What to Do If Your Personal Data Has Been Exposed

2024-04-25

00:00 / 00:00
复读宝 RABC v8.0beta 复读机按钮使用说明
播放/暂停
停止
播放时:倒退3秒/复读时:回退AB段
播放时:快进3秒/复读时:前进AB段
拖动:改变速度/点击:恢复正常速度1.0
拖动改变复读暂停时间
点击:复读最近5秒/拖动:改变复读次数
设置A点
设置B点
取消复读并清除AB点
播放一行
停止播放
后退一行
前进一行
复读一行
复读多行
变速复读一行
变速复读多行
LRC
TXT
大字
小字
滚动
全页
1
  • As more of our lives move online, the risk of our personal data being stolen or misused is increasing.
  • 2
  • Personal data includes email addresses, phone numbers, birthdates, and even passwords.
  • 3
  • And large data breaches are happening more often.
  • 4
  • In breaches, online criminals can use stolen data to target people with leading messages to get important information.
  • 5
  • Or they can take out loans and credit cards in their name.
  • 6
  • Here are some ways to protect yourself:
  • 7
  • Oren Arar is vice president of buyer privacy at online security company Malwarebytes.
  • 8
  • He said in the United States, there is no federal law enforcing companies or organizations to inform individuals of a data breach.
  • 9
  • But he said it is common practice for them to do so and they often provide identity protection services.
  • 10
  • The situation is better in the European Union.
  • 11
  • It requires companies and organizations to tell individuals of some kinds of breaches.
  • 12
  • Even after a breach has been made public, cyber security experts say people need to pay attention.
  • 13
  • Look out for emails or phone calls that say they are from the hacked organization or someone offering help.
  • 14
  • Contact the organization to see if they can confirm it.
  • 15
  • Use official links, do not use any links or contact details in any messages you have been sent.
  • 16
  • The Federal Trade Commission's website, identitytheft.gov, can tell you of identity theft victims.
  • 17
  • And it provides step-by-step advice with how to deal with different situations.
  • 18
  • If your data has been breached, the first thing you should do is change your password for the account involved.
  • 19
  • Use a strong, long password including letters, numbers and symbols.
  • 20
  • And make sure to add a second level of security.
  • 21
  • That may include having an email or text sent to you.
  • 22
  • It could also mean using a device called a USB authenticator.
  • 23
  • And if you have been using the same, or similar, password for different online accounts, make changes to it for each site.
  • 24
  • Hackers may take your password from one service and try it on your other accounts.
  • 25
  • Arar said, "Just because your info shows up in a breach doesn't mean someone's stolen your identity or money.
  • 26
  • But it does mean you're at risk."
  • 27
  • He said it is wise to monitor your accounts, change any leaked passwords, set up a second security system, and have a separate email address for less important sign-ups.
  • 28
  • It can be hard to follow all the different data breaches.
  • 29
  • But there are online services that you can look at to see if your email has been involved in a data breach.
  • 30
  • Darren Guccione is CEO of Keeper Security.
  • 31
  • It makes password protection programming and offers a tool called BreachWatch.
  • 32
  • It keeps watch on the dark web to see if your personal information shows up there.
  • 33
  • He said, "When public data breaches occur, cybercriminals gather as much data as possible so they can sell it on the dark web."
  • 34
  • If your credit card payment numbers are stolen, inform your bank or credit card company.
  • 35
  • Explain that your card is at risk of fraud and ask them to warn you of any suspicious activity.
  • 36
  • They will likely give you a new card.
  • 37
  • Additionally, some banks and credit cards permit you to lock your account online.
  • 38
  • You can also inform credit agencies.
  • 39
  • The three main companies are Equifax, Experian and TransUnion.
  • 40
  • They can freeze your credit.
  • 41
  • That makes it hard to see your credit report and open a new account.
  • 42
  • Or they will ask lenders to contact you before lending money.
  • 43
  • Online security experts warn that breaches involving a telephone company leave buyers at risk of having their phone numbers stolen.
  • 44
  • Thieves can use a stolen number to enter accounts that use that phone number as a second security.
  • 45
  • To reduce that risk, telephone company AT&T advises creating a password that is needed to make large account changes.
  • 46
  • Also, delete emails containing personal information from your email account.
  • 47
  • That will help block possible damage by someone who gains entry to your email account.
