What To Do When Your Password is Exposed in a Data Breach (2024)

  • Team SpyCloud
  • Best Practices
What To Do When Your Password is Exposed in a Data Breach (1)

Breaches happen all the time. While none of us can control how other companies protect our data, we can do plenty to protect ourselves.

Our first recommended action after a breach is for the exposed users to immediately change their password for that account – and for any other accounts that are protected by the same (or a similar) password. With an attack type called credential stuffing, one reused password can give criminals an open door to your other accounts. When your password is compromised, bad actors can take over your account, posing as the legitimate owner – accessing sensitive personal data, draining accounts, and making fraudulent purchases.

In the case of an account takeover of a corporate account, the criminal may be able to steal data that facilitates additional attacks, including ransomware, against the enterprise.

Since few of us can remember a complex, unique password for every account we own, it’s easy to become complacent, but that just encourages bad actors. They already have so much to work with: last year alone, SpyCloud recaptured 1.7 billion credentials exposed in data breaches and being sold or traded on the darknet. Additionally, we found a staggering number of corporate email addresses and plaintext passwords in our dataset – 27.36 million pairs of credentials associated with Fortune 1000 employees.

With everyone relying on digital identities now more than ever, cybercriminals have a lot more opportunity to profit from passwords and identity data exposed in breaches. The key is to act quickly after an exposure so you shut down their ability to profit from that stolen data.

My Corporate Credentials Were Exposed In a Data Breach – Now What?

Here are 4 steps to keep accounts safe if your password is found in a data breach.

Step

Change the Exposed Password Immediately

Cybercriminals act fast. They know the clock is ticking from the moment credentials are stolen. They use sophisticated technology and bots to compare the password against thousands of common websites and apps. By changing the exposed password the moment a breach is discovered, you minimize the risk that the criminal can use the password to access any personal or work data.

Experts highly recommend using complex passwords that are unique for every account. Using the same password on multiple accounts or reusing an old password is extremely risky. Check out SpyCloud’s tips for strong passwords for more recommendations on how to create unique, complex passwords that enhance your password hygiene.

Step

Change All Variations of the Compromised Password

When people are prompted to change their passwords, most decide to simply change a character or two. This may seem like a good idea and make it easier to remember, but cybercriminals are expecting it. They can take just a few characters of a compromised password and quickly crack the rest of it, even if it was recently changed. However, our research shows that cracking a complex password can take decades and ample supercomputing power.

Be sure all variations of the compromised password are changed and never use that compromised password or a variation of it ever again. Cybercriminals know users often return to old passwords. They will run that password through their system repeatedly for years.

Step

Enable Multi-Factor Authentication

Whenever it is offered, we recommend using multi-factor authentication (MFA). While it doesn’t provide the ultimate protection, it does offer another layer of security and is typically enough of a deterrent for all but the most persistent criminals. MFA will establish another identification method on accounts that offer the capability, often sending the user a unique code via a push notification or authenticator program on their mobile device.

Even if a cybercriminal gains access to credentials, they won’t immediately be able to access the associated account unless they provide the second factor of authentication. If the only method of MFA offered by the account is secret answers to security questions, make up the answers! Don’t use real information; it’s fairly easy to piece together from public databases or platforms like social media. Store your (fake) secret answers in your password manager. Speaking of…

Step

Implement a Password Manager

One of the best ways you can protect your passwords is by using a password manager. Password managers auto-generate long, complex passwords that are near impossible for criminals to hack – and they’re unique for every account. Employees should be required to use password managers, particularly on their work-related accounts (but should extend use to their personal accounts!).

Check Your Darknet Exposure

It doesn’t appear that data breaches are slowing down. In 2022 there were 1,802 publicly reported data breaches that impacted 422.1 million people. With each breach, credentials are exposed that put corporate and personal accounts at risk. Understanding your darknet exposure, and then taking the necessary steps to protect yourself and your enterprise, are the first steps to securing yourself from cyberattacks.

Use SpyCloud’s Check Your Exposure tool to learn what cybercriminals know about you and your organization, including:

  • Company-risk based data breach and malware exposures for users on your domain
  • Stolen cookies that enable advanced account takeover (session hijacking)
  • Personal breach exposures
  • Password reuse

With over 325B+ recaptured breach and malware assets, SpyCloud gives you visibility of your corporate and personal exposure and offers businesses automated solutions to detect exposed passwords, malware, stolen cookies, and at-risk cloud and shadow IT applications that are open doors for criminals.

