![]() ![]() Make a list of your most vulnerable accounts. ![]() Step 1: Identify your most vulnerable accounts and secure them Cyber criminals use these data to commit identity theft and fraudulent credit applications, or use the personal information to gain your trust in phishing attacks.īelow, we outline several steps you can take to proactively defend yourself, and how to detect and respond to malicious uses of your data and identity. More likely, the data will be distributed across the dark net (sold at first, but eventually available for free). While its legitimacy has not yet been verified, it is unlikely the attackers will delete the data and move on. Late last week, an anonymous poster on a dark web forum posted a sample of data ostensibly from the breach, with an offer not to sell the data if Optus pays a US$1 million ransom. How not to tell customers their data is at risk: the perils of the Optus approach What happens with your data next, and what can the average Australian do to protect against the threats caused by this unprecedented data breach? ![]() Optus states they have notified those affected, but there are plenty of questions remaining. The stolen data constitutes an almost complete suite of identity information about a significant number of Australians. Optus has been contacting former and current customers to notify them of the data breach. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |