T-Mobile is still investigating his massive data breach earlier this month, which affected more than 54 million people. The violation includes names, driver’s license numbers, social security numbers, and device identification numbers (IMEI and IMSI) for subscribers, former customers and potential customers who may have been interested in the T-Mobile service at one point. The violation also includes Metro by T-Mobile customers. This means that almost anyone who gave their information to T-Mobile could be affected.
T-Mobile CEO Mike Sievert posted a blog post Friday with an update on the cyberattack. “Fortunately, the breach did not reveal any customer financial information, credit card information, debit or payment information,” he said. The wireless operator now offers free identity theft protection, advanced spam blocking and its account takeover protection service to protect postpaid customers from theft of their phone numbers. Sievert also mentioned that T-Mobile has formed long-term partnerships with Mandiant and KPMG for more cybersecurity expertise.
The company has also reset the PINs of all prepaid customers after the exposure of 850,000 accounts, but that is not enough. The mobile telephone operator is now faced with afor the breach. In last Friday’s press release, T-Mobile did not report “any indication” that financial data such as credit cards or other payment information has been compromised. The company is still completing its investigation and will notify those whose data has been accessed. At this time, there is no way of knowing if you need to take further action, but Sievert has confirmed that “there is no continued risk to customer data from this breach.”
As the situation evolves, you can read our guide to class action against T-Mobile. Here are some steps you can take to protect your sensitive data from being hacked, whether or not your information has been included in .. We will also keep you informed of a possible
Freeze your credit with the three bureaus
One of the first things to do is freeze your credit. This will prevent anyone with your information from opening a line of credit or taking out loans on your behalf. It will not take long to freeze your credit: you just need to fill out a form with Equifax, and (one from each company) to apply.
The downside to freezing your credit is that when you want to make certain purchases,, you will need to go through the process of brief deletion of your credit freeze and then refreezing when you are done.
Yes, it is embarrassing. But the extra time you take to freeze, thaw and then re-freeze your credit is worth it and is paltry compared to the time you would spend trying to fix the damage caused by someone opening a credit card or line of credit. in your name.
Use a credit monitoring service
Staying on top of what’s on your credit report is an easy way to make sure someone isn’t misusing your information. Some companies offer free credit monitoring to victims of a data breach, but this is often only temporary. For example, T-Mobile offers two years McAfee Identity Theft Protection Service free of charge to those affected by the latest breach. Take advantage of offers like this if your data is included in a breach, but once the limited time offer expires, be ready to sign up for another service.
There are manythat help you monitor your credit report and use one could mean you’ll get an alert and hopefully catch the fake accounts as soon as they happen.
Sign up for Identity Theft Watch
Monitoring your credit report is an important step to take; however, there is so much more that can be done with your personal information. In addition to keeping an eye on your social security number and credit, awill monitor the dark web for anyone selling or trading your personal information or making arrests on your behalf. It should give you comfort if someone tries to do anything with your personal information.
Store your login details with a password manager
Using a unique, strong password for each online account you have is an easy way to ensure that a breach of a service does not cause malicious people to gain access to more of your online accounts. line where you used the same password.
Instead of reusing a password – or a series of passwords –, store and automatically fill in your login information.
Don’t wait any longer to protect your personal data
The most important aspect of taking action after reporting a hack or a breach is not to wait for the affected companies to announce how they want you to handle it. Be proactive. Ultimately, it’s your information and your financial future that is at stake.
After you’ve locked your credit and started monitoring services, start looking at suggestions from affected companies.
Some breaches lead to regulations, forcing the company to offer free services or regulations,.