{"id":5195,"date":"2018-09-13T18:30:44","date_gmt":"2018-09-13T13:00:44","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=5195"},"modified":"2020-08-18T19:28:18","modified_gmt":"2020-08-18T13:58:18","slug":"data-breach-survival-guide","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/","title":{"rendered":"Guide To Survival The Data Breach"},"content":{"rendered":"<div itemscope itemtype=\"http:\/\/schema.org\/ImageObject\">\n<meta itemprop=\"name\" content=\"Data Breach Essential Guide\"><br \/>\n<img decoding=\"async\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/09\/data-breach-survival-guide.png\" class=\"img-responsive\" alt=\"Data Breach Essential Guide\" itemprop=\"contentUrl\"\/><br \/>\n<meta itemprop=\"datePublished\" content=\"2018-09-13\"><br \/>\n<meta itemprop=\"description\" content=\"Are you one of the millions of people who have had their data stolen in data breaches? This essential guide shows you how to protect yourself if you\u2019ve been involved in a data breach.\">\n<\/div>\n<p>Many of us might have fallen a prey to cyber criminals at least once in the last few years and suffered a bit due to <em>data breach<\/em> issues. In all cases, a cybercriminal uses malware to infiltrate the systems to cull out the required data, but if an <strong><a href=\"https:\/\/antivirus.comodo.com\/\" rel=\"noopener\" target=\"_blank\">antivirus software<\/a><\/strong> is installed then it can prevent such attacks.<\/p>\n<p>Today, busniesses big or small have become prime targets of data breaches. For instance, the infamous Equifax breach reportedly attacked 143 million people, and the Exactis breach affected a whopping 340 million.<\/p>\n<p>In both the cases, the main objective of the infiltrators was to collect data from as many people as possible and then trade it for cash to legitimate businesses. Beyond question, there\u2019s big money involved in data collection, buying, and selling.<\/p>\n<p>Many e-commerce companies collect information such as user habits, likes, contact info, and other details. Organizations such as Exactis collect such valuable data and when cybercriminals infiltrate these databases, they hit a jackpot.<\/p>\n<p><strong>Data Breach \u2013 What is it?<\/strong><\/p>\n<p>Data breach refers to an infiltration attempt using illegal techniques by a cybercriminal to access protected confidential information. Breach here interprets to an opening which is not supposed to be there and it can be directly interpreted to an exploitable hole in the system security.<\/p>\n<p><strong>Confidential Informations That Are Targeted!<\/strong><\/p>\n<p>There are many confidential details that are targeted by the online criminals. However, these data need to be gathered from different sources and from different locations. Some of the details include:<\/p>\n<ul>\n<li>Username<\/li>\n<li>Address<\/li>\n<li>Password<\/li>\n<li>Date of Birth<\/li>\n<li>Email address<\/li>\n<li>Phone numbers<\/li>\n<li>Driver\u2019s license info<\/li>\n<li>Purchase History<\/li>\n<li>Bank account details<\/li>\n<li>Credit card number<\/li>\n<li>Social security number<\/li>\n<\/ul>\n<p><strong>What is the right approach when a data breach happens?<\/strong><\/p>\n<p>An antivirus software in place would prevent such attacks however, when it is compromised the user will get alerts. When confidential information gets compromised in the organization like Equifax, presumably, the breached company would alert its customers right away. Its reports will carry details on when the breach happened and what data was exposed.<\/p>\n<p>Previously, Equifax, for instance, never disclosed the breach news for a couple months nor did it alert its client base. This could have been for many reasons such as \u2013 out of embarrassment, damage control, or just poor management. This is not right and it is totally unethical since customers have all the right to know about the breach.<\/p>\n<p><strong>What Should The Data Breach Victim Do?<\/strong><\/p>\n<p>When the confidential information is compromised, here is a list of things that they need to do immediately:<\/p>\n<ul>\n<li>Firstly, determine what info was breached<\/li>\n<li>It doesn&#8217;t matter what went wrong or where it went wrong, change all the passwords<\/li>\n<li>Avoid opening links in emails or texts, cybercriminals could be phishing for the second time<\/li>\n<li>In case its a banking fraud contact your bank and change all your cards and the required credentials<\/li>\n<li>If it&#8217;s a social security number (SSN) theft, contact a credit reporting agency<\/li>\n<li>Driver\u2019s license\/personal ID theft, call the issuing governmental office<\/li>\n<\/ul>\n<p><strong>Use an antivirus software<\/strong><\/p>\n<p>In order to stay safe from spam attacks that carry infected links, and all types of malware, it is advisable to install <a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus.php\" target=\"_blank\" rel=\"noopener\">antivirus software<\/a> from Comodo. If any cyberattackers attempt to breach your defenses, the antivirus software will keep them at bay. Download Comodo Antivirus to identify, block and remove viruses and any other <a href=\"https:\/\/enterprise.comodo.com\/how-to-get-rid-of-malware.php\"target=\"_blank\" + title=\"How to Get Rid of Malware\">malware<\/a> like Trojans, Spyware, Adware, etc.