• HX Weekly
  • Posts
  • How do criminals use your data? Clue: it's obvious.

How do criminals use your data? Clue: it's obvious.

This week, our data and passwords were compromised in a large way. There is not way for you to protect your data anymore but there's always one thing you can do: change your password to a stronger one.

☝️ TOP STORY

AT&T data breach was almost comprehensive. What does that mean?

333 Commerce Street, Nashville, Tennessee, United States

Yes. Every one of AT&T customer was implicated. But our privacy had already been violated before. As for passwords, it’s always a good time to change it, and make sure to use the multi-factor authentication, where available.

REMEMBER: Always know what has been compromised or challenged. This way, you will be able to better protect yourself.

🤷‍♀️ What now?

Does it matter if criminals have our data?

Do you feel like there’s nothing you can do if your data has been breached? However, if you had backed up your data, it might make you feel better about the situation.

Important and sensitive data should be backed up offline and not be made available online as much as possible. Consider using intranet to share data.

Photo by Kelly Sikkema on Unsplash

Hot Tip: For critically important data, use an external hard drive. Do not back up to your primary computer local drives where it can be compromised. Data can still be made available to be shared online.

Title for the Editor's Note to talk about this edition.

about this edition and Inside Hexagon

Last week, we talked about backup and with the AT&T breach surfacing at the end of the week, we thought it might be expedient to talk about it more. So the big question now is, have you backed up your important files?

The new homepage continues to change and the old one is still available for all to use and growing. Please find more resources there each time you visit hexagoncenter.org.

HOUSEKEEPING

Your weekly dose of HX not only strengthens your knowledge on cybersecurity but also your personal security. Each week is tied to the last so as to form a rounded security wall in your personal lives.

Glossary/Legend:

  • Cyber hygiene, or cybersecurity hygiene - the practices and procedures that individuals and organizations use to maintain the health and security resilience of their systems, devices, networks, and data. The main goal of cyber hygiene is to keep sensitive data secure and protected from cyber-attacks and theft.

  • MFA (Multi-factor authentication or 2FA or 2-Factor Authentication) - a multi-step or 2-step account login process that requires users to enter more information than just one.

  • Cyber Attackers and Cyber Predators - these terms refer to people who use any kind of technology, including cell phones, to prey on us.

  • Phishing - a common type of cyber attack that targets individuals through email, text messages, phone calls, and other forms of communication.

  • A one-time password (OTP) - an automatically generated numeric or alphanumeric string of characters that authenticates a user for a single transaction or login session.

Spread cybersecurity culture

Do you have any suggestions on how we can further share this newsletter? Tell your friends and family about us by sharing with them the Hexagon Center official website:
View archives at hxweekly.beehiiv.com

Even though we aim to provide you the most current and critical information to keep you safe, threat actors work 24/7 and this newsletter publishes only once a week. Even though we are available via a hotline, it is crucial that you stay up to date via other sources as well to be informed on how you may be at risk.

You may reply to this newsletter or email us at
[email protected]

Send us any questions or things you want to talk about. Please share some fun facts with us. We welcome feedback and suggestions.

Hexagon Center is formed as a nonprofit corporation in California for public benefit,
in the process of acquiring 501(C)(3) status.

DISCLAIMER

Cybersecurity is an ever-changing field, and threats may evolve. While Hexagon Center strives to provide accurate and timely information, we cannot guarantee absolute security. Users are responsible for implementing their security measures and staying informed about the latest cybersecurity developments.

Content of this newsletter is not officially of Hexagon Center.

Reply

or to participate.