Final hours! Save up to 55% OFF InvestingProCLAIM SALE

Factbox-What to do if you were a corporate hack victim

Published 09/16/2022, 03:19 PM
Updated 09/16/2022, 04:56 PM
© Reuters. FILE PHOTO: A computer keyboard lit by a displayed cyber code is seen in this illustration picture taken on March 1,  2017. REUTERS/Kacper Pempel/Illustration/File Photo
UBER
-

(Reuters) - A reported breach of Uber Technologies (NYSE:UBER) Inc's internal systems on Thursday underscored the need for consumers to know what they can do to protect themselves if a service they use has suffered a cyber attack.

Below are some steps you can take if you believe to have fallen prey to a corporate breach:

RESET PASSWORD

Changing password can help prevent the hacker from accessing information such as name, address, contact number and credit card details.

If access to your account has been blocked, start the reset process and choose a complex password consisting of symbols and numbers, as well as uppercase and lowercase letters. Avoid passwords similar to old ones.

FREEZE CREDIT CARD

If there is any suspicion that credit card information may have has been leaked in a data breach, monitor your credit score for any changes, and consider freezing payments on credit cards to prevent unauthorized payments.

"I would remove any saved or stored credit cards, bank accounts or payment methods that you may be using within the app ... because if that malicious actor is still in the environment, they're still looking around for data," said David Lindner, chief information security officer at Contrast Security.

ENABLE TWO-FACTOR AUTHENTICATION

If an app allows two-factor authentication, use it. Security experts say using two-step verification is one of the best ways to protect an account as it makes it more difficult for a hacker to access key information.

Two-factor authentication essentially adds an extra layer of security to the login process, typically requiring the user to give permission on a secondary device.

STAY UPDATED

Information is key during cyber attacks. Hence, it is important to stay on top of the developments to follow any mitigatory actions suggested by the company and be aware of what could have been exposed in the hack.

Since an attack could disable primary communication channels such as the internal messaging app or email, the website and social media should be monitored for updates.

© Reuters. FILE PHOTO: A computer keyboard lit by a displayed cyber code is seen in this illustration picture taken on March 1,  2017. REUTERS/Kacper Pempel/Illustration/File Photo

ENSURE YOU ARE USING LATEST VERSION OF APP

App providers regularly send updates to their software to remove security vulnerabilities and increase the utility of the program. Keep up with the updates for best security.

Latest comments

Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.