How organizations can survive a cyber security attack

September 19, 2022

In the wake of recent cyberattacks around the world, companies, employees and even customers may wonder what they can do to protect themselves if a service they are using has been compromised.

Cyber attacks can maliciously disable computers, steal data, or use a compromised computer as a launch pad for additional attacks.

Depending on the type and manner of the attack, there is a list of things that must be done,  including changing passwords, freezing credit cards, activating multi-factor authentication, and using the latest version of applications.

It is important that organization change the password to prevent the hacker from accessing information such as name, address, phone number and credit card information. They can do that by using a complex password that contains symbols, numbers, upper- and lower-case letters. Passwords that resemble old ones should be avoided.

Organization should freeze credit cards in case of suspected leaks of credit card information during a data breach. They must monitor credit card values in the event of changes and freeze credit card payments to prevent unauthorized payments.

They must also enable two-factor authentication because it makes it harder for hackers to access critical information. It also adds an extra layer of security to the login process by requiring the user to give permission for a secondary device.

Stay up to date with developments to implement the damage mitigation measures proposed by the company and be aware of what may have been exposed in the hack.

Using the latest version of an app is also recommended because app developers regularly send updates to their software to address security vulnerabilities and improve the utility of the program.

The sources for this piece include an article in Reuters.

Top Stories

Related Articles

March 2, 2026 Thousands of exposed Google Cloud API keys can authenticate to Gemini endpoints when the Generative Language API more...

March 2, 2026 Threat actors are exploiting Microsoft Entra ID through Open Authorization (OAuth) consent abuse, using seemingly legitimate third-party more...

February 23, 2026 Researchers say they’ve identified a new strain of Android malware that uses Google’s own Gemini AI model more...

February 23, 2026 Texas officials are warning about what could be the largest data breach in U.S. history, with notification more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn