Cybercrime is estimated to cost the world $10.5 trillion annually by 2025. You, businesses, the government all rely on the internet and the data that is shared upon it is unavoidably vulnerable.
As the user, you trustfully share your data and hope the institution that collects it, treats it in the same way they would treat their own finances - with the highest level of security. Data attackers, like your regular pick-pocketer or thieves, are opportunists. They prey on the most vulnerable and if used correctly, will use your data to line their pockets at your expense.
This guide will help prevent you from being a part of cyber-attack statistics.
AM I A VICTIM AND DON’T EVEN KNOW IT?
Website breaches are common and it’s more than likely that your data has already been stolen from one or more sources. Websites are required to notify authorities of any data breaches and these data breaches are made public. To see if you are a victim, follow this link and enter your most used email address https://haveibeenpwned.com/. If you do fall into the unlucky majority, then it’s time to make sure that your stolen information is not used against you!
WHERE DID THEY GET MY INFORMATION FROM?
Data is commonly traded online and on the black market. Where that data comes from is more than likely from a contentious or suspicious source. Data leaks can be a result of internal negligence or data theft by an institution's employees or members. External infiltration of a database can be done through a variety of creative approaches.
HOW ATTACKERS USE MY DATA
It’s likely that your email address, username, and password have in some way or another been leaked. Drawing a conclusion as to how attackers may use this information isn’t rocket science. The most common attack is password guessing (or “credential stuffing”). This happens when an attacker continually attempts to guess usernames and passwords. If you have used the same username, email address, and password over several sites, you are increasingly more vulnerable to these attacks.
HOW DO I PREVENT ATTACKERS FROM EXPLOITING MY DATA?
Your best defense against this kind of attack is by using two effective approaches. Firstly, by having strong, unique passwords and secondly by enabling two-factor authentication (2FA).
The first step to increasing your security involves knowing which websites handle your data and ensuring that you follow recommended best practices on those sites. Websites that require login access should be placed at the top of your list of potential threats. As technology improves, the threat of cyber-attacks increases, and by using multiple layers of protection you drastically decrease the chances of falling victim to a cyber attack.
RECOMMENDED STEPS YOU SHOULD TAKE
Use a strong password
- Use a password that is at least 10 characters in length, with a mix of uppercase and lowercase characters, numbers, and symbols.
- A strong password may look something like B8jq#LU3?W1. It is always recommended to use a third-party application like One Password to generate a random and strong password to secure your StableHouse account.
- Do not use any personal information nor recycle an old password that you have used elsewhere. There’s always a chance that your previous passwords were compromised in the past without your knowledge.
- Select a unique password for each online account you have.
Two-Factor Authentication (2FA) is a login process that requires the usual login/password but also an external device or account, such as an email address, phone number, or security software. Thanks to this second layer of authentication, your account is far more secure than single-factor authentication. Enabling 2FA on your StableHouse account is easy, just follow these instructions.