What is a data leak?
A data leak is an unauthorized disclosure of sensitive or confidential information. This can happen in a variety of ways, such as through a cyberattack, human error, or a lost or stolen device.
What types of data can be leaked?
Any type of data can be leaked, including personal information such as names, addresses, Social Security numbers, and credit card numbers. It can also include business information such as trade secrets, financial data, and customer lists.
What are the risks of a data leak?
A data leak can have a number of serious consequences for individuals and businesses. For individuals, a data leak can lead to identity theft, financial fraud, and other forms of cybercrime. For businesses, a data leak can damage their reputation, lead to financial losses, and result in regulatory fines.
What to do if you are a victim of a data leak?
- Look out for Phishing Attacks
- Stop sharing Personal information online
- Avoid clicking Unverified links
- Watch out for unusual Activities in your account
If your email address/password has been compromised.
- Change your PASSWORD immediately. Use a strong and unique password. Do no use personal information
- Use different passwords for your various online accounts.
- Enable MULTI-FACTOR Authentication in your accounts.
- Look out for phishing emails. Tip: Phishing emails ask for your personal/financial information
Compromised credit card/bank details
- Immediately contact your card/bank issuer and follow their instructions/protocols to cancel the card and secure your bank account and funds.
Other ways to protect yourself:
- Do not share personal information online
- Patch security and software vulnerabilities. Ask assistance to MIS.
- Never click on any links attached to a text or email.
IMMEDIATE response when personal information is leaked:
- Identify how the information was compromised.
- Once identified, containment should be implemented to prevent additional compromise of personal information.
- Submit Incident Report to Data Protection Officer for evaluation.
Personal Identifiable Information frequently compromised:
- Credit cards/bank details
- Home addresses
- Phone/mobile numbers
- Email addresses and passwords
- Personal records and biometrics data