{"id":15082,"date":"2019-01-21T04:08:32","date_gmt":"2019-01-21T04:08:32","guid":{"rendered":"http:\/\/www.lifeandnews.com\/articles\/?p=15082"},"modified":"2019-01-22T10:10:55","modified_gmt":"2019-01-22T10:10:55","slug":"data-breaches-are-inevitable-heres-how-to-protect-yourself-anyway","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/data-breaches-are-inevitable-heres-how-to-protect-yourself-anyway\/","title":{"rendered":"Data breaches are inevitable \u2013 here&#8217;s how to protect yourself anyway"},"content":{"rendered":"<p><a href=\"https:\/\/theconversation.com\/profiles\/w-david-salisbury-664918\">W. David Salisbury<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/university-of-dayton-1726\">University of Dayton<\/a><\/em> and <a href=\"https:\/\/theconversation.com\/profiles\/rusty-baldwin-664994\">Rusty Baldwin<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/university-of-dayton-1726\">University of Dayton<\/a><\/em><\/p>\n<p>It\u2019s tempting to give up on data security altogether, with all the billions of pieces of personal data \u2013 <a href=\"https:\/\/www.foxnews.com\/tech\/oklahoma-government-data-leak-exposed-fbi-investigations-emails-dating-back-17-years-social-security-numbers\">Social Security numbers<\/a>, credit cards, home addresses, phone numbers, <a href=\"https:\/\/www.zdnet.com\/article\/over-87gb-of-email-address-and-passwords-exposed-in-collection-1-dump\/\">passwords and much more<\/a> \u2013 <a href=\"https:\/\/finance.yahoo.com\/news\/tell-account-1-50-million-213639244.html\">breached<\/a> and <a href=\"http:\/\/news.marriott.com\/2018\/11\/marriott-announces-starwood-guest-reservation-database-security-incident\/\">stolen in recent years<\/a>. But that\u2019s not realistic \u2013 nor is the idea of going offline entirely. In any case, <a href=\"https:\/\/theconversation.com\/equifax-breach-is-a-reminder-of-societys-larger-cybersecurity-problems-84034\">huge data-collection corporations<\/a> vacuum up data about almost every American without their knowledge.<\/p>\n<div data-react-class=\"Tweet\" data-react-props=\"{&quot;tweetId&quot;:&quot;1072172860972650498&quot;}\"><\/div>\n<p>As <a href=\"https:\/\/scholar.google.com\/citations?user=YBp-2_4AAAAJ&amp;hl=en\">cybersecurity<\/a> <a href=\"https:\/\/scholar.google.com\/citations?user=fUzQI8wAAAAJ&amp;hl=en\">researchers<\/a>, we offer good news to brighten this bleak picture. There are some simple ways to protect your personal data that can still be effective, though they involve changing how you think about your own information security.<\/p>\n<p>The main thing is to assume that you are a target. Though most individual people aren\u2019t specifically being watched, software that mines massive troves of data \u2013 enhanced by artificial intelligence \u2013 can target vast numbers of people almost as easily as any one person. Think defensively about how you can protect yourself from an almost inevitable attack, rather than assuming you\u2019ll avoid harm.<\/p>\n<h2>What\u2019s most important now?<\/h2>\n<p>That said, it\u2019s unproductive and frustrating to think you must pay attention to every possible avenue of attack. Simplify your approach by focusing on what information you most want to protect.<\/p>\n<p>Covering the obvious, <a href=\"https:\/\/theconversation.com\/the-petya-ransomware-attack-shows-how-many-people-still-dont-install-software-updates-77667\">keep your software up-to-date<\/a>. Software companies issue updates when they fix <a href=\"https:\/\/theconversation.com\/what-are-software-vulnerabilities-and-why-are-there-so-many-of-them-77930\">security vulnerabilities<\/a>, but if you don\u2019t download and install them, you\u2019re leaving yourself unprotected from malware such as <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/family-safety\/what-is-a-keylogger\/\">keystroke loggers<\/a>. Also, <a href=\"https:\/\/theconversation.com\/spearphishing-roiled-the-presidential-campaign-heres-how-to-protect-yourself-68274\">be smart about what links you click<\/a> in your email or when browsing the web \u2013 you could inadvertently download malicious software to your phone or computer, or allow hackers access to your online accounts.<\/p>\n<p>In terms of online data, the most important information to protect is your login credentials for key accounts \u2013 like banking, government services, email and social media. You can\u2019t do much about how well websites and companies safeguard your information, but you can make it harder for hackers to get into your account, or at least more than one of them.<\/p>\n<figure class=\"align-center zoomable\"><a href=\"https:\/\/images.theconversation.com\/files\/253773\/original\/file-20190114-43517-10199bh.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img src=\"https:\/\/images.theconversation.com\/files\/253773\/original\/file-20190114-43517-10199bh.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\" srcset=\"https:\/\/images.theconversation.com\/files\/253773\/original\/file-20190114-43517-10199bh.