{"id":268,"date":"2021-07-07T17:17:08","date_gmt":"2021-07-07T17:17:08","guid":{"rendered":"https:\/\/rm73v2idht.onrocket.site\/?p=268"},"modified":"2022-11-22T18:49:15","modified_gmt":"2022-11-22T18:49:15","slug":"hackers-have-now-exposed-over-8-billion-username-and-password-combinations-were-your-credentials-among-them","status":"publish","type":"post","link":"https:\/\/blog.integrityfirstins.biz\/?p=268","title":{"rendered":"Hackers Have Now Exposed Over 8 Billion Username and Password Combinations \u2013 Were Your Credentials Among Them?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2021\/07\/Hackers-Exposed-Password-Combinations-blog-1024x1024.png\" alt=\"Hackers Have Now Exposed Over 8 Billion Username and Password Combinations\" class=\"wp-image-270\" srcset=\"https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2021\/07\/Hackers-Exposed-Password-Combinations-blog-1024x1024.png 1024w, https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2021\/07\/Hackers-Exposed-Password-Combinations-blog-300x300.png 300w, https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2021\/07\/Hackers-Exposed-Password-Combinations-blog-150x150.png 150w, https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2021\/07\/Hackers-Exposed-Password-Combinations-blog-768x768.png 768w, https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2021\/07\/Hackers-Exposed-Password-Combinations-blog.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The week of June 7<sup>th<\/sup> may have seen the biggest release of hacked data ever published to the dark web.&nbsp; Hackers publicly released over 8 billion username and password combinations!<\/p>\n\n\n\n<p><a href=\"https:\/\/www.thegatewaypundit.com\/2021\/06\/hackers-expose-8-4-billion-passwords-post-online-possibly-largest-dump-passwords-ever\/\">A 100GB list of data assumed to be stolen during various hacks was posted to a popular hacker forum.<\/a>&nbsp; This is now being referred to as the \u201cRockYou2020\u201d list.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Want To Check To See If You Were A Part Of This?<\/strong><\/h2>\n\n\n\n<p>Check here to see if your data was part of this dump: <a href=\"https:\/\/cybernews.com\/personal-data-leak-check\/\">https:\/\/cybernews.com\/personal-data-leak-check\/<\/a><\/p>\n\n\n\n<p>To use this tool, all you must do is enter your email or phone number.&nbsp; The tool can safely access the hacked username and password combinations on the dark web.&nbsp; It will let you know if your data is found.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What To Do If Your Data Was A Part Of The Released Data<\/strong><\/h2>\n\n\n\n<p>If the tool tells you that your data was compromised, you should start mitigation steps immediately.&nbsp; Go to every account that uses the exposed username\/password and change the password.&nbsp; Be sure to use different passwords for each account that are considered to be \u201cstrong\u201d.<\/p>\n\n\n\n<p>Want to know what makes a strong password?&nbsp; A rule of thumb is to create a password that has the following 6 characteristics:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>More than 12 characters<\/li><li>Contains at least 1 uppercase character<\/li><li>Contains at least 1 lowercase character<\/li><li>Contains at least 1 number<\/li><li>Contains at least 1 symbol<\/li><li>Contains no \u201creal\u201d words that could be guessed via a dictionary attack (where they go through a list of words from the dictionary and try to guess your password)<\/li><\/ol>\n\n\n\n<p>In addition, you\u2019ll want to be sure to look for any unexpected activity within the account.&nbsp; Make sure that all of your personal information is correct and that no money has been transferred unexpectedly.<\/p>\n\n\n\n<p>If given the option, turn on the \u201cTwo-Factor Authentication\u201d (or \u201c2FA\u201d) option associated with the account.&nbsp; This will require you to enter a code from your cell phone or email to authenticate who you are.&nbsp; 2FA protects your accounts from hacker dumps like this.<\/p>\n\n\n\n<p>Yes, this is a pain.&nbsp; However, it\u2019s better to have your personal and financial data protected.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How To Protect Your Data Easily Using Password Managers<\/strong><\/h2>\n\n\n\n<p>There are ways to make tasks associated with passwords easier. &nbsp;<a href=\"https:\/\/tech.co\/news\/average-person-100-passwords\">According to a study by NordPass, the average person has 100+ online passwords<\/a>.&nbsp; Who can remember that many passwords?<\/p>\n\n\n\n<p>INF recommends using a password manager like <a href=\"https:\/\/keepass.info\/\">KeePass<\/a> or <a href=\"https:\/\/1password.com\/\">1Password<\/a>.&nbsp; A password manager will help you create and remember well-formed passwords for all of your accounts.&nbsp; In fact, you can copy and paste from these managers, so you don\u2019t have to type anything going forward.<\/p>\n\n\n\n<p>These password managers can also be installed on your phone.&nbsp; This makes browsing the web a breeze when you need to access your passwords.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Is There Anything That You Can Do To Protect Your Business Further?<\/strong><\/h2>\n\n\n\n<p>Yes, you can protect your business with a cyber liability policy.&nbsp; These policies help protect you from the threat of hackers, data dumps, stolen passwords, <a href=\"https:\/\/blog.integrityfirstins.biz\/?p=264\">ransomware attacks<\/a> and more.&nbsp;<\/p>\n\n\n\n<p>It takes less than 5 minutes to fill out the application for this insurance.&nbsp; Contact INF to get started at 412.563.2106.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The week of June 7th may have seen the biggest release of hacked data ever published to the dark web.&nbsp; Hackers publicly released over 8 billion username and password combinations! A 100GB list of data assumed to be stolen during &hellip; <a href=\"https:\/\/blog.integrityfirstins.biz\/?p=268\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-268","post","type-post","status-publish","format-standard","hentry","category-cyber-liability-insurance"],"_links":{"self":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts\/268","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=268"}],"version-history":[{"count":3,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts\/268\/revisions"}],"predecessor-version":[{"id":272,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts\/268\/revisions\/272"}],"wp:attachment":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}