Learn more about your corporate exposure on the darknet.

Check Your Exposure

Recent Posts

2024 SpyCloud Defense Report Key Findings: What’s Fueling Ransomware This Year

September 17, 2024

Explore SpyCloud’s 2024 report on ransomware and malware exposure, and learn how security teams can turn the tide with next-gen defense strategies.

Read More »

The Curious Case of an Open Source Stealer: Phemedrone

September 6, 2024

SpyCloud Labs dissects the capabilities of the open source Phemedrone Stealer, including log encryption, configuration & victim targeting.

Read More »

What to Know About the National Public Data Breach – Is it Worthy of the Hype?

August 22, 2024

The National Public Data (NPD) breach includes nearly 2.7 billion leaked records – and hundreds of millions of Americans’ social security numbers. Here’s what to

Read More »

5 Important Takeaways from IBM’s Cost of a Data Breach Report 2024

August 2, 2024

The cost of a data breach rose again this year. Get the key findings from IBM’s Cost of a Data Breach Report 2024.

Read More »

July 31, 2024

SpyCloud Labs digs into new infostealer malware variants like Kemicat and Mephedrone, as well as the resurgence of keyloggers like Snake.

Read More »

  • Team SpyCloud
  • Best Practices

Check Your Company's Exposure

See your real-time exposure details powered by SpyCloud.

Check Your Exposure

What To Do When Your Password is Exposed in a Data Breach (2024)
Top Articles
Understanding the 3 Special Needs Plans in Medicare
How to get Key Fragments in League of Legends
What Did Bimbo Airhead Reply When Asked
UPS Paketshop: Filialen & Standorte
Amc Near My Location
Craigslist Vans
Kaydengodly
Bucks County Job Requisitions
Pitt Authorized User
<i>1883</i>'s Isabel May Opens Up About the <i>Yellowstone</i> Prequel
Premier Boating Center Conroe
Sport Clip Hours
Diablo 3 Metascore
2016 Ford Fusion Belt Diagram
Mineral Wells Independent School District
Colorado mayor, police respond to Trump's claims that Venezuelan gang is 'taking over'
What Happened To Anna Citron Lansky
Locate At&T Store Near Me
Niche Crime Rate
Wgu Academy Phone Number
Project, Time & Expense Tracking Software for Business
Www.publicsurplus.com Motor Pool
Craigslist Battle Ground Washington
Valic Eremit
Hctc Speed Test
Arrest Gif
Jesus Revolution Showtimes Near Regal Stonecrest
Speedstepper
Free T33N Leaks
2004 Honda Odyssey Firing Order
Frank Vascellaro
Korg Forums :: View topic
Robot or human?
Does Iherb Accept Ebt
Western Gold Gateway
Vanessa West Tripod Jeffrey Dahmer
Bimmerpost version for Porsche forum?
How To Get Soul Reaper Knife In Critical Legends
Wsbtv Fish And Game Report
NHL training camps open with Swayman's status with the Bruins among the many questions
Dr Adj Redist Cadv Prin Amex Charge
Anhedönia Last Name Origin
Gasoline Prices At Sam's Club
Promo Code Blackout Bingo 2023
Shell Gas Stations Prices
Rs3 Nature Spirit Quick Guide
4k Movie, Streaming, Blu-Ray Disc, and Home Theater Product Reviews & News
Matt Brickman Wikipedia
Taterz Salad
Affidea ExpressCare - Affidea Ireland
Ravenna Greataxe
Latest Posts
Article information

Author: Rubie Ullrich

Last Updated:

Views: 6218

Rating: 4.1 / 5 (72 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Rubie Ullrich

Birthday: 1998-02-02

Address: 743 Stoltenberg Center, Genovevaville, NJ 59925-3119

Phone: +2202978377583

Job: Administration Engineer

Hobby: Surfing, Sailing, Listening to music, Web surfing, Kitesurfing, Geocaching, Backpacking

Introduction: My name is Rubie Ullrich, I am a enthusiastic, perfect, tender, vivacious, talented, famous, delightful person who loves writing and wants to share my knowledge and understanding with you.