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<p><strong>Related Resources<\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\" target=\"blank\" rel=\"noopener\">Best Antivirus<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/antivirus-for-android.php\" target=\"blank\" rel=\"noopener\">Antivirus for Android<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/virus-protection.php\" target=\"blank\" rel=\"noopener\">Virus Protection<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many of us might have fallen a prey to cyber criminals at least once in the last few years and suffered a bit due to data breach issues. In all cases, a cybercriminal uses malware to infiltrate the systems to cull out the required data, but if an antivirus software is installed then it can [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":5197,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[12,229,63],"class_list":["post-5195","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-comodo-news","tag-antivirus-software","tag-data-breach","tag-free-antivirus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How To Survive A Data Breach | A Step-by-Step Guide<\/title>\n<meta name=\"description\" content=\"Are you a victim of a major data breach? Here is a simple guide to mitigating the impact of it. Install Comodo Antivirus software to prevent data breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Survive A Data Breach | A Step-by-Step Guide\" \/>\n<meta property=\"og:description\" content=\"Are you a victim of a major data breach? Here is a simple guide to mitigating the impact of it. Install Comodo Antivirus software to prevent data breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-13T13:00:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-18T13:58:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/09\/data-breach-essential-guide.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/\",\"name\":\"How To Survive A Data Breach | A Step-by-Step Guide\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/09\/data-breach-essential-guide.png\",\"datePublished\":\"2018-09-13T13:00:44+00:00\",\"dateModified\":\"2020-08-18T13:58:18+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Are you a victim of a major data breach? Here is a simple guide to mitigating the impact of it. Install Comodo Antivirus software to prevent data breaches.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/09\/data-breach-essential-guide.png\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/09\/data-breach-essential-guide.png\",\"width\":200,\"height\":200,\"caption\":\"Data Breach Essential Guide\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Guide To Survival The Data Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How To Survive A Data Breach | A Step-by-Step Guide","description":"Are you a victim of a major data breach? Here is a simple guide to mitigating the impact of it. Install Comodo Antivirus software to prevent data breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/","og_locale":"en_US","og_type":"article","og_title":"How To Survive A Data Breach | A Step-by-Step Guide","og_description":"Are you a victim of a major data breach? Here is a simple guide to mitigating the impact of it. Install Comodo Antivirus software to prevent data breaches.","og_url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2018-09-13T13:00:44+00:00","article_modified_time":"2020-08-18T13:58:18+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/09\/data-breach-essential-guide.png","type":"image\/png"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/","url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/","name":"How To Survive A Data Breach | A Step-by-Step Guide","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/09\/data-breach-essential-guide.png","datePublished":"2018-09-13T13:00:44+00:00","dateModified":"2020-08-18T13:58:18+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Are you a victim of a major data breach? Here is a simple guide to mitigating the impact of it. Install Comodo Antivirus software to prevent data breaches.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/09\/data-breach-essential-guide.png","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/09\/data-breach-essential-guide.png","width":200,"height":200,"caption":"Data Breach Essential Guide"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-breach-survival-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Guide To Survival The Data Breach"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=5195"}],"version-history":[{"count":17,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5195\/revisions"}],"predecessor-version":[{"id":14875,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5195\/revisions\/14875"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/5197"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=5195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=5195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=5195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}