Ashley Madison Hack: How to Protect Your Finances

Anytime a big breach like the recent Ashley Madison hack/leak happens, one question tends to come to my mind: how ready are people to protect themselves? There is a myriad of steps individuals can take before and after they fall victim to a hack or scam.
This post was published on the now-closed HuffPost Contributor platform. Contributors control their own work and posted freely to our site. If you need to flag this entry as abusive, send us an email.

2015-08-20-1440075065-689639-ashleymadison.png
Copyright: Bacho via Shutterstock.com

While the recent Ashley Madison hack/leak will have unspoken results on a number of marriages, the same can be said about the financial security of affected users. The information released by the hackers includes names, addresses, credit card information, security questions and answers, and more. Anytime a big breach like this happens, one question tends to come to my mind: how ready are people to protect themselves? There is a myriad of steps individuals can take before and after they fall victim to a hack or scam. Below are some simple steps everyone can take to greatly improve financial security.

  1. Use the best security available to you. Credit card companies and technology firms are taking initiatives aimed at improving consumer data security. For example, a new card technology known as EMV (Europay, Mastercard, Visa) is being rolled out in the United States this year. The purpose of this upgrade is to make it harder for thieves to commit credit card fraud, by making cards harder to replicate. Consumers who want the best security against potential threats should make sure they are utilizing this type of technology, whenever it is available to them. While EMV may not have prevented the type of hack we witnessed with Ashley Madison, it does provide an additional line of defense against other attacks.

  • Monitor your credit history. Your identity might be stolen. Whenever a massive database of user info gets leaked, it is possible for someone to steal your identity -- this involves them opening credit card accounts, taking out loans, and other similar things, all in your name. One of the best way to monitor and check whether your personal information is being used is to actively check your credit score/report. Any suspicious or unrecognized activity should be promptly reported -- this government website helps take you through the steps.
  • Many credit card issuers today offer their customers the ability to get this information for free -- simply by being a customer. If your bank doesn't offer this service, you can always get a report by paying a fee or claiming your 1 free annual credit report.

  • Be more cautious of phony e-mails, phone calls, and letters. Not all credit card information is stolen as a result of massive data breaches. As a matter of fact, countless data is stolen every day, on a user-by-user basis. Hackers and fraudsters use tricks such as "phishing" to get -- that is trying to trick users into willingly handing over confidential information. According to a recent Apwg.org report, in December of 2014 alone, over 62,000 unique phishing e-mail campaigns were reported -- each campaign can target thousands or tens of thousands of users.
  • If you get a phone call from someone claiming to be from your bank, and then demanding "you verify your account information", don't be so quick to appease them. First, you should verify whether the person calling you is in fact a representative from your financial institution. Tell them you'll hang up, and call the bank directly, if they need to speak to you. While inconvenient, this is one of the only ways to make sure you are speaking with the right people. Similarly, be cautious of any links or fishy e-mails. These are often the #1 way hackers try to phish information from users.

  • Avoid saving payment data. Oftentimes, the price for better security is convenience. While it may be nice to be able to check-out of Amazon a bit faster, by having them store your credit card information, it is unsafe to do so. In the event that Amazon is breached, or your personal password is stolen, hackers have one more piece of information that they can exploit.
  • This last method is not always foolproof. Even if you don't save information with a service that is hacked, you should be just as cautious about your information being compromised. While you may not have saved payment information, many businesses still log it for internal use.

    Popular in the Community

    Close

    What's Hot