What To Do When Your Password is Exposed in a Data Breach (2024)

  • Team SpyCloud
  • Best Practices
What To Do When Your Password is Exposed in a Data Breach (1)

Breaches happen all the time. While none of us can control how other companies protect our data, we can do plenty to protect ourselves.

Our first recommended action after a breach is for the exposed users to immediately change their password for that account – and for any other accounts that are protected by the same (or a similar) password. With an attack type called credential stuffing, one reused password can give criminals an open door to your other accounts. When your password is compromised, bad actors can take over your account, posing as the legitimate owner – accessing sensitive personal data, draining accounts, and making fraudulent purchases.

In the case of an account takeover of a corporate account, the criminal may be able to steal data that facilitates additional attacks, including ransomware, against the enterprise.

Since few of us can remember a complex, unique password for every account we own, it’s easy to become complacent, but that just encourages bad actors. They already have so much to work with: last year alone, SpyCloud recaptured 1.7 billion credentials exposed in data breaches and being sold or traded on the darknet. Additionally, we found a staggering number of corporate email addresses and plaintext passwords in our dataset – 27.36 million pairs of credentials associated with Fortune 1000 employees.

With everyone relying on digital identities now more than ever, cybercriminals have a lot more opportunity to profit from passwords and identity data exposed in breaches. The key is to act quickly after an exposure so you shut down their ability to profit from that stolen data.

My Corporate Credentials Were Exposed In a Data Breach – Now What?

Here are 4 steps to keep accounts safe if your password is found in a data breach.

Step

Change the Exposed Password Immediately

Cybercriminals act fast. They know the clock is ticking from the moment credentials are stolen. They use sophisticated technology and bots to compare the password against thousands of common websites and apps. By changing the exposed password the moment a breach is discovered, you minimize the risk that the criminal can use the password to access any personal or work data.

Experts highly recommend using complex passwords that are unique for every account. Using the same password on multiple accounts or reusing an old password is extremely risky. Check out SpyCloud’s tips for strong passwords for more recommendations on how to create unique, complex passwords that enhance your password hygiene.

Step

Change All Variations of the Compromised Password

When people are prompted to change their passwords, most decide to simply change a character or two. This may seem like a good idea and make it easier to remember, but cybercriminals are expecting it. They can take just a few characters of a compromised password and quickly crack the rest of it, even if it was recently changed. However, our research shows that cracking a complex password can take decades and ample supercomputing power.

Be sure all variations of the compromised password are changed and never use that compromised password or a variation of it ever again. Cybercriminals know users often return to old passwords. They will run that password through their system repeatedly for years.

Step

Enable Multi-Factor Authentication

Whenever it is offered, we recommend using multi-factor authentication (MFA). While it doesn’t provide the ultimate protection, it does offer another layer of security and is typically enough of a deterrent for all but the most persistent criminals. MFA will establish another identification method on accounts that offer the capability, often sending the user a unique code via a push notification or authenticator program on their mobile device.

Even if a cybercriminal gains access to credentials, they won’t immediately be able to access the associated account unless they provide the second factor of authentication. If the only method of MFA offered by the account is secret answers to security questions, make up the answers! Don’t use real information; it’s fairly easy to piece together from public databases or platforms like social media. Store your (fake) secret answers in your password manager. Speaking of…

Step

Implement a Password Manager

One of the best ways you can protect your passwords is by using a password manager. Password managers auto-generate long, complex passwords that are near impossible for criminals to hack – and they’re unique for every account. Employees should be required to use password managers, particularly on their work-related accounts (but should extend use to their personal accounts!).

Check Your Darknet Exposure

It doesn’t appear that data breaches are slowing down. In 2022 there were 1,802 publicly reported data breaches that impacted 422.1 million people. With each breach, credentials are exposed that put corporate and personal accounts at risk. Understanding your darknet exposure, and then taking the necessary steps to protect yourself and your enterprise, are the first steps to securing yourself from cyberattacks.

Use SpyCloud’s Check Your Exposure tool to learn what cybercriminals know about you and your organization, including:

  • Company-risk based data breach and malware exposures for users on your domain
  • Stolen cookies that enable advanced account takeover (session hijacking)
  • Personal breach exposures
  • Password reuse

With over 325B+ recaptured breach and malware assets, SpyCloud gives you visibility of your corporate and personal exposure and offers businesses automated solutions to detect exposed passwords, malware, stolen cookies, and at-risk cloud and shadow IT applications that are open doors for criminals.

Learn more about your corporate exposure on the darknet.

Check Your Exposure

Recent Posts

2024 SpyCloud Defense Report Key Findings: What’s Fueling Ransomware This Year

September 17, 2024

Explore SpyCloud’s 2024 report on ransomware and malware exposure, and learn how security teams can turn the tide with next-gen defense strategies.

Read More »

The Curious Case of an Open Source Stealer: Phemedrone

September 6, 2024

SpyCloud Labs dissects the capabilities of the open source Phemedrone Stealer, including log encryption, configuration & victim targeting.

Read More »

What to Know About the National Public Data Breach – Is it Worthy of the Hype?

August 22, 2024

The National Public Data (NPD) breach includes nearly 2.7 billion leaked records – and hundreds of millions of Americans’ social security numbers. Here’s what to

Read More »

5 Important Takeaways from IBM’s Cost of a Data Breach Report 2024

August 2, 2024

The cost of a data breach rose again this year. Get the key findings from IBM’s Cost of a Data Breach Report 2024.

Read More »

July 31, 2024

SpyCloud Labs digs into new infostealer malware variants like Kemicat and Mephedrone, as well as the resurgence of keyloggers like Snake.

Read More »

  • Team SpyCloud
  • Best Practices

Check Your Company's Exposure

See your real-time exposure details powered by SpyCloud.

Check Your Exposure

What To Do When Your Password is Exposed in a Data Breach (2024)
Top Articles
At what age does sharing a bed with my child have any long-term impacts on their growth (physical and psychological)?
When Money and Relationships Clash
Condogames Xyz Discord
Sterling Primary Care Franklin
Okta Nhrmc
Find A Red Cross Blood Drive
violinplot - Violin plot - MATLAB
Washington 2024 UHC Dual Complete WA-D002 (HMO-POS D-SNP) Find a provider or pharmacy
Freedom Powersports Mcdonough Photos
Storing Jam and Marmalade | Ask Nigella.com
Poke Bowl Hawaïen Traditionnel : Frais, Sain et Délicieux
Kwik Kar Guymon Ok
Tom DiVecchio - LILLY BROADCASTING | LinkedIn
Kreamlatifah
Post Game Contents and 100 Percent Guide | Zelda: Skyward Sword HD (Switch)|Game8
Dupage County Fcrc
Huffington Post Scorpio Horoscope
G-Eazy - Songs, Albums & Age
The Autopsy Report: Overview, Suggested Autopsy Report Headings, An Overview of the Autopsy Report
Tamara Lapman
Lkq Nashville Tn Inventory
Aldi Weekly Ad Lake Elsinore
Kitco Silver Charts
Ifate Yes Or No
Fine Food Fan Crossword Clue
Watchmen On The Wall Bravenet
24 Hour Supermarket Near Me Now
Stanford And Tate Furniture Blue Bloods
Adams County 911 Live Incident
X2 Aspen Everett Ma
Restaurants Near 275 Tremont St Boston
Mob Psycho Season 3 Gogoanime
Fanduel Stardust Charge On Debit Card
Swagbucks Review 2024: Is Swagbucks Worth It?
Aveda Caramel Toner Formula
Uh Board Of Regents Meeting
Craigslist Rome Ny
Active Parent Neshoba County
Anachronism: Definitions and Examples | LiteraryTerms.net
That Is No Sword Tanjiro X Kakushi
28 Box St
Mychart Kki
Best Cheap Rwd Cars
Gasprijs Nederland: per m3 in 2024 en de actuele gasprijzen
Schoology Fort Bend Isd
Coffey Leaked
Litter Robot Pinch Fault
New details of Trump family crypto project released, including who can buy in
Craigslist Greencastle
Latest Posts
Article information

Author: Rubie Ullrich

Last Updated:

Views: 6218

Rating: 4.1 / 5 (72 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Rubie Ullrich

Birthday: 1998-02-02

Address: 743 Stoltenberg Center, Genovevaville, NJ 59925-3119

Phone: +2202978377583

Job: Administration Engineer

Hobby: Surfing, Sailing, Listening to music, Web surfing, Kitesurfing, Geocaching, Backpacking

Introduction: My name is Rubie Ullrich, I am a enthusiastic, perfect, tender, vivacious, talented, famous, delightful person who loves writing and wants to share my knowledge and understanding with you.