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=397&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/253773\/original\/file-20190114-43517-10199bh.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=397&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/253773\/original\/file-20190114-43517-10199bh.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=397&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/253773\/original\/file-20190114-43517-10199bh.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=499&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/253773\/original\/file-20190114-43517-10199bh.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=499&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/253773\/original\/file-20190114-43517-10199bh.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=499&amp;fit=crop&amp;dpr=3 2262w\" alt=\"\" \/><\/a><figcaption><span class=\"caption\">Reusing login names and passwords is a significant risk.<\/span><br \/>\n<span class=\"attribution\"><a class=\"source\" href=\"https:\/\/www.shutterstock.com\/image-photo\/login-password-on-computer-screen-80294515\">Mihai Simonia\/Shutterstock.com<\/a><\/span><\/figcaption><\/figure>\n<p>How? The first step is to use a different username and password on each crucial site or service. This can be complicated by sites\u2019 limits on username options \u2013 or their dependence on email addresses. Similarly, many sites have requirements on passwords that limit their length or the number or type of characters that they can include. But do your best.<\/p>\n<p>The reason for this is straightforward: When a bunch of usernames and passwords fall into malicious hands, hackers know it\u2019s human nature to <a href=\"https:\/\/www.zdnet.com\/article\/repeat-after-me-reusing-passwords-is-bad\/\">repeat usernames and passwords across many sites<\/a>. So they <a href=\"https:\/\/finance.yahoo.com\/news\/1-9-billion-stolen-passwords-173207888.html\">almost immediately start trying those combinations<\/a> anywhere they can \u2013 like major banks and email services. A chief information security officer we know in the banking industry told us that after the <a href=\"https:\/\/www.nbcnews.com\/tech\/tech-news\/yahoo-pay-50m-offer-credit-monitoring-massive-security-breach-n923531\">Yahoo breach of a few years ago<\/a>, banking sites were hit with multiple attempts to log in with credentials stolen from Yahoo.<\/p>\n<h2>Use long passwords<\/h2>\n<p>There has been a lot of research about what <a href=\"https:\/\/www.howtogeek.com\/195430\/how-to-create-a-strong-password-and-remember-it\/\">makes a strong password<\/a> \u2013 which has often led to many people using complex passwords like \u201c7hi5!sMyP@s4w0rd.\u201d But more recent research suggests that what matters much more is that <a href=\"https:\/\/crambler.com\/password-security-why-secure-passwords-need-length-over-complexity\/\">passwords are long<\/a>. That\u2019s what makes them <a href=\"https:\/\/www.betterbuys.com\/estimating-password-cracking-times\/\">more resistant to an attempt to guess them<\/a> by trying many different options. Longer passwords don\u2019t have to be harder to remember: They could be easily recalled phrases like \u201cMyFirstCarWasAToyotaCorolla\u201d or \u201cInHighSchoolIWon9Cross-CountryRaces.\u201d<\/p>\n<p>It can be daunting to think about remembering all these different usernames and passwords. Password management software can help \u2013 though choose carefully as more than one of them have <a href=\"https:\/\/lifehacker.com\/lastpass-hacked-time-to-change-your-master-password-1711463571\">been<\/a> <a href=\"https:\/\/www.zdnet.com\/article\/data-of-2-4-million-blur-password-manager-users-left-exposed-online\/\">breached<\/a>. It can be even safer \u2013 despite conventional wisdom and decades of security advice \u2013 to write them down, so long as you trust everyone who has access to your home.<\/p>\n<h2>Use a third line of defense<\/h2>\n<figure class=\"align-right \"><img src=\"https:\/\/images.theconversation.com\/files\/161839\/original\/image-20170321-5405-mcf0su.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=237&amp;fit=clip\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\" srcset=\"https:\/\/images.theconversation.com\/files\/161839\/original\/image-20170321-5405-mcf0su.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=250&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/161839\/original\/image-20170321-5405-mcf0su.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=250&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/161839\/original\/image-20170321-5405-mcf0su.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=250&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/161839\/original\/image-20170321-5405-mcf0su.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=314&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/161839\/original\/image-20170321-5405-mcf0su.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=314&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/161839\/original\/image-20170321-5405-mcf0su.