How to Protect Your Online Accounts from Being Breached

Jun 27, 2022

Stolen login credentials are a hot commodity on the Dark Web. There’s a price for every type of account from online banking to social media. For example, hacked social media accounts will go for between £25-60 each.

The rise in reliance on cloud services has caused a big increase in breached cloud accounts. Compromised login credentials are now the #1 cause of data breaches globally, according to IBM Security’s latest Cost of a Data Breach Report.

Having either a personal or business cloud account compromised can be very costly. It can lead to a ransomware infection, compliance breach, identity theft, and more.

To make matters more challenging, users are still adopting bad password habits that make it all too easy for criminals. For example:

  • 34% of people admit to sharing passwords with colleagues
  • 44% of people reuse passwords across work and personal accounts
  • 49% of people store passwords in unprotected plain text documents

 

Cloud accounts are more at risk of a breach than ever, but there are several things you can do to reduce the chance of having your online accounts compromised.

Contact us here at ABC Service today to find out more about how we can help you….however, there is some further information below.

Quick Answer :
To protect your online accounts from being breached, use strong unique passwords, enable two-factor authentication, avoid suspicious links, and regularly update your security settings.

USE MULTI-FACTOR AUTHENTICATION (MFA)

Multi-factor authentication (MFA) is the best method there is to protect cloud accounts. While not a failsafe, it is proven to prevent approximately 99.9% of fraudulent sign-in attempts, according to a study cited by Microsoft.

When you add the second requirement to a login, which is generally to input a code that is sent to your phone, you significantly increase account security. In most cases, a hacker is not going to have access to your phone or another device that receives the MFA code, thus they won’t be able to get past this step.

The brief inconvenience of using that additional step when you log into your accounts is more than worth it for the bump in security.

USE A PASSWORD MANAGER FOR SECURE STORAGE

One way that criminals get their hands on user passwords easily is when users store them in unsecured ways. Such as in an unprotected Word or Excel document or the contact application on their PC or phone.

Using a password manager provides you with a convenient place to store all your passwords that is also encrypted and secured. Plus, you only need to remember one strong master password to access all the others.

Password managers can also autofill all your passwords in many different types of browsers, making it a convenient way to access your passwords securely across devices.

 

REVIEW/ADJUST PRIVACY & SECURITY SETTINGS

Have you taken time to look at the security settings in your cloud tools? One of the common causes of cloud account breaches is misconfiguration. This is when security settings are not properly set to protect an account.

You don’t want to just leave SaaS security settings at defaults, as these may not be protective enough. Review and adjust cloud application security settings to ensure your account is properly safeguarded.

 

USE LEAKED PASSWORD ALERTS IN YOUR BROWSER

You can have impeccable password security on your end, yet still have your passwords compromised. This can happen when a retailer or cloud service you use has their master database of usernames and passwords exposed and the data stolen.

When this happens, those leaked passwords can quickly end up for sale on the Dark Web without you even knowing it.

Due to this being such a prevalent problem, browsers like Chrome and Edge have had leaked password alert capabilities added. Any passwords that you save in the browser will be monitored, and if found to be leaked, you’ll see an alert when you use it.

How to protect your online accounts from being breached, abc service, 1

Look for this in the password area of your browser, as you may have to enable it. This can help you know as soon as possible about a leaked password, so you can change it.

 

DON’T ENTER PASSWORDS WHEN ON A PUBLIC WI-FI

Whenever you’re on public Wi-Fi, you should assume that your traffic is being monitored. Hackers like to hang out on public hot spots in airports, restaurants, coffee shops, and other places so they can gather sensitive data, such as login passwords.

You should never enter a password, credit card number, or other sensitive information when you are connected to public Wi-Fi. You should either switch off Wi-Fi and use your phone’s wireless carrier connection or use a virtual private network (VPN) app, which encrypts the connection.

USE GOOD DEVICE SECURITY

If an attacker manages to breach your device using malware, they can often breach your accounts without a password needed. Just think about how many apps on your devices you can open and already be logged in to. To prevent an online account breach that happens through one of your devices, make sure you have strong device security. Best practices include:

  • Antivirus/anti-malware
  • Up-to-date software and OS
  • Phishing protection (like email filtering and DNS filtering)

 

LOOKING FOR PASSWORD & CLOUD ACCOUNT SECURITY SOLUTIONS?

Don’t leave your online accounts at risk.

We can help you review your current cloud account security and provide helpful recommendations.

Contact us here at ABC Service or feel free to enquire about our talks

Article used with permission from The Technology Press.

OLDER POSTS

Tired of Being On Hold? Why a Local IT Partner Beats National Call Centres in Devon

We’ve all been there. You’re in the middle of a busy Tuesday morning in Tavistock, your internet has decided to take an unscheduled holiday, and your printer is making a sound like a tractor in distress. You call your national IT provider, only to be met with twenty...

Memory Lane is Getting Expensive: Why RAM Prices are Climbing in 2026

If you’ve popped into our Tavistock office lately or been browsing for a new laptop online, you might have noticed something a bit unsettling. The prices aren’t just creeping up; they’re leaping. Specifically, the cost of “Memory” or RAM (Random...

Mastering Art Prints: How Do I Make Prints of My Artwork

Creating art is a deeply personal journey, an expression of your unique perspective. Yet, transforming these cherished pieces into prints can feel daunting. The question “how do I make prints of my artwork?” often lingers in the minds of many artists eager...

Uniting Ideas Through Ink: Democracy in Business Printing

In an age where polarisation seems to touch every corner of society, the notion of democracy in business printing stands as a beacon of inclusivity and diversity. Imagine a small printing company bustling with activity, its machines humming harmoniously as they...

The Hidden Dangers of Digital ID and Why We Do Not Agree with It

In an age where convenience often trumps caution, the concept of a Digital ID might initially seem like a step towards a seamless future. Imagine accessing services, making transactions, and verifying your identity with just a click—a digital utopia. However, beneath...

Guide: How to Choose a Reliable Printing Company in the UK

In today’s fast-paced business world, finding a printing company that delivers both quality and reliability can be a daunting task. With countless options available, each promising unmatched services, the decision can easily become overwhelming. Imagine the...

How Professional Guidance Helps Navigate Organisational Challenges

How Professional Guidance Helps Navigate Organisational Challenges In today’s fast-moving business world, organisations face a constant stream of challenges that can shift direction, slow progress, or create uncertainty. Whether it’s managing internal disputes,...

The Implications of Windows 10 End of Life: Best Practices and Comparisons

As the digital landscape constantly evolves, the technological lifecycles we once took for granted are becoming shorter and more intense. The looming Windows 10 End of Life marks a significant chapter in this ongoing saga, stirring both excitement and uncertainty...

5 Ways Technology Cuts Costs in Vehicle Transport

5 Ways Technology Cuts Costs in Vehicle Transport The vehicle transport industry has undergone a significant transformation over the past decade, largely driven by advances in technology. From logistics software to GPS tracking, technology not only improves efficiency...

Energy Provider Scams: The Dangerous Role of Your Meter Serial Number

Every day, millions of consumers unknowingly place their trust in energy providers, assuming that the industry is free of deceit and manipulation. However, the dark underside of this sector is teeming with fraudsters who capitalise on one simple piece of information:...