How organizations can survive a cyber security attack

September 19, 2022

In the wake of recent cyberattacks around the world, companies, employees and even customers may wonder what they can do to protect themselves if a service they are using has been compromised.

Cyber attacks can maliciously disable computers, steal data, or use a compromised computer as a launch pad for additional attacks.

Depending on the type and manner of the attack, there is a list of things that must be done,  including changing passwords, freezing credit cards, activating multi-factor authentication, and using the latest version of applications.

It is important that organization change the password to prevent the hacker from accessing information such as name, address, phone number and credit card information. They can do that by using a complex password that contains symbols, numbers, upper- and lower-case letters. Passwords that resemble old ones should be avoided.

Organization should freeze credit cards in case of suspected leaks of credit card information during a data breach. They must monitor credit card values in the event of changes and freeze credit card payments to prevent unauthorized payments.

They must also enable two-factor authentication because it makes it harder for hackers to access critical information. It also adds an extra layer of security to the login process by requiring the user to give permission for a secondary device.

Stay up to date with developments to implement the damage mitigation measures proposed by the company and be aware of what may have been exposed in the hack.

Using the latest version of an app is also recommended because app developers regularly send updates to their software to address security vulnerabilities and improve the utility of the program.

The sources for this piece include an article in Reuters.

Top Stories

Related Articles

April 17, 2026 Booking.com has confirmed a data breach exposing customer booking details and contact information, prompting warnings about a more...

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn