The infographic titled "How to create a passphrase?" covers four key steps.
The first step is to pick 4-5 random letters. Accompanying this is a string of letters as an example, SEOT.
The second step says "Assign a word to each letter". This is accompanied by the example Sunny Egg on Orange Toast.
The third step says "Add numbers or characters" this is accompanied by the example SunnyEgg4OrangeToast.
The fourth step says "That's your memorable passphrase!" This is accompanied by an image of a sunny-side up fried egg on a piece of orange bread.
2. Monitor and notify key people and services
It's important to get on the front foot when it comes to monitoring key accounts as attackers will frequently leverage the information stolen in a data breach to try and steal funds by accumulating more of your accounts and transacting on your behalf.
To that end, it's important to:
- Notify your bank and super/pension funds to enable heightened monitoring on your accounts.
- Request a temporary ban on your credit report, which helps stop unauthorised loan or credit applications. See https://www.commbank.com.au/latest/partnerships/credit-savvy.html for more details.
- Monitor your bank account for any unauthorised transactions.
3. Up your phishing vigilance
Attackers can use information that's been stolen about you to make their phishing lures more believable to both you and your friends and family. This can make phishing emails and messages harder to detect and is why it's also a good idea to notify key people in your life so they can be extra scam aware too if anyone contacts them claiming to be you and asking for things like urgent transfers of money.
As well as being on-guard, it can also be a good defensive move to consider spreading your risk when it comes to email. If you have an email address that's been involved in breaches, consider setting up a new email account and shifting any services linked to your identity (such as banking, telco and government services) over to this account. Keep this new account only for your most important digital services, defend it well with a strong password and MFA and don't give this email address out to friends or use it for lower tier digital accounts such as shopping.
4. Do a social media health-check
Social media can be a rich source of additional information about you that can be used to maliciously target you, or to help a potential attacker impersonate you.
Monitor social media accounts closely following a potential data breach, but also consider these proactive steps to improve your social media privacy and security.
- Only connect with people you actually know / have met in real life.
- Use privacy controls within apps to control who can see your posts and information and who can message you directly.
- Always open a social media app to read any messages, rather than clicking on a link in an email.
- Limit the personal information you share (don't include things like your real birthday).
- Think about what you're sharing and what information it's giving away every time you post a status or photo.
- Don't use public computers or public Wi-Fi to sign into social media accounts.
- Ensure you monitor for cloned accounts of existing friends. Attackers like to clone your friends accounts and send you duplicate friend requests to try and bypass your public facing privacy controls.
5. Check your active sessions
Some accounts, and smart device apps, may create sessions where you are able to bypass full login requirements, with a simplified process. Once these sessions are created, changing your password will not always prevent an attacker from maintaining access to your account.
In these instances, you want to review the active sessions via your security settings and delete, or end, any that you are not completely certain of. If in doubt, close them all after changing your password and log back on from scratch.