What to do after a cyberattack

Image Credits: UnsplashImage Credits: Unsplash

So, another company got hacked. Your inbox lights up with a “We care about your privacy” email, and suddenly you’re wondering if some hacker in a basement has your phone number, home address, and your old Yahoo password from 2013. (Spoiler: they probably do.)

We’re living in an era where personal data leaks are as common as weekly app updates. It’s not if your info’s been exposed—it’s how many times. But even in this breach-a-minute reality, most people still freeze when it gets personal.

Let’s walk through what to actually do when a company you used gets hacked, how to tell if it affects you, and how to stay a step ahead of the next phishing scam dressed in fake concern.

If you’ve used the internet in the last decade, your data has probably leaked at least once. Sometimes it’s harmless (an old email tied to a forgotten forum). Other times, it’s high-stakes—like the breach at a payroll provider where names, salaries, and bank accounts were exposed.

Recently:

  • Adidas said hackers stole customer service data (no passwords, but still personal info).
  • UK legal aid applicants had records going back to 2010 accessed.
  • Big names like the Co-op and Marks & Spencer faced disruptions after similar incidents.

These aren’t fringe sites. These are major brands. So the first rule? Don’t assume you’re immune.

If a breach makes the news, companies usually send emails to impacted users. Sometimes it goes to everyone “just in case.” Other times, it’s targeted to people whose data was definitely accessed.

Read it. Even if it’s boring. It usually tells you:

  • What was stolen (email, phone number, maybe more)
  • Who it affects (not everyone gets hit equally)
  • What to do next (password changes, fraud alerts, free monitoring)

In Adidas’s case, it was just users who had contacted customer service. Still, that detail helps you decide how worried to be—and what to do next.

Bonus tip: If they offer free credit monitoring or ID theft protection, accept it. That’s not spam—that’s your only freebie in this whole mess.

If the breached platform is something you use (or used), update your password now. Especially if you’ve reused that password on other accounts. (No shame—just fix it.)

Security basics:

  • 12+ characters
  • Mix of upper/lowercase, numbers, symbols
  • No pet names, birthdays, or “password123” disasters

The UK’s National Cyber Security Centre suggests using three random words strung together—like PizzaDuckSunflower!9. It’s weird. It’s effective.

If remembering dozens of unique passwords sounds impossible, it is. That’s why password managers exist. Bitwarden, 1Password, even your browser’s built-in one—anything beats Post-It notes or reusing the same “qwerty123”.

Passwords are breakable. Two-factor authentication (2FA) makes it way harder for anyone to get into your accounts—even if they somehow have your password.

Here’s how it works:

  • You enter your password.
  • Then you’re asked for a code—usually sent to your phone or generated by an app like Google Authenticator or Authy.

Pro tip: Use app-based codes, not SMS, when possible. SIM-swap scams are real, and they’re targeting people just like you.

Turn on 2FA for:

  • Email
  • Banking apps
  • Social media
  • Any service that supports it

It adds one extra tap—and blocks 99% of automated attacks.

Here’s the wild part: scammers love real cyberattacks. Why? Because they can piggyback off the headlines and send fake emails pretending to be from the breached company.

They’ll say things like:

“Click here to confirm your details.”
“Reset your password urgently.”

Sometimes, they’ll even have some real info about you (like your name or email) to make it look legit. That’s why it works. If you weren’t expecting an email? Don’t click links. Go to the company’s official website and log in there directly.

Marks & Spencer, for example, had to warn customers not to trust messages asking for login info—because those didn’t come from them. When in doubt, delete the message and contact the company on your own.

This is the long game. If your name, ID number, bank account, or salary info was leaked, fraudsters might try to open loans or credit cards in your name—months later.

To catch that early, monitor your credit.

Free tools:

  • Credit Karma
  • ClearScore
  • Some banks also offer credit alerts

These let you check your report for strange activity, like:

  • Applications for loans you didn’t make
  • Missed payments on accounts you never opened
  • A sudden drop in your credit score

If your employer was hacked, or a financial institution you use was breached, this step is mandatory. It’s not about panic. It’s about catching fraud before it becomes debt.

We all love one-click checkout. But saving your payment info with every site is a risk multiplier. Some websites don’t store your card info directly—they use third-party payment processors. But if those get breached? Your info’s still in play.

Best practice:

  • Don’t save your card unless it’s a site you use regularly
  • Uncheck that box at checkout
  • Clear stored cards from your accounts occasionally

Yes, it’ll take 30 extra seconds next time you shop. But it reduces the number of places hackers could find your financial data.

Not all scams come through email. WhatsApp, Instagram, and even TikTok DMs are breeding grounds for scams—especially after big leaks.

Example: the “Hi Mum” scam.
A fraudster texts pretending to be your child, says they’ve got a new phone, and urgently need money for a bill or to reset their online banking.

Real story. Real losses. And it often starts with data from a breach. Take a beat before sending money—especially if the message feels off. Call or voice-note the person. Verify it’s really them. Urgency is a scammer’s favorite weapon. Don’t fall for it.

We’re not saying you should go off-grid, delete your socials, and live in a yurt. But you do need to treat your data like something worth protecting—because it is.

Breach survival checklist:

  • Read the breach email (yes, even the boring parts)
  • Change your passwords
  • Turn on 2FA
  • Don’t click sketchy links
  • Monitor your credit
  • Don’t store card details everywhere
  • Verify messages before sending money

This isn’t about fear. It’s about digital hygiene—like brushing your teeth, but for your data.

Hackers are gonna hack. Companies are going to get caught flat-footed. But you? You can be the person who knows exactly what to do next. So when the next “We take your privacy seriously” email hits, you won’t panic. You’ll act. Because in a world where your data leaks more than your reusable water bottle, staying safe isn’t about perfection—it’s about paying attention.


Ad Banner
Advertisement by Open Privilege

Read More

Investing World
Image Credits: Unsplash
InvestingJune 12, 2025 at 7:30:00 PM

Why your investing portfolio needs to go international

Let’s get real: the average Gen Z or millennial portfolio today is still very US-heavy. Between S&P 500 ETFs, tech stocks, and US-based...

Financial Planning World
Image Credits: Unsplash
Financial PlanningJune 12, 2025 at 7:00:00 PM

Why younger workers are planning for their flextirement now

A slow shift, a louder signal: how millennials and Gen Z are restructuring work to pace—not escape. On Slack, they’re declining calendar invites...

Relationships World
Image Credits: Unsplash
RelationshipsJune 12, 2025 at 7:00:00 PM

Dog allergy symptoms and treatment

A few years ago in Oak Brook, Illinois, Gail Friedman started noticing something odd about her Parson Russell Terrier. He wouldn’t stop licking...

Careers World
Image Credits: Unsplash
CareersJune 12, 2025 at 6:30:00 PM

Is a pay cut worth it? What every job seeker needs to know

While tech layoffs and funding freezes dominate headlines in the West, a different signal is pulsing from fast-growing regions: skilled professionals are moving—for...

Insurance World
Image Credits: Unsplash
InsuranceJune 12, 2025 at 6:30:00 PM

Why more Singaporeans are downgrading their integrated Shield Plans

Once a no-brainer for upwardly mobile professionals, private health insurance in Singapore is no longer the default decision it once was. For those...

Investing World
Image Credits: Unsplash
InvestingJune 12, 2025 at 6:00:00 PM

What Gen Z investors should actually learn

If you’ve ever opened your investing app after a Trump speech or tariff tweet, you know the feeling: a sea of red, your...

Relationships World
Image Credits: Unsplash
RelationshipsJune 12, 2025 at 5:30:00 PM

How to support an empath child without dimming their light

Some children rearrange the emotional furniture of a room simply by being in it. They absorb the tension before words are spoken. They...

Politics World
Image Credits: Unsplash
PoliticsJune 12, 2025 at 5:00:00 PM

Why US defense chief's attack on China will not be well received in Southeast Asia

At this year’s Shangri-La Dialogue, US Secretary of Defense Pete Hegseth delivered what was perhaps the most strident attack yet on “communist China,”...

Transport World
Image Credits: Unsplash
TransportJune 12, 2025 at 5:00:00 PM

Why do new tires have rubber hairs

You’re in the driveway, admiring your freshly installed tires. Smooth black rubber, perfectly grooved tread—and then, those strange wiry little spikes sticking out...

Economy World
Image Credits: Unsplash
EconomyJune 12, 2025 at 4:00:00 PM

How Europe might be Southeast Asia's safeguard against the US-China trade conflict

The European Union’s revived interest in Southeast Asian trade ties cannot be viewed as just another regional diplomacy gesture. At a time when...

Culture World
Image Credits: Unsplash
CultureJune 12, 2025 at 4:00:00 PM

Why team ownership clarity breaks down in early-stage startups

Most early startup teams aren’t short on ideas. They’re short on clarity. A founder shares a great direction in standup: “Let’s relaunch the...

Culture World
Image Credits: Unsplash
CultureJune 12, 2025 at 4:00:00 PM

The team didn’t quit—but they stopped caring

We built the team with care. Thoughtfully. Deliberately. No ego hires. No toxic velocity plays. Just people who believed in the problem as...

Ad Banner
Advertisement by Open Privilege
Load More
Ad Banner
Advertisement by Open Privilege