What to Do If Your Data Was Leaked in a Data Breach

Data is one of the most valuable resources in modern society. Social media and search companies make billions of dollars by gathering information about people and selling it to advertisers.  

 

But it’s not just legitimate companies who see value in your data. Criminals do too. They steal login details so they can get into your accounts and steal information or to extort you. They might also take sensitive work documents and sell them to your rivals. Or, as is increasingly common, criminals often steal large amounts of data in bulk, which they then sell to other criminals on black market sites on the dark web.    

 

Google ‘data breach news’, and you’ll find page after page of real-life cases where data has been taken by thieves. That data could easily include information about you. So how can you tell if your personal data has been leaked, and what should you do if it has? Read on to find out.  

 

Before we start

 

Data breaches are both a security and a privacy problem, but MacKeeper can help with both. As well as real-time malware protection, it offers an ID Theft Guard feature and a full VPN client. This protects your privacy and encrypts your web traffic. You can try it now, with one free fix for each of its many tools.  

How to identify if your personal information has been compromised

If a cybercriminal takes your data with the intention of extorting, then they’ll let you know about it. That could be via an email, a phone call or any other communication method. They might find embarrassing photos or messages and threaten to share them unless you pay a ransom.  

 

In many cases, criminals will steal usernames and passwords, which they’ll either use themselves or sell to others. To them, it’s important that you don’t know your login has been leaked, because they don’t want you to change your password.  

 

Although cybercriminals often try to stay hidden, there are still signs you can check for and ways to see if your details have been stolen:

  • Look for unusual activity on your account, like changes in your settings or purchases you don’t remember making.
  • In the case of stolen credit and debit cards, criminals might make large withdrawals, possibly clearing out your accounts. Or they might make lots of smaller purchases and withdrawals that you’re less likely to notice.
  • If you get a password reset email that you didn’t request, someone could be trying to get into your account.
  • You may find you can’t log into an account even though you’re using the right login. This is because hackers may have changed your password to lock you out.
  • Enter your details into a data breach protection tool, like Have I Been Pwned. This free tool lets you know if your email address or phone number were involved in known data breaches.
Have I Been Pwned welcome screen

What to do if your data has been stolen

If you do find your data has been taken, it’s not necessarily the end of the world. There’s no way to ‘unleak’ it once it’s out there, but you can take steps to limit the damage and stop it happening again.  

Change your passwords

This might seem obvious but it bears repeating. Should you find one of your passwords has been stolen, it’s vital to change it immediately.  

 

There are a few key things to remember when changing your passwords after a data breach:

  • Use a strong password, with a mix of number, lowercase and uppercase letters and symbols. You can make it easier for yourself by using a password manager to generate and save your logins
  • Change your password anywhere else you’ve used it. Using the same password for more than one account is a terrible idea, because if hackers get your login details for one site, they’ll try them everywhere
  • Make sure your computer is malware-free. If criminals have installed a keylogger on your system, they’ll be able to read what you type when you change your password

 Let relevant people know about your data leak

It’s not only your data that can be affected if someone has your personal information. For example, if a cybercriminal gets access to your email account, they can access your contacts database. That could give them access to a huge amount of personal information, including email addresses, phone numbers, postal addresses, birthdays and more.  

 

As well as targeting these people too, hackers could use what they find to impersonate you, to extract money or information from your contacts. It’s not usually necessary to tell other people about your data breach, but in some situations it can be a good idea.  

 

Here are some of the people you might want to contact if your personal data is stolen:

  • Your bank, so you can block cards and prevent unauthorized transactions
  • Family and friends, whose data may also have been stolen. You can also warn them to look out for imposters
  • Your boss and colleagues if workplace data has been taken
  • Website owners whose sites have been compromised. They may not even know it’s happened
  • The police, if you believe a data breach is particularly serious or if sensitive information has been stolen

Run a full virus scan

If a website suffers a data breach, that’s out of your control. But you might also be leaking data because they’re malware on your Mac. You should run a full virus scan to make sure there’s no malware leaking your information to hackers.  