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=314&amp;fit=crop&amp;dpr=3 2262w\" alt=\"\" \/><figcaption><span class=\"caption\">Have hackers driven us back to the age of the physical key?<\/span><br \/>\n<span class=\"attribution\"><a class=\"source\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File%3AU2F.USB-Token.jpg\">Bautsch<\/a><\/span><\/figcaption><\/figure>\n<p>To add <a href=\"https:\/\/theconversation.com\/clean-up-your-cyber-hygiene-6-changes-to-make-in-the-new-year-108565\">another layer of protection<\/a> \u2013 including against troublesome housemates \u2013 many sites (<a href=\"https:\/\/www.google.com\/landing\/2step\/\">Google<\/a>, for example) let you turn on what\u2019s called multi-factor authentication. This can be an app on your smartphone that generates a numeric code every 30 seconds or so, or a physical item you <a href=\"https:\/\/theconversation.com\/the-age-of-hacking-brings-a-return-to-the-physical-key-73094\">plug into your computer\u2019s USB port<\/a>. While they can <a href=\"https:\/\/www.howtogeek.com\/361244\/sms-two-factor-auth-isn%E2%80%99t-perfect-but-you-should-still-use-it\/\">afford at least some protection<\/a>, <a href=\"https:\/\/theconversation.com\/encrypted-smartphones-secure-your-identity-not-just-your-data-91715\">be wary of sites<\/a> that send you a <a href=\"https:\/\/www.computerweekly.com\/news\/252455536\/2FA-bypass-tool-highlights-top-business-security-vulnerabilities\">text with a code<\/a>; <a href=\"http:\/\/fortune.com\/2016\/07\/26\/nist-sms-two-factor\/\">that method<\/a> <a href=\"https:\/\/www.theverge.com\/2017\/9\/18\/16328172\/sms-two-factor-authentication-hack-password-bitcoin\">is vulnerable<\/a> <a href=\"https:\/\/www.theverge.com\/2018\/11\/16\/18098286\/vovox-security-breach-two-factor-authentication-2fa-codes-exposed\">to interception<\/a>.<\/p>\n<p>With these straightforward steps \u2013 and the new mindset of thinking like a target who wants to avoid getting hit \u2013 you\u2019ll be far less worried when news breaks of the next breach of some company\u2019s enormous data files. Bad guys may get one of your usernames, and maybe even one of your passwords \u2013 so you\u2019ll have to change those. But they won\u2019t have all your credentials for all your online accounts. And if you use multi-factor authentication, the bad guys might not even be able to get into the account whose credentials they just stole.<\/p>\n<p>Focus on what\u2019s most important to protect, and use simple \u2013 but effective \u2013 methods to protect yourself and your information.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img loading=\"lazy\" style=\"border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important; text-shadow: none !important;\" src=\"https:\/\/counter.theconversation.com\/content\/109763\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" \/><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: http:\/\/theconversation.com\/republishing-guidelines --><\/p>\n<p><a href=\"https:\/\/theconversation.com\/profiles\/w-david-salisbury-664918\">W. David Salisbury<\/a>, Sherman-Standard Register Professor of Cybersecurity Management, Director Center for Cybersecurity &amp; Data Intelligence, <em><a href=\"http:\/\/theconversation.com\/institutions\/university-of-dayton-1726\">University of Dayton<\/a><\/em> and <a href=\"https:\/\/theconversation.com\/profiles\/rusty-baldwin-664994\">Rusty Baldwin<\/a>, Distinguished Research Professor of Computer Science; Director of Research, Center for Cybersecurity and Data Intelligence, <em><a href=\"http:\/\/theconversation.com\/institutions\/university-of-dayton-1726\">University of Dayton<\/a><\/em><\/p>\n<p>This article is republished from <a href=\"http:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/data-breaches-are-inevitable-heres-how-to-protect-yourself-anyway-109763\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>W. David Salisbury, University of Dayton and Rusty Baldwin, University of Dayton It\u2019s tempting to give up on data security altogether, with all the billions of pieces of personal data \u2013 Social Security numbers, credit cards, home addresses, phone numbers, passwords and much more \u2013 breached and stolen in recent years. But that\u2019s not realistic [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":15079,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3410],"tags":[612,4257,5794,2555,5795,2288,2290],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/15082"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=15082"}],"version-history":[{"count":2,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/15082\/revisions"}],"predecessor-version":[{"id":15084,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/15082\/revisions\/15084"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/15079"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=15082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=15082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=15082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}