What to Do After a Data Breach

By Gary Cox

breachWith such a heavy dependency on technology, it’s not uncommon to encounter a data breach or security threat. As past data breaches at large companies show, security attacks can happen to anyone, at any time. If you fear your sensitive information has been compromised, here’s what to do after a data breach.

What to Do After a Data Breach

Falling victim to a cybersecurity attack is stressful. With the following tips, you’ll have what you need to recover from a threat.

What Was Stolen

The internet is a massive space, and there are numerous ways that your information can be compromised. To start managing the aftermath of a data breach, determine exactly what information was stolen. Though any stolen data feels violating, there are varying degrees of severity of each stolen piece of information.

The most harmless information for hackers to steal is your name and address. Since this information is generally available with a quick Google search, this information is less severe. If your email address, credit or debit card number, or your date of birth are compromised, you should begin taking action to recover and protect yourself. For highly personal information such as your Social Security Number, important passwords (i.e., online banking), and credit or debit card security codes, you should take immediate action as these are the most severe data breaches.

Create New Passwords

passwordFor any online accounts that your fear were hacked, immediately change every password. Your new password should be something you have not used previously and should be something only you or other trusted individuals know. A strong password is unique, case-sensitive, meaning it includes both upper and lower case letters and should include special characters or numbers.

If the website allows, consider a password that requires multiple-factor authentication. Accounts that require not only a password but also another confidential piece of information to access your page are significantly safer than traditional one-factor authentication sites.

Contact Professional Help

If your online banking system or credit or debit card numbers were stolen, you should immediately contact the service provider and inform them of the breach. Your accounts will likely be frozen, and any additional charges or activity will notify the providers.

If other sensitive information such as your SSN is stolen, you’ll need to file a report with your local police. Unfortunately, hackers can steal your identity with only a few vital pieces of information, and any threats to your security should be taken seriously. To learn more about identity theft, read about how you can protect yourself in one of our previous blogs.

Update Your Security System

securityAlong with changing the passwords to your accounts, you should also make sure you’re running the most updated versions of your security programs. To maximize your computer’s safety, you should consider installing antivirus, spyware/malware, and firewall programs.

When you suffer from a data breach, you need to act fast to recover and protect your information. For expert computer and network security services, contact us! We’ll guide you through online security threats and help protect your network security.

Call us on 072-898-0362 to answer your questions or to provide Computer and IT Support, we would be happy to hear from you. We at GCComp have the experience and technical knowledge to help your business with your technology issues “We know technology so you don’t have to”. 


Published by Coxy

A confident and talented IT technician with extensive practical experience of working with computers and resolving any support issues that are raised to him. Possessing a proven ability to administer and control the operation, configuration and maintenance of computer based information systems, as well as having an eye for detail and able to multi-task under pressure.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: