{"id":235,"date":"2017-11-03T11:38:36","date_gmt":"2017-11-03T15:38:36","guid":{"rendered":"http:\/\/blogs.uml.edu\/information-security\/?p=235"},"modified":"2017-11-03T14:38:08","modified_gmt":"2017-11-03T18:38:08","slug":"youve-received-a-data-breach-letter-now-what","status":"publish","type":"post","link":"https:\/\/blogs.uml.edu\/information-security\/2017\/11\/03\/youve-received-a-data-breach-letter-now-what\/","title":{"rendered":"You&#8217;ve Received a Data Breach Letter &#8212; Now What?"},"content":{"rendered":"<p>It seems every week we hear about a data breach on the news at a major company or government institution.\u00a0 Recent breaches at Equifax, Yahoo, IRS, Target, and OPM are a few good examples.\u00a0 So what should you do when a data breach notification letter arrives in your mailbox, or you simply hear about it in the news cycle?\u00a0 \u00a0My short answer is &#8212; don&#8217;t panic and pay close attention.<\/p>\n<p>Faced with a breach notice, most people either ignore it, panic, or start closing accounts.\u00a0 \u00a0All of these are not helpful so we recommend these steps:<\/p>\n<ol>\n<li>Read the notice carefully to learn what information may have been exposed.\u00a0 Keep this notice handy in case you need to prove your data was compromised through no fault of your own.<\/li>\n<li>If you are offered free credit monitoring, take it<\/li>\n<li>Pay close attention to your bank accounts and credit card transactions &#8212; at least weekly.\u00a0 Look for any unusual activity.<\/li>\n<li>Visit a reputable website that summarizes additional steps to take.\u00a0 My recommendation is <a href=\"http:\/\/www.ftc.gov\/idtheft\">www.ftc.gov\/idtheft<\/a><\/li>\n<li>Know how to place a credit freeze on your credit file\n<ol>\n<li>\u00a0<a href=\"http:\/\/www.consumer.ftc.gov\/articles\/0497-credit-freeze-faqs\">www.consumer.ftc.gov\/articles\/0497-credit-freeze-faqs<\/a><\/li>\n<li><a href=\"http:\/\/www.freeze.equifax.com\">www.freeze.equifax.com<\/a><\/li>\n<li><a href=\"http:\/\/www.experian.com\/ncaconline\/freeze\">www.experian.com\/ncaconline\/freeze<\/a><\/li>\n<li><a href=\"http:\/\/freeze.transunion.com\/sf\/securityFreeze\/landingPage.jsp\">freeze.transunion.com\/sf\/securityFreeze\/landingPage.jsp<\/a><\/li>\n<\/ol>\n<\/li>\n<li>Enroll in a paid service for identity theft protection.\u00a0 Each offer similar protection, but depending upon your financial situation, you may choose one over the other\u00a0 My two recommendations are:\n<ol>\n<li><a href=\"http:\/\/www.lifelock.com\">Lifelock &#8211; more expensive<\/a><\/li>\n<li><a href=\"http:\/\/Zanderins.com\/idtheft2\">Zander Insurance Group &#8211; less expensive; has a family plan<\/a><\/li>\n<\/ol>\n<\/li>\n<li>If you are in the habit of storing credit card information on website (i.e Amazon), enroll in Mult-Factor Authentication if the website has it available<\/li>\n<\/ol>\n<p>So What should I do moving forward?\u00a0 Keep up good data-management habits by shredding sensitive documents before throwing them in the trash; use a locking mailbox; and take advantage of the <a href=\"http:\/\/www.donotcall.gov\">Do Not Call registry.<\/a><\/p>\n<p>Let&#8217;s face it, if you haven&#8217;t received a breach notification letter yet, you probably will in the future.\u00a0 Not all breaches are created equal and some are worse than others.<\/p>\n<p>If it involves your credit card or debit card, chances are your bank will issue you a new one if they think the risk is high (you can always request a new card if you&#8217;re concerned).\u00a0 If your SSN, birth date, and address are compromised, they have a long shelf life and can be used by cyber-criminals next month, next year, or two years from now &#8212; you get the point.\u00a0 For this reason, take the necessary precaution that&#8217;s proportional to your risk level.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It seems every week we hear about a data breach on the news at a major company or government institution.\u00a0 Recent breaches at Equifax, Yahoo, IRS, Target, and OPM are a few good examples.\u00a0 So what should you do when &hellip; <a href=\"https:\/\/blogs.uml.edu\/information-security\/2017\/11\/03\/youve-received-a-data-breach-letter-now-what\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":273,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/235"}],"collection":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/users\/273"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/comments?post=235"}],"version-history":[{"count":8,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/235\/revisions"}],"predecessor-version":[{"id":243,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/235\/revisions\/243"}],"wp:attachment":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/media?parent=235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/categories?post=235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/tags?post=235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}