 

You can run a virus scan with MacKeeper Antivirus in a few easy steps:

 

1. In MacKeeper, select Antivirus, and click Start scan

MacKeeper Antivirus

2. Wait while MacKeeper scans your computer

MacKeeper Antivirus scan in progress

3. When the scan is finished, select any malware that’s found, and click Move to Quarantine

MacKeeper > move to qaurantine

Set up multi-factor authentication

With multi-factor authentication, you log into your accounts with more than just your username and password. Instead there are other ‘factors’ that you need too. This will usually be something that you know or something that you possess.  

 

Common ways to use multi-factor authentication include:

  • A temporary, one-time password or PIN. This may be sent to you as a text message or an email, or through a dedicated app like Google Authenticator 
  • A pop-up on your phone, which requires you to confirm you’re trying to log into an account on another device
  • Biometric authentication measures like fingerprint scans, face recognition and voice recognition
  • A physical authentication device, such as a YubiKey, which your phone or computer reads via USB or near-field communication (NFC)
App Store > Google Authenticator

Set up data breach protection

It’s impractical to keep checking if your personal data has been stolen. Luckily, you don’t have to. With MacKeeper, you can simply enter your email addresses, and it will let you know if they’re found in known data breaches.  

 

Here’s how to set up MacKeeper’s ID Theft Guard feature:

 

1. Open MacKeeper, and select ID Theft Guard from the sidebar

 

2. MacKeeper will automatically find email addresses linked to your Mac. Click Check for Breaches

MacKeeper ID Theft Guard feature

3. If you see an address that’s not yours, select it, and click the trash icon

MacKeeper ID Theft Guard feature

4. You can also verify new addresses by clicking the Send code button

MacKeeper ID Theft Guard > review leaked personal records

5. Once accounts are verified, you can see if an address has been compromised. Look through the results and take the recommended actions

MacKeeper ID Theft Guard > review leaked personal records

6. Click Mark as fixed when done

MacKeeper ID Theft Guard > review leaked personal records

Can you stop your data from being stolen?

In a word, no. If you want to buy things from the internet, use online banking or talk to people on social media, you’ll have to hand over personal details. As soon as you give your data to a third party, it’s their responsibility to take care of it and protect it. Unfortunately, there’s no way to guarantee that’s happening, and some website owners end up doing stupid things like storing passwords in unencrypted text documents.  

 

While you can’t prevent these things happening, you can improve your chances of keeping your data safe. Follow best practices for protecting your online privacy and securing your Mac. Don’t download files from websites you don’t trust or email attachments from people you don’t know. These kinds of measures will reduce the chance that you’ll end up getting malware that steals your data.  

 

With the right mix of precautions and awareness, you can stop data breaches turning into much bigger problems.  

 

Read more:

Use your Mac to the fullest! Sign up and get:
Effective tips on how to fix Mac issues
Reliable advice on how to stay safe online
Mac-world news and updates

Thank you!

You’ll love exploring your Mac with us.

Oops, something went wrong.

Try again or reload a page.

Here’s another sign you need to upgrade your macOS ASAP:

30% off your MacKeeper subscription

Сopy the code now and use it in the MacKeeper checkout after the upgrade.

Copy Code

Please be aware that this code cannot be combined with any other discounts, offers, or promotions.

Contents

Unlocked

Keep your private data safe. Check out MacKeeper today

Try it now
PC

MacKeeper - your all-in-one solution for more space and maximum security.

Try Now

Read more

What is FileVault Disk Encryption on Mac and How to Use it
What is FileVault Disk Encryption on Mac and How to Use it
How to Browse Privately in Safari on a Mac
How to Browse Privately in Safari on a Mac
arrow

Run Application

step_1

Click Continue

step_2

Click Install

step_1

Your macOS version is lower than OS 10.11. We’d like to offer you MacKeeper 4 to solve the cleaning, privacy, and security issues of your macOS.