Learn how to protect your accounts after data breaches

With an increasingly digital world, whether through social relationships or financial transactions, the risk of data leak is growing. Credit cards, home addresses, document numbers, all data is potentially viable for a leak.

And what to do in this situation? The first step is to remain calm, the second is to read the entirety of this article in which we explain in detail how to proceed if any of your information is exposed.

How to find out if my data has been leaked

(Source: Pexels)(Source: Pexels)Source: Pexels

There are those who are unfortunate enough to find out only when their bank contacts them saying that purchases were made using their credit card. If that’s not the case for you, there are some sites where you can find out if the security of your information has been corrupted.

One of them, “My Password”, shows if your password has been exposed by hackers. For those who use the Firefox browser, Mozilla offers a tool called “Firefox Monitor” that checks for you if the safety of your data has been breached.

The “Have I Been Pwned” website is one of the oldest tools to measure the protection of your information. Using your e-mail, it allows you to carry out searches in databases of more than 300 websites.

The Central Bank offered a tool called “Registrato”, which monitors the security of your CPF, showing if it was used inadvertently. It requires a .GOV system account, but is currently being used for the Federal Government Amounts Receivable tool.

What do I do if I have my information exposed

(Source: Pexels)(Source: Pexels)Source: Pexels

Have you visited any of the sites we suggested above and found that your information has been compromised? What you should do will depend on what leaked. For example, if you find your email or password flagged as having been exposed, you have two ways to go:

  • Immediately change the password, without forgetting to use a secure combination, involving letters, numbers and special characters; the use of two-step verification methods is highly recommended;
  • Never open emails with suspicious content, especially links and attachments received from unknown senders; if the suspicious material is from someone you know, delete it without opening it and try to contact the person by another method to confirm the veracity of the information.

People with exposed information are also more likely to be victims of scams. For this reason, it is also recommended that you communicate to relatives, friends and co-workers that your data may be used. Letting them know can prevent them from falling prey to scams and embezzlers.

With that in mind, security experts also suggest that information from messaging apps like WhatsApp is not public, like your photo. Another tip is to avoid sharing your location publicly. Privacy is gold.

Check out important tips for your digital protection

1. Create secure passwords

(Source: Pixabay)(Source: Pixabay)Source: Pixabay

We have already said above the importance of creating complex passwords, interspersing uppercase and lowercase letters, numbers and special characters. Some systems, websites and apps offer a password generation tool that follows these rules. We also suggest password managers.

2. Don’t use the same password in different places

(Source: Pixabay)(Source: Pixabay)Source: Pixabay

In an era where we need to record a lot of information, using the same password on different websites and apps can seem tempting. However, experts warn of the risk of following this practice. In case of compromise, if you use different passwords across applications and websites, you are less exposed.

3. Enable 2-Step Verification

(Source: Pixabay)(Source: Pixabay)Source: Pixabay

There is consensus: two-step verification will not prevent your passwords from being exposed, but it will make it very difficult for criminals to act. Most social networks, communication apps and email servers already offer the mechanism.

4. Notify the authorities

(Source: Reproduction/Civil Police)(Source: Reproduction/Civil Police)Source: Reproduction/Civil Police

We’ve already talked about communicating your circle of contacts, but another important step is to communicate with the authorities. You can file an Incident Report online. Many states already offer the service.

Just access the website of the Civil Police or the Virtual Police Station of your state and check the possibility of making the communication through the option “Other Occurrences”. It is an effective way to prevent your data from being used in fraud.

5. Watch out for suspicious content

(Source: Pexels)(Source: Pexels)Source: Pexels

E-mail with miraculous proposals, WhatsApp messages offering easy money. These are just some of the ways suspicious content finds its way to you.

Avoid clicking on links received from unknown people, also do not register on sites that do not use encryption or security methods such as SSL. Much less accept to install applications or programs downloaded from suspicious locations.

6. Seek justice if you are harmed

(Source: Reproduction/Procon-PR)(Source: Reproduction/Procon-PR)Source: Reproduction/Procon-PR

The sluggishness of justice can lead people not to be interested in going to court for compensation for possible damages. Experts point out the importance that, if you feel harmed, look for Procon.

You can also report the case on the Consumer.gov platform. Finally, there is the possibility of filing a lawsuit in Special Civil Courts.

Leave a Comment