Now if You\u2019ve Been Hacked<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/\" target=\"_blank\" rel=\"noopener\">How to Choose the Right Password Manager for You<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authentication-how-it-works-and-why-you-should-use-it\/\" target=\"_blank\" rel=\"noopener\">Two-Factor Authentication: How It Works and Why You Should Use It<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-and-answer-security-questions\/\" target=\"_blank\" rel=\"noopener\">How to Choose and Answer Security Questions<\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data breaches happen all the time; what can you do to protect yourself from leaks, hacker attacks, and identity theft? Here are 9 easy steps you can take to protect your information and recover from data leaks. Use this as your data breach response plan.<\/p>\n","protected":false},"author":14,"featured_media":16491,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,13],"tags":[43,353,96],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Data breaches happen all the time; what can you do to protect yourself from leaks, hacker attacks, and identity theft? Here are 9 easy steps you can take to protect your information and recover from data leaks. Use this as your data breach response plan.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to do after a data breach\u2014and how to avoid getting hacked\u2014in 9 easy steps - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Data breaches happen all the time; what can you do to protect yourself from leaks, hacker attacks, and identity theft? Here are 9 easy steps you can take to protect your information and recover from data leaks. Use this as your data breach response plan.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-09T17:45:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-16T17:42:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hackFT.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"266\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hackFT.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hackFT.jpg\",\"width\":400,\"height\":266,\"caption\":\"Hackers hit, leading to data breach - newspaper headline\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/\",\"name\":\"What to do after a data breach\\u2014and how to avoid getting hacked\\u2014in 9 easy steps - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#primaryimage\"},\"datePublished\":\"2024-08-09T17:45:50+00:00\",\"dateModified\":\"2024-08-16T17:42:52+00:00\",\"description\":\"Data breaches happen all the time; what can you do to protect yourself from leaks, hacker attacks, and identity theft? Here are 9 easy steps you can take to protect your information and recover from data leaks. Use this as your data breach response plan.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What to do after a data breach\\u2014and how to avoid getting hacked\\u2014in 9 easy steps\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"What to do after a data breach\\u2014and how to avoid getting hacked\\u2014in 9 easy steps\",\"datePublished\":\"2024-08-09T17:45:50+00:00\",\"dateModified\":\"2024-08-16T17:42:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#webpage\"},\"wordCount\":2203,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hackFT.jpg\",\"keywords\":[\"Data Breach\",\"Password Security\",\"Passwords\"],\"articleSection\":[\"Recommended\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Data breaches happen all the time; what can you do to protect yourself from leaks, hacker attacks, and identity theft? Here are 9 easy steps you can take to protect your information and recover from data leaks. Use this as your data breach response plan.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/","og_locale":"en_US","og_type":"article","og_title":"What to do after a data breach\u2014and how to avoid getting hacked\u2014in 9 easy steps - The Mac Security Blog","og_description":"Data breaches happen all the time; what can you do to protect yourself from leaks, hacker attacks, and identity theft? Here are 9 easy steps you can take to protect your information and recover from data leaks. Use this as your data breach response plan.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2024-08-09T17:45:50+00:00","article_modified_time":"2024-08-16T17:42:52+00:00","og_image":[{"width":400,"height":266,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hackFT.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hackFT.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hackFT.jpg","width":400,"height":266,"caption":"Hackers hit, leading to data breach - newspaper headline"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/","name":"What to do after a data breach\u2014and how to avoid getting hacked\u2014in 9 easy steps - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#primaryimage"},"datePublished":"2024-08-09T17:45:50+00:00","dateModified":"2024-08-16T17:42:52+00:00","description":"Data breaches happen all the time; what can you do to protect yourself from leaks, hacker attacks, and identity theft? Here are 9 easy steps you can take to protect your information and recover from data leaks. Use this as your data breach response plan.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"What to do after a data breach\u2014and how to avoid getting hacked\u2014in 9 easy steps"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"What to do after a data breach\u2014and how to avoid getting hacked\u2014in 9 easy steps","datePublished":"2024-08-09T17:45:50+00:00","dateModified":"2024-08-16T17:42:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#webpage"},"wordCount":2203,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hackFT.jpg","keywords":["Data Breach","Password Security","Passwords"],"articleSection":["Recommended","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hackFT.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-mcP","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/85363"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=85363"}],"version-history":[{"count":12,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/85363\/revisions"}],"predecessor-version":[{"id":101441,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/85363\/revisions\/101441"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/16491"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=85363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=85363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=85363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}