搜索关注在线英语听力室公众号:tingroom,领取免费英语资料大礼包。
(单词翻译)
As more of our lives move online, the risk of our personal data being stolen or misused1 is increasing.
Personal data includes email addresses, phone numbers, birthdates, and even passwords. And large data breaches3 are happening more often.
In breaches, online criminals can use stolen data to target people with leading messages to get important information. Or they can take out loans and credit cards in their name.
Here are some ways to protect yourself:
Pay attention
Oren Arar is vice4 president of buyer privacy at online security company Malwarebytes. He said in the United States, there is no federal law enforcing companies or organizations to inform individuals of a data breach2.
But he said it is common practice for them to do so and they often provide identity protection services.
The situation is better in the European Union. It requires companies and organizations to tell individuals of some kinds of breaches.
Even after a breach has been made public, cyber security experts say people need to pay attention.
Look out for emails or phone calls that say they are from the hacked6 organization or someone offering help. Contact the organization to see if they can confirm it.
Use official links, do not use any links or contact details in any messages you have been sent.
The Federal Trade Commission's website, identitytheft.gov, can tell you of identity theft victims. And it provides step-by-step advice with how to deal with different situations.
Change your password
If your data has been breached7, the first thing you should do is change your password for the account involved.
Use a strong, long password including letters, numbers and symbols. And make sure to add a second level of security. That may include having an email or text sent to you. It could also mean using a device called a USB authenticator8.
And if you have been using the same, or similar, password for different online accounts, make changes to it for each site. Hackers9 may take your password from one service and try it on your other accounts.
Arar said, "Just because your info shows up in a breach doesn't mean someone's stolen your identity or money. But it does mean you're at risk." He said it is wise to monitor your accounts, change any leaked passwords, set up a second security system, and have a separate email address for less important sign-ups.
Keep monitoring
It can be hard to follow all the different data breaches. But there are online services that you can look at to see if your email has been involved in a data breach.
Darren Guccione is CEO of Keeper Security. It makes password protection programming and offers a tool called BreachWatch. It keeps watch on the dark web to see if your personal information shows up there.
He said, "When public data breaches occur, cybercriminals gather as much data as possible so they can sell it on the dark web."
Tell your bank and credit agencies
If your credit card payment numbers are stolen, inform your bank or credit card company. Explain that your card is at risk of fraud and ask them to warn you of any suspicious activity.
They will likely give you a new card. Additionally, some banks and credit cards permit you to lock your account online.
You can also inform credit agencies. The three main companies are Equifax, Experian and TransUnion. They can freeze your credit. That makes it hard to see your credit report and open a new account. Or they will ask lenders to contact you before lending money.
Take extra care
Online security experts warn that breaches involving a telephone company leave buyers at risk of having their phone numbers stolen. Thieves can use a stolen number to enter accounts that use that phone number as a second security.
To reduce that risk, telephone company AT&T advises creating a password that is needed to make large account changes. Also, delete emails containing personal information from your email account. That will help block possible damage by someone who gains entry to your email account.
Words in This Story
breach - n. an occurrence in which someone is able to get into a place that is guarded or is able to get secret information.
hack5 - v. to secretly get access to the files on a computer or network in order to get information or cause damage
expose - v. to reveal
symbol - n. a letter, group of letters, character, or picture that is used instead of a word or group of words
monitor - v. to watch, observe, listen to, or check (something) for a special purpose over a period of time
occur - v. to happen
fraud - n. the crime of using dishonest methods to take something valuable from another person
1 misused | |
v.使用…不当( misuse的过去式和过去分词 );把…派作不正当的用途;虐待;滥用 | |
参考例句: |
|
|
2 breach | |
n.违反,不履行;破裂;vt.冲破,攻破 | |
参考例句: |
|
|
3 breaches | |
破坏( breach的名词复数 ); 破裂; 缺口; 违背 | |
参考例句: |
|
|
4 vice | |
n.坏事;恶习;[pl.]台钳,老虎钳;adj.副的 | |
参考例句: |
|
|
5 hack | |
n.劈,砍,出租马车;v.劈,砍,干咳 | |
参考例句: |
|
|
6 hacked | |
生气 | |
参考例句: |
|
|
7 breached | |
攻破( breach的现在分词 ); 破坏,违反 | |
参考例句: |
|
|
8 authenticator | |
认证器 | |
参考例句: |
|
|
9 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎 点击提交 分享给大家。