What to do after hacker group may have stolen personal information from billions of people?

One cyber security expert shares some tips on how people can better secure their online data and identity
Social Security Card
Photo credit Getty Images

Buffalo, N.Y. (WBEN) - Is damage control still possible after a group of hackers recently claimed to have stolen data from almost 3 billion people?

Cyber security expert David Malicoat says there are still ways that people can protect their data, despite the severity of the situation.

For starters, he strongly recommends to immediately start changing passwords for accounts holding onto sensitive data, especially if the password is already being used elsewhere.

"These threat actors know that people reuse their passwords, like 'I use the same password on my bank, on my email, on my X, Y and Z.' What they count on is, when they breach one of those lower ones, they have the password for that bank," stated Malicoat in an interview with WBEN. "So we want different passwords for each one, and what using a password manager allows you to do is only have to remember one password. This password manager, by the way they function, will create those passwords for you and remember them for you, and all you have to do is remember that one."

Another option he recommends is for people to place a freeze on their credit, which would block anyone from creating a new credit line, or taking out a loan, until lifted.

"Every credit bureau offers you the option to freeze your credit report. Basically it's the idea that you have control, that you can log in and you can say, 'No, I don't want anybody to check my credit right now," stated Malicoat. "That's pretty effective. I think that's one where if you don't already have those logins, and you don't have an established account with the three credit bureaus, go ahead and do that, then turn around and freeze your credit report."

As an additional line of protection, Malicoat says that two-factor authentication should be enabled whenever possible. Even if the password is compromised, the attacker will not be able to log in since without verification.

Featured Image Photo Credit: Getty Images