How to prevent a data breach

Credit cards and a padlock on top of a computer keyboard
(Image credit: Pixabay)

Data breaches cost, on average, $9,440,000 per year, just in the U.S. alone according to a report by IBM. It explains that the use of ransomware in connection with a data breach has grown by 41%, and in 2022, it took an average of nine 9 months to identify and contain a breach.

While major data breaches are often found with large companies, for example, AT&T, Twitter, Meta, and T-Mobile have all reported data breaches within the last year, the biggest breaches of personal identity information come from phishing schemes. This is malware that poses as a legitimate email or instant message from someone you know or a company you do business with. It asks for personal information, like login credentials or bank accounts, to steal your identity.

You can't always control a data breach, but there are things you can do to help minimize the damage. With all that said, an ounce of prevention is worth a pound of cure. So here are our recommendations:

1. Install reliable antivirus software

Since the biggest malware threat that contributes to data breaches is ransomware, it makes sense to use antivirus to detect and stop it. There isn't a huge threat of ransomware infecting a personal device, but there is a risk if you work in a high-profile industry, such as in government offices, infrastructure design, and construction, or even the military. Cybercriminals look for these types of workers and target their home computers and personal devices just in case they do any work from home or on the run.

Even if you’re not in a risky data-handling industry, using antivirus software is still a good way to protect your computer from any online or network threat out there.

A laptop showing a virus on the screen

(Image credit: Shutterstock)

2. Learn to recognize phishing

Phishing schemes are very specific scams that come through email messages, instant messages, and texts. They are becoming more and more difficult to recognize because cybercriminals are getting smarter. But there are still ways to detect a phishing scheme and steps you can take just to make sure you don’t fall prey to one.

To begin with, know that financial institutions, including banks and credit card companies, won’t ever send you a message asking for personal information to be sent to them. If you get any message asking for this kind of information, call your financial institution directly and ask them. 

In fact, any message that asks for personal identifying information, including your full name, birthday, address, or social security number, shouldn't be answered through return messages. Instead, call the company to see why they need that information. As an extra precaution, find the number from the company’s website, and don’t trust any contact information in the message you receive.

A graphical representation of a phishing scam

(Image credit: Vektor Illustration/Shutterstock)

Also, be wary of messages coming from someone you know asking you to help them out by paying money or purchasing gift cards. An experience I recently had was through an email message from the principal of a local school asking me to help him purchase gift cards to hand out to staff as an end-of-year thank you.

At first glance, it sounds like a legitimate request, but the sender’s email address did not originate from a school district email address. Furthermore, much of the message was written very poorly without proper grammar, capitalization, or punctuation.

When in doubt, call the person or company directly.

3. Invest in a VPN

A VPN, or virtual private network, is a tool that hides your online identity as you browse, shop, play, or work online. Everything that is shared, uploaded, downloaded, or sent through the web is encrypted, so it's difficult for snoops to grab your information even if it is intercepted.

The best VPNs have an effective kill switch that will protect your identity if the VPN connection is accidentally interrupted or lost. And, when you are done using the VPN, it won’t log your browser history, so there’s no way to trace your online activity back to you.

While using a VPN won’t stop a company data breach from happening, it can help you protect your data in your own home. It makes it more difficult for hackers to grab your information, keyloggers to swipe login credentials, and even cookies to remember you the next time you visit a website.

4. Use a password manager

Password managers are handy to have because they are a safe place to securely keep all your passwords to every account. When a hacker breaks into your device, one of the first things it looks for is a sticky note or Word document with your login credentials. This allows them to break into social medial accounts, online banks, and credit card sites in order to swipe personal and financial information.

With the right password, a cybercriminal could easily change your authorization information to their own, making it very difficult for you to log in and change your credentials. A password manager uses encryption to make it difficult for hackers to get your login information.

You can use a good password manager to quickly log into any online account. But it will also help you create passwords that are difficult for hackers and bots to figure out. With most people using birthdays, family members, or even pet names as passwords, it doesn’t take long for a bot to crack an easy password. But a password manager helps you create a difficult one and keeps it where you can get to and use it without having to write it down to remember.

Secrets password manager

(Image credit: Outer Corner)

5. Sign up for identity theft protection

Identity theft monitoring and identity theft protection are often used interchangeably, but there are differences between them. Both are helpful, though one is more comprehensive than the other.

ID theft monitoring looks out for your digital identity more than your physical. This includes the buying and selling of your email addresses, passwords, and phone numbers. Some services, such as Have I been pwned are free to use, though they are a bit limited. It won’t tell you exactly who, what, or where the breached information was found. And you have to do all the leg work in order to protect yourself going forward, including changing passwords, or adding your phone number to the National Do Not Call Registry.

Identity theft services take extra steps to help protect your identity, including tracking your physical identity, These services look at criminal records, medical records, and financial information to make sure someone other than yourself isn’t using your information.

If there has been a data breach and your information has been compromised, identity theft services will walk you through every step to help reclaim your identity, including providing the proper forms to fill out and submit to tax authorities and credit reporting agencies.

A person's face with identity theft scanning overlaid

(Image credit: Tumisu from Pixabay)

Or you can get an all-in-one solution

You can purchase each of the tools mentioned above as stand-alone programs. but it is possible to find software that combines all of them in one place making it easier to use them, and often, cheaper than buying them separately. These solutions are referred to as internet security suites.

For example, Bitdefender Total Security is a complete computer protection program that includes a VPN, password manager, and anti-phishing scheme tools. Buying Bitdefender will save you hundreds compared to buying each tool individually. 

The same is true of Norton 360 with LifeLock . On top of password managers, a VPN, and email monitoring, Norton also includes access to one of the leading identity theft services, Lifelock. It monitors both your physical and online identity and helps you restore your identity if compromised.

Other all-in-one solutions to consider include McAfee+ Ultimate and Avast One Premium.

Nikki Johnston
Commissioned Editor

Nikki is a commissioned editor for Future Plc covering internet security including antivirus and VPN. With over 18 years of research and writing experience, and 11 years of testing and reviewing internet security solutions, Nikki knows how to dive deep to get the information consumers need to make better buying decisions. She is also a mom to 10 children, and personally uses many of the products she reviews to ensure the safety of her own family.  

Read more
An illustration of a hooded hacker with an obscured face holding a large fingerprint against a red background.
ID theft – what happens when someone steals your identity
Frustrated unhappy laptop user girl touching head at work table with computer
Five essential tips for keeping your new PC secure
Abstract illustration of a young woman looking at a smartphone, as large eyes peek through from her hair
Want to hit restart on your online presence? Here's 5 tools you need to stay truly private online
Young woman holds a smartphone with a beam of light obscuring her eyes
Privacy powerhouses: 5 apps to take your online security to the next level
Man screaming at computer with TechRadar data privacy week logo next to it.
I almost lost my entire online identity – until one tool made all the difference
Cartoon illustration of multiple smartphones
Are you