Compromised Data
Your data is compromised if your data is accessed, copied, modified, damaged, destroyed, deleted, distributed or transmitted by a third party in any way.
How to detect - the signs to watch out for
- Check data breach websites Enter your e-mail into one of the data breach websites (HaveIbeenPwned? , Dehashed, Firefox Monitor, etc.) that track breaches and verify them as genuine.
- Watch out for fake antivirus messages If you get unexpected and fake antivirus messages, you most likely were part of a data breach.
- Change your passwords Keeping the same passwords for years makes you an easy target. Follow the basic guidelines streamlined in the ‘What you need to know - Password’ site.
- Monitor your e-mail-, bank-, and other accounts If you notice any change that you did not initiate, find out what may have happened.
How to react - the reflexes to adopt
- Immediately change the password for the account in question.
- If the same password has been used for more than one account, change the passwords for all those accounts.
- Notify the account administrator that your log-in data has been compromised or published on the Internet.
- If a criminal has already changed your password, immediately notify your account administrator so they can block access to the account in question.
- Make a list of the information that is accessible on your account: if any information grants access to other accounts, take steps to protect them.
Make sure to never use the same password for multiple accounts: if one service you use is breached, you should consider all the accounts using the same password as compromised.
Go further:
For more info:
Services & Tools:
Training: