Category: Passwords

Taskbar Icons: What Do They Mean?

Filed under: Computing Tips,Internet Tips,Passwords - Sep 16 2022
Taskbar Icons - What Do They Mean

We’ve all seen them before: those little icons that show up in our taskbars next to the clock. They come in all sorts of shapes and colors. 

*But, what do they mean?* 

The specific icons may vary depending on your operating system of your computer, but they will usually have similar functionality.

While some of them are fairly self-explanatory, others can be a bit more confusing. Let’s take a look at what some of the most common taskbar icons mean.

Sound Icon

One of the most common taskbar icons is the sound/speaker icon. This icon indicates the status of the sound on your system. 

For example, if the speaker is crossed out, that might mean that your system’s sound is muted or disabled. 

You can usually click the icon to toggle your sound on/off or to change the system’s output to another device (for example, for switching over to some Bluetooth headphones or speakers). 

Wi-Fi / Network Icon

Another common taskbar icon is the Wi-Fi icon (or networking icon if you’re connected via ethernet cable to your router). This looks like a small dot with waves coming out of the top, forming somewhat of an upside-down triangle.

This icon lets you know if you’re connected to a network or not. 

If you’re on Wi-Fi and the icon has full bars that means you have a strong connection. If the icon is empty or grayed out, that means your connection is weak you don’t have a connection, respectively. 

When you hover your mouse over the icon, you’ll also see the name of the network you’re currently connected to.

If you’re not connected to a network, you might see “Not connected” instead.

It’s also a quick way to access the network settings, which can be useful if you need to troubleshoot a connection issue or change your Wi-Fi password.

Battery / Power Indicator Icon 

Probably one of the most important icons for laptop/mobile users will be the battery icon. This one lets you know, at a glance, how much battery life your laptop or mobile device has. 

The more full the icon, the more battery life you have. If the icon is empty, that means your battery is running low and you should plug in your laptop soon.

If you’re connected to power it will let you know your current charging status and how much time is left before your battery is fully charged. 

A picture containing text, clock

Description automatically generated

Bluetooth Icon

If you have Bluetooth turned on, you’ll see a Bluetooth icon in your taskbar. This one looks kind of like a jagged capital “B” letter.

This icon lets you know that your system is able to connect to wireless Bluetooth devices and the status of your Bluetooth connections – such as a wireless speaker/headphones, keyboard or mouse.

You can usually click on the icon to see a list of available Bluetooth devices that you can connect to. 

Airplane Mode Icon

The airplane mode icon is another common and quite useful icon. It allows you to toggle airplane mode on/off. It will look like an airplane on most devices.

Airplane mode is a setting that disables all wireless communication on your device. This includes things like Wi-Fi, Bluetooth, and cellular data. 

You’ll usually only use this icon when you’re on an airplane (hence the name) but you might also find it useful in other places where wireless communication is not allowed. 

Boost Productivity

Now that you know what some of the most common taskbar icons mean, you can start using them to your advantage. 

For example, if you’re trying to conserve battery life, you can click on the battery icon and see how much power you have left. If you’re trying to be productive and minimize distractions, you can click on the speaker icon to mute your sound.

Knowing what the taskbar icons mean can also help you troubleshoot problems. 

For example, if your sound isn’t working, you can check to see if the speaker icon is crossed out. If it is, that means your sound is muted and you can just click on the icon to unmute it.

Need Expert Computer Help?

Overall, the taskbar icons are a helpful way to see what’s going on with your computer at a glance. 

Next time you’re looking at your taskbar, take a minute to familiarize yourself with the icons and what they mean. It’ll come in handy more often than you think!

We hope this article has helped you understand what some of the more common icons on your taskbar mean. 

If you have any other questions about taskbar icons, or need computer help of any kind, don’t hesitate to contact us!

You May Not be Using All the Great Features of Your Browser

Filed under: Internet Tips,Passwords - Jul 22 2022
You May Not be Using All the Great Features of Your Browser

Web browsers are your gateway to the internet or World Wide Web. Browsers contain a lot of features that make your online experience more efficient. This includes things like tabs that allow you to open different web pages at the same time, and “bookmarks” or “favorites” that let you save website addresses so that you don’t have to type-in or search for frequently visited websites. 

Some of the most popular browsers are Google Chrome, Mozilla Firefox, Microsoft Edge, Apple Safari, and Opera. These browsers have many useful features to help you get things done with ease. While some features of the browsers are known, others are either unknown or under-utilized,

Here, we’ll discuss some of the great features of your browser that you may not be using yet. 

5 Helpful Browser Features You May Not Be Using

(more…)

Use This Clever Acronym (SLAM) To Identify Dangerous Emails in Your Inbox

Filed under: Passwords,Scams,Security - Jul 08 2022
Use This Clever Acronym (SLAM) To Identify Dangerous Emails in Your Inbox

Cybercriminals are continuously targeting naïve individuals. They do not discriminate when it comes to defrauding people. They’ll obtain money from anyone – young, old, poor, and rich. The American Journal of Public health notes that about 5% of adults get scammed yearly.

In the United States, older adults lose about $40 billion per year due to cyberattacks. Cybercriminals can easily exploit the information of an older adult, which can be obtained through smartphones or computer systems. Unfortunately, senior citizens are easy targets of cybercriminals because of their inexperience with using technology. Many older citizens have social media accounts, surf the internet, and use credit cards online. Unlike the younger generation, older adults are generally less aware of cybercriminals’ activities, and as such, they lack the necessary information to help them stay protected from these malicious activities. 

Cybercriminals may reach out in a non-suspicious manner. They may send a link through a legitimate email and offer to assist them with resolving issues. Or they may send an email posing as a company offering cheap vacation trips, or even coupons or prizes. 

These fake emails are called phishing. The criminal is trying to fish for victims, just like fishermen fish for bass, trout, etc. The fake emails act as their lures. Phishing is one of the main causes of all types of data breaches, credit card theft, and other cybersecurity issues.

Then, these hackers will proceed to request personal information from the unsuspecting victim. They will use the information generated to access their credit cards and defraud them if successful. 

Scams targeting the elderly population are becoming rampant in the United States, and their effect on them is damaging. For online criminals, scamming the elderly can bring easy monetary rewards. 

One way to protect yourself from these malicious activities is to use the SLAM method of phishing detection. SLAM is an acronym that represents:

  • Sender
  • Links
  • Attachment
  • Message 

How To Identify Dangerous Emails Using The SLAM Method

SLAM is an acronym that guides you to identify if an email is fraudulent. With it, you can easily recognize when cybercriminals use emails to carry out a phishing attempt. 

S- Sender

As a rule, pay attention to the sender’s email address. Cybercriminals often use the email address of a trusted entity to carry out phishing attacks. So, don’t be in haste to open the email. It is best to ascertain the validity of the sender’s email address. You can do this by hovering your mouse over the sender’s name. It gives you appropriate information on the sender. 

Cybercriminals often make little adjustments to the email addresses they want to use in carrying out a phishing attack. Look out for spelling errors or additional letters in the email addresses. If something doesn’t look right, then it probably isn’t.

L- Link

Many phishing emails have links in them. These links prompt the recipients to click on them so that they can reveal sensitive or personal information. Sometimes, the link in the phishing mail looks helpful and could even offer assistance in resolving bank, health, or payment issues. The link then redirects the user to a login page that may look very similar to one they are used to seeing. This is called a spoofed login page. It’s made to trick the victim into inputting their username and password for a specific site.

A-Attachment

Malicious attachments are standard in phishing emails. To stay safe, it is not advisable to open any attachments in your emails that you aren’t absolutely sure are safe and from a legitimate source. When you download a malicious attachment, it enables hackers to gain access to your device and compromise it. Therefore, don’t open an attachment in your email unless you confirm it is authentic.

M- Message

This represents the content of the email. Although many scammers have become very sophisticated in sending messages, many phishing emails have recognizable flaws such as misspellings, punctuation and capitalization errors, wrong or mis-formatted dates, and generic/non-personalized greetings.

Take the phishing quiz to see if you can spot phishing emails

Test how well you can follow the SLAM method by taking the following quiz which will open in a new tab: Phishing Quiz

Before conversing with a stranger/potential scammer, contact us if you have questions about a suspicious email, text or phone call.

Print This Article Print This Article

Is Zelle Safe? How To Protect Yourself When Using Payment Apps

Filed under: Computing Tips,Passwords,Scams,Security - Jun 24 2022
Is Zelle Safe? How To Protect Yourself When Using Payment Apps

Payment apps like Zelle and Venmo are a customer favorite because they are a convenient, fast, and easy way of electronically exchanging money between others. Zelle’s popularity and quick exchange of funds between one bank and another attracts more than just new customers. Unfortunately, it attracts hackers and scammers too.

With so many headlines about Zelle scams on the news lately, many users can’t help but wonder about the platform’s safety. Scammers target Zelle users and siphon off their hard-earned money through phishing scams. The truth is, Zelle is safe as long as you are careful, and you pay attention. 

By the time you’re done reading this article, you’ll know more about Zelle and how you can safely use the platform without falling victim to scammers

What exactly is Zelle?

Zelle is a popular payment application operating a peer-to-peer (P2P) model. It makes it easy for users to move money and pay for things without going to the bank or handling cash. Zelle is the joint effort of several major banks in the US. It’s easy to use through an iPhone and Android app. Zelle also integrates with the mobile app of major banks such as Bank of America, Wells Fargo and Chase.

How does the Zelle scam work?

Zelle scams are mainly social engineering scams. Social engineering is manipulating or influencing people using scare tactics or fraudulent information. Scammers trick consumers into unintentionally authorizing money transfers by making fraudulent claims and promises.

One of the most common Zelle scams involves sending a text message or an email requesting confirmation for what ends up being a fake payment. Most users often respond to try and disprove the transaction. Instead of putting the scammers off, it opens the door for further communication. The scammers then call the user pretending to be from the user’s bank and pretend to give the user instructions that’ll reverse the claim. In reality, the money ends up in the scammer’s account.

Safety precautions when using Zelle

While the news may sound scary, most Zelle scams are social engineering. As long as you heed the precautions below, you should be relatively safe. 

Only use Zelle for people or businesses you trust

P2P payments should not be used to send money to anyone you don’t know and should rarely be used for online purchases. Only use Zelle to send money to your family and friends if possible. Verify that the phone number, email, and recipient’s name are all correct. 

Ignore unsolicited emails and text messages

Your bank will rarely contact you unsolicited. If you received a message from any party posing as a banking representative when you haven’t contacted them, ignore it. Reach out to your bank directly and ask them to check your account for any suspicious activity.

 If you gave out your personal details before you noticed anything, that is, you fell for the phishing scam, call your bank so they can help you secure the account. 

Use two-factor authentication (2FA)

Two-factor, two-step, or multi-factor authentication is a security process that helps secure your accounts by asking users to verify their identity using two different authentication factors. When you authorize 2FA, you’ll need to input a one-time password (OTP) anytime you sign in to your account. You should never share your OTP with anyone, no matter how insistent they appear. Criminals posing as your bank may demand your passcode for various reasons, but no legitimate bank will ever ask for it.

Don’t get pressured by urgent or immediate payments

If you observe any suspicious behavior from someone claiming to be a representative of your bank, a utility, or another institution demanding quick payment, it’s likely a scam. End the call and reach out to the business through official channels.

Scammers also send payment requests from businesses, banks, and utilities you don’t pay with Zelle to trip you up. Confirm from the organization’s official channels that the request is legitimate before paying. 

Be cautious of anyone insisting on using only Zelle

Anyone who insists on transacting only through Zelle should send warning bells to your mind. If they say the only payment option they can accept is Zelle, then make sure the transaction and the individual are genuine before sending any money. 

Don’t send money to yourself

Scammers may try to get you to authorize a reversal by claiming that a payment failed to go through or that your account has been compromised. Remember that banks won’t reach out to you unless you contact them first. 

We’re Here to Help Keep Your Tech Safe

Need more information on staying safe while using online apps? Then visit Computer Techs. Schedule an appointment by calling 775-624-6888

Keep your smartphone safe

Filed under: Passwords,Security,Tech Support - Jun 24 2022

Today’s smartphones retain a lot of personal data that you likely wouldn’t want to get into the wrong hands. Below is a list of just some of the data that can be accessed if someone got into your smartphone:

  • Someone can receive one-time passwords via text message or authenticator app that can be used to reset account passwords
  • Impersonate you by being able to send and receive calls, email and text messages on your behalf
  • Impersonate you through any social networks apps that you use
  • Access any notes, passwords or private pictures you may have stored
  • Reset your phone and sell it

How you can protect your smartphone

The most important thing you should do is to protect your smartphone with a numeric passcode and/or biometric authentication (finger or facial recognition). 6-digits is better than 4-digits – but 4-digits is definitely better than no passcode. Also, set your smartphone to auto-lock and require the passcode after 5-minutes or less of inactivity (less time is better).

I am surprised by how many clients I’ve helped who had no passcode on their phone. Smartphones are easily lost or misplaced, and a passcode will help keep your data out of the wrong hands. Most people don’t keep their doors unlocked, so why keep their smartphone unlocked?

Other things to keep your smartphone safe include:

  • Only install apps from trusted developers with lots of favorable reviews
  • Treat every text message and email from unknown senders as suspicious – particularly if it’s asking you to do something. Most text messages from financial institutions come from a 5-or-6-digit “short code” – not a 10-digit phone number.
  • Connect your smartphone to Wi-Fi when at home, and make sure you keep the operating system (typically iOS or Android) up-to-date with the latest security patches.
  • You don’t need an antivirus or security app, nor a VPN. Protections are already built into the operating system of your mobile device, and apps are vetted before being made available in the app stores. However, be judicious about the apps that you install, because occasionally stuff gets by the reviewers.
  • Most importantly, password protect your device. You are more likely to lose or misplace your device than getting hacked from the outside.

Do you need help with your mobile device(s). Contact us to discuss your needs.

Print This Article Print This Article

4 Dangerous Scam Text Messages You Should Delete Immediately

Filed under: Passwords,Scams,Security - May 20 2022
4 Dangerous Scam Text Messages You Should Delete Immediately

Email open rates typically range between 20 and 30 percent while SMS stands at a staggering 98 percent. 90 percent of texts are opened within three seconds of receipt. The average text is read within 90 seconds of receipt while that number is 90 minutes for email. This characteristically rapid response for text messages makes them a popular avenue for SMS scams and phishing – sometimes called “smishing”. Scams after all require that the target respond quickly before they have a change of heart or think their decision through. 

The average text is read within 90 seconds of receipt. That metric is 90 minutes for email.

The speed and regularity of reading and responding to texts is why you should delete scam texts immediately. If they lie around your inbox too long, you could unintentionally click on the fraudulent link at some future date. Scam SMS comes in diverse forms. Knowing SMS scammers’ modus operandi is critical to avoiding falling victim. Check out these types of texts you should get rid of without hesitation.

1. A Friend’s Friend You’ve Never Heard Of

Scammers know they have a good shot at success if they can convince you that you are someone they may know and can trust. Since they cannot guess the origin and nature of your friendships, their best bet is to pose as someone referred to you by your friend or acquaintance. For the average adult, friends and acquaintances garnered through life can number in the hundreds or thousands. 

So, if the scammer sent you a text message purporting to be a referral from your friend Melissa or Michael, chances are you have someone by that common name that you have at the minimum, a distant connection to. You would feel compelled to take a look and respond to the message to avoid embarrassing your friend or friend’s friend by stating you don’t remember them. 

Now, this type of text could very well be genuine. But as with virtually all scam texts, if it includes a URL the sender wants you to click on, delete it immediately.

2. A Package You Were Not Aware Of

Who doesn’t love surprise gifts and just incoming packages in general? When we order something at online stores such as Amazon, there’s a palpable excitement as we anticipate its arrival. If you get a text message claiming you have a package waiting for you, it is tempting to click on the link to see the details, claim it and/or specify the destination. Yet, this is one of the most common SMS scams. 

While the link could be a trigger for the download of malware to your phone, it is often a means of extracting confidential personal information from you via a fake webform. Armed with that data, the scammers can execute elaborate identity theft, empty your account, and max out your credit card.

3. Your Bank Account or Credit/Debit Card is On the Verge of Closure

Our bank accounts and credit/debit cards are a key driver of our everyday quality of life. You may be sent into a panic if you receive a text message claiming your bank account or card will be closed in case you do not urgently confirm your PIN, password, and other information. Often, there will be a narrow deadline such as the need to provide the information within hours of receipt. 

Bank accounts and cards do get closed for various reasons. So, once again, this rides on a realistic scenario. Still, account closure is unlikely to happen with such urgency. There will be a lead time of at least weeks or months. To check if it’s a scam, call the bank directly on their official listed phone numbers (you can find these on their website’s Contact Us section), or on the back of the card. If it doesn’t check out, delete it promptly.

4. You’ve Won an Award You Did Not Know You Were in the Running For

This plays on the elation that accompanies an unexpected gift. But nothing comes that easy. Nearly all notable awards require that you formally and intentionally enter the contest before you are assessed against other participants. Few organizations would want to go through the painstaking process of identifying a winner only for the selected candidate to reject it. 

What does this all mean? If you receive a text message about an award you’ve won, it’s likely scammers looking to cash in at your expense. Do not click on the link they ask you to even if it is apparently the only means to claim your award. Usually, these text messages download malware to your phone that would need removal.

Conclusion

These are some of the common types of scam texts but this is not an exhaustive list. Other types of scam SMS range from claims that your videos/photos have been posted somewhere, to inauthentic COVID-19 pandemic updates. Irrespective of the type of message, take a screenshot of the message for later review by an IT professional, then delete the message. Under no circumstances should you click the links, respond to the text or call the sender.

Think you have been a target of scam texts? Most people have. Contact us if you need assistance.

Don’t get locked out of your email – add account recovery info now!

Updated 10/18/23 to include other accounts besides email.

You may have signed up for your email account long ago – before additional account recovery information was required. If you get locked out of your email account tomorrow, does your account have enough account recovery information to allow you to easily reset your password and get back into your account?

Account recovery information includes other methods to confirm your identity including:

  • A mobile phone number that can receive a text message
  • A secondary email address
  • Account security questions – i.e. “your first pet’s name”

This year we’ve had several clients get permanently locked out of their AT&T/Yahoo email and other accounts because there wasn’t enough secondary verifiable information to convince the customer support representative to reset the password. Don’t let that happen to you. Log into your email account today – before a hacker does – to update your profile information with a cell phone number that can receive one-time-password verification text messages. Alternatively or additionally you could provide a secondary email address or setup account security questions/answers. If available, setup 2-Step Verification – sometimes called Multi-Factor Authentication – for even better protection.

Don’t forget to secure your other accounts

While you’re securing your email account, we also recommend securing your other accounts that could be accessed by hackers. Those accounts include:

  • Wireless cell phone account and number
  • Bank and brokerage accounts where funds could be transferred out by a scammer
  • Social media accounts where someone could take over your identity to scam your friends and family
  • Your Microsoft, Apple and/or Google accounts which are used to login to your computer or mobile device

To secure your accounts as mentioned above, once logged into one of your online accounts, look for a section called profile or security to make the changes and additions. Instructions for some common accounts include:

If you need help, contact us for a security checkup of all of your vulnerable online accounts.

Print This Article Print This Article

Check these Facebook settings right away

Filed under: Internet Tips,Passwords,Scams,Security - Feb 21 2022

Originally posted February 2022, Updated May 2025

We’ve been receiving lots of reports from clients that their Facebook account has been hacked. In reality, usually it’s just been cloned. Here’s what’s happening. 

If you have a Facebook account, by default your Friends list is set to “Public” – meaning anybody on the internet can see who your Facebook friends are. But miscreants and scammers can use this information along with other public information to impersonate you by creating a new Facebook profile – even with your public profile picture(s). Then they send friend requests to all of your friends. Once your friends become friends with the new “you”, a scammer can persuade your friends that your original Facebook account was hacked and your friends are lead to believe the new account is really you. Scammers will then use your new Facebook profile controlled by them to have your friends confide in “you” to obtain personal/private information and/or gift cards or other financial scams.

What you need to change right away 

We recommend using Facebook’s Privacy Checkup to review your settings, and make sure that scammers can’t use public information from your Facebook account. In Facebook, go to your Account > Settings and Privacy > Privacy Checkup. In “Who can see what you share”, make sure “Who can see your friends list on your profile?” is NOT set to Public. In Privacy Checkup we also recommend going through “How to keep your account secure”, and make sure that you’re using a unique password for Facebook.

An additional step is to make sure that your only “Friends” can see your Followers – it’s set to “Public” by default. Check this setting by click the 3 dots near the top of your Friends list > Edit Privacy > Followers.

Print This Article Print This Article

What Is the Cloud?

Filed under: Passwords,Security - Jan 28 2022
What Is the Cloud?

Once upon a time, the cloud referred to something you’d look up and see in the sky. In the age of technology, though, the cloud is something wholly different altogether. Essentially, the cloud offers a secure way to store and back up your data – things like your documents, files, photos and contact details. 

Before the cloud, you’d store this data on your computer hard drive. While you can still do this, it’s also wise to use the cloud too. This is because if your hard drive fails, then you can still access your data. Also, more of us now use computers and mobile phones. If you use the cloud, then you can access your information from multiple devices. 

The average employee uses over 30 cloud-based services each day.

In the same way that different companies sell different brands of phones – like Nokia, Samsung and Apple – there are a number of companies that sell cloud storage. The main ones in the consumer space are Apple, Google and Microsoft. 

Below, we’ll dive into each of their cloud offerings, so you can get a better idea of what solution is best for your needs. 

iCloud 

If you have an iPhone or a Mac, then Apple’s iCloud is the best option for you. iCloud only works natively on Apple devices. It enables you to access your data seamlessly across your devices, including notes, photos, calendars and documents. 

Once you have set up iCloud, you can configure it to automatically back up your data, so you don’t need to keep remembering to click ‘backup’. You get 5 GB of free storage with iCloud. 

Moreover, if you are in a family of Apple users, then the iCloud has excellent functionality that allows you to easily share photos, files and more with other iPhone or Mac users. 

OneDrive

OneDrive is Microsoft’s answer to cloud storage. Anyone who has a Microsoft email account can access OneDrive for free. However, you only get 5GB of free storage before you need to start paying. 

Like iCloud, Microsoft enables you to store and share your personal information and files in the cloud. You can access these files by logging into your email account in your web browser.

Google Drive 

Google Drive is another cloud-based storage solution, which allows you to store files and photos online and access them from your phone, tablet, or computer with a login. Google Drive also has a wealth of features – such as Google Docs and Google Sheets – that allow you to create word processing documents and spreadsheets in the cloud, without paying for software.

Google Drive offers 15GB of free storage, 3x the free storage space of the others listed above.

Which Service is Best for Me?

No service is better than the other. It depends on your unique preferences. Some people prefer the interface of Microsoft OneDrive, while others prefer Google Drive. 

We suggest looking at what applications you use know and taking a decision from there. For example, if you’re already set up with a Microsoft account, then it likely makes sense for you to use OneDrive. 

Alternatively, if you’re an avid Apple user or have a Gmail account, then you’ll want to select iCloud and Google Drive, respectively. 

Don’t Forget About Security

Your cloud is only as secure as the devices that have access to it. Make sure all your devices are protected with robust PIN and password controls. 

Another thing to make sure of as you start using the cloud, is to make sure your files are configured securely and that you practice good password hygiene.

We advise that you set up account recovery options. These will help you to regain access to your cloud accounts in the event of losing your password. You’ll be asked to set up a security question, link your mobile phone to your account, or provide an alternative email address.

We also recommend that you use multi-factor authentication for your cloud accounts. This requires you to verify your identity when you log into your account. You’ll need to provide your password, and another form of authentication – such as a code sent to your phone or a link in your email. 

Of course, we understand that navigating cloud accounts can be complex – especially at the beginning. That’s why we are on hand to help you find and configure the best cloud storage for you. 

Get Help With Cloud Storage and Backup 

We enjoy working with our clients to help them get more from their technology while keeping their personal data secure. We can help you put automated solutions in place that keep you better protected online. 

Contact us today with any questions.

How Did My Password End Up in a Data Breach?

Filed under: Passwords,Security - Jan 14 2022
How Did My Password End Up in a Data Breach?

Most of us will have experienced a data breach at one point or another. Maybe you’ve received an email from LifeLock telling you that one of your passwords has been compromised. Or you’ve logged into an app on your iPhone and received a warning that your password has appeared in a data breach.

It can be worrying to receive these notifications. You’ll likely wonder how your password ended up in a breach and why. More importantly, you’ll want to know how you can fix the issue as quickly as possible. 

Below, we’ll explore how data breaches happen and how you can best protect yourself in the event of a worst-case scenario. 

How Data Breaches Occur

According to research, there are over 15 billion stolen passwords on the Dark Web. The Dark Web is like the criminal underworld of the internet. It’s where criminals go to buy illegal things like drugs and weapons. It’s also where cybercriminals purchase malware and stolen sensitive data – information like passwords, emails and even financial records. 

So, how does this information end up on the Dark Web in the first place? Well, in today’s digital world, data breaches have unfortunately become commonplace. Even though many businesses do their best to protect customer data, it takes just one error or mishap to let a cybercriminal into their systems.

When this happens, cybercriminals tend to steal the most lucrative thing they can: sensitive, personal data. Data has its own currency today. Criminals mainly use this data to commit fraud and con people – and companies – out of money. 

What Does a Stolen Password Notification Mean?

When you receive a stolen password notification, this means that one of your logins has shown up on the Dark Web. One of the companies you have an account with was likely breached. Sometimes, an organization will alert you to a data breach via email or text. However, occasionally, cybercriminals are able to steal data without an organization being any the wiser – which is why identity theft protection services can give you peace of mind.

Another way to check if your data is for sale on the Dark Web is to use the website Have I Been Pwned. Simply type your email address into the website, and it will let you know if your details have appeared in a data breach. 

What Should I Do If My Password Has Appeared on the Dark Web? 

Depending on the type of account that has been compromised, there are a few things that you should do. First, change your password for the account as quickly as possible. Second, log in to your financial accounts and check that everything is as it should be. 

If anything looks suspicious, then get in touch with your bank immediately. Even if nothing seems out of the ordinary, we recommend keeping an eye on your account for a few days after the breach notification. 

These steps will help to reduce the immediate impact of a data breach. There are also other things you can do that will help to prevent disruption from future data breaches: 

  • Use two-factor authentication: One of the easiest ways to improve your personal security is to enable two-factor authentication on your email and bank accounts. This uses a verification step in addition to your username and password – a one-time passcode sent to your email, text message or authentication app – to allow you to access your accounts. Two-factor authentication provides extra protection even if a hacker knows your password, they won’t be able to get into your accounts. 
  • Use a password system and/or password manager: You should have a unique password for every account you use. This way, if one of your accounts is breached, the others aren’t vulnerable. We know that remembering lots of passwords is near impossible. This is why we recommend you use a password system and/or password manager to simplify the process.
  • Monitor your credit: You should regularly check your credit to ensure that nothing looks out of the ordinary. It’s rare but, sometimes, data breach notifications come too little too late. So, it’s best to be proactive and regularly check your bank statements for evidence of identity theft. Keep an eye out for things like anomalous payments, payments made at odd times and withdrawals that look unfamiliar. 

Protect Yourself from Data Breaches

If you are worried about the security of your personal data or want help implementing more robust password controls, we’re here to help. Contact us today.

Print This Article Print This Article
« Previous PageNext Page »