  • 48
  • I'm Gena Bennett. And I'm Gregory Stachel.
  • 1
  • As more of our lives move online, the risk of our personal data being stolen or misused is increasing.
  • 2
  • Personal data includes email addresses, phone numbers, birthdates, and even passwords. And large data breaches are happening more often.
  • 3
  • In breaches, online criminals can use stolen data to target people with leading messages to get important information. Or they can take out loans and credit cards in their name.
  • 4
  • Here are some ways to protect yourself:
  • 5
  • Pay attention
  • 6
  • Oren Arar is vice president of buyer privacy at online security company Malwarebytes. He said in the United States, there is no federal law enforcing companies or organizations to inform individuals of a data breach.
  • 7
  • But he said it is common practice for them to do so and they often provide identity protection services.
  • 8
  • The situation is better in the European Union. It requires companies and organizations to tell individuals of some kinds of breaches.
  • 9
  • Even after a breach has been made public, cyber security experts say people need to pay attention.
  • 10
  • Look out for emails or phone calls that say they are from the hacked organization or someone offering help. Contact the organization to see if they can confirm it.
  • 11
  • Use official links, do not use any links or contact details in any messages you have been sent.
  • 12
  • The Federal Trade Commission's website, identitytheft.gov, can tell you of identity theft victims. And it provides step-by-step advice with how to deal with different situations.
  • 13
  • Change your password
  • 14
  • If your data has been breached, the first thing you should do is change your password for the account involved.
  • 15
  • Use a strong, long password including letters, numbers and symbols. And make sure to add a second level of security. That may include having an email or text sent to you. It could also mean using a device called a USB authenticator.
  • 16
  • And if you have been using the same, or similar, password for different online accounts, make changes to it for each site. Hackers may take your password from one service and try it on your other accounts.
  • 17
  • Arar said, "Just because your info shows up in a breach doesn't mean someone's stolen your identity or money. But it does mean you're at risk." He said it is wise to monitor your accounts, change any leaked passwords, set up a second security system, and have a separate email address for less important sign-ups.
  • 18
  • Keep monitoring
  • 19
  • It can be hard to follow all the different data breaches. But there are online services that you can look at to see if your email has been involved in a data breach.
  • 20
  • Darren Guccione is CEO of Keeper Security. It makes password protection programming and offers a tool called BreachWatch. It keeps watch on the dark web to see if your personal information shows up there.
  • 21
  • He said, "When public data breaches occur, cybercriminals gather as much data as possible so they can sell it on the dark web."
  • 22
  • Tell your bank and credit agencies
  • 23
  • If your credit card payment numbers are stolen, inform your bank or credit card company. Explain that your card is at risk of fraud and ask them to warn you of any suspicious activity.
  • 24
  • They will likely give you a new card. Additionally, some banks and credit cards permit you to lock your account online.
  • 25
  • You can also inform credit agencies. The three main companies are Equifax, Experian and TransUnion. They can freeze your credit. That makes it hard to see your credit report and open a new account. Or they will ask lenders to contact you before lending money.
  • 26
  • Take extra care
  • 27
  • Online security experts warn that breaches involving a telephone company leave buyers at risk of having their phone numbers stolen. Thieves can use a stolen number to enter accounts that use that phone number as a second security.
  • 28
  • To reduce that risk, telephone company AT&T advises creating a password that is needed to make large account changes. Also, delete emails containing personal information from your email account. That will help block possible damage by someone who gains entry to your email account.
  • 29
  • I'm Gena Bennett. And I'm Gregory Stachel.
  • 30
  • Kelvin Chan reported this story for The Associated Press. Gregory Stachel adapted it for VOA Learning English.
  • 31
  • _________________________________________________
  • 32
  • Words in This Story
  • 33
  • breach - n. an occurrence in which someone is able to get into a place that is guarded or is able to get secret information.
  • 34
  • hack - v. to secretly get access to the files on a computer or network in order to get information or cause damage
  • 35
  • expose - v. to reveal
  • 36
  • symbol - n. a letter, group of letters, character, or picture that is used instead of a word or group of words
  • 37
  • monitor - v. to watch, observe, listen to, or check (something) for a special purpose over a period of time
  • 38
  • occur - v. to happen
  • 39
  • fraud - n. the crime of using dishonest methods to take something valuable from another person