Contributor:
James.Maude
September 23rd, 2016

Yahoo what?

Following the Yahoo breach many users are concerned about their online safety and what to do next. As with all data breaches although a lot of the issues are beyond the control of the user there are some straightforward measures that they can take to be as safe as possible online.

Passwords

Passwords should be long, strong and unique, worryingly the most common passwords in 2016 are: “123456” , ”password” and “12345678”.

If you are using a simple or common password you are at risk with or without a breach. Attackers maintain lists of common passwords and simply cycle through them to gain access to accounts. If you struggle to remember long complex passwords try using more memorable pass phrases like:

Best-holiday-dolphin13

It is easier for your brain to remember so you can create a much longer password that is harder for an attacker to brute force. You should also not reuse passwords across different websites especially those that contain sensitive information such as email and banking websites.

If you really want to ensure strong unique passwords it is worth considering using a password manager app. These apps can generate and store unique passwords for every site you use and store it in a secure “vault” that you unlock with a fingerprint or one master password.

Multifactor authentication

Almost all the major platforms offer the option to enable multifactor authentication. In simple terms this means that when you log in using a new device they send a code to your phone to verify it is really you. In the event your password is stolen the attacker is unable to login without this code. This is a really quick win in terms of online safety.

Monitor yourself

Users should be aware of their digital footprint; many users are often unaware of quiet how much personal information they share online. Look at privacy settings on social media and Google yourself to see what can be found.

haveibeenpwned.com is a website which can notify users if their details have appeared in any past or inevitably future data breaches. Think of it as credit monitoring for your online identity.

Be suspicious

Attackers often use events in the news such as this breach as a catalyst to trick users by sending out spam emails pretending to be associated with the breached company. These emails often have malware attachments they want the user to open or they are trying to get the user to fill in valuable personal details and passwords. If in doubt go directly to the website and contact the company directly to verify if any contact is genuine. Avoid clicking links or opening attached files.

Taking these measures should help you stay ahead of the attackers as much as possible by restricting their ability to reuse and abuse stolen information.

More from the Blog

Related technology and security insights

  • 28
    Jun
  • Story related

    NotPetya ransomware: Attack analysis

    On June 27, 2017 a number of organisations across Europe began reporting significant system outages caused by a ransomware strain referred to as Petya. The ransomware is very similar to older Petya ransomware attacks from previous years, but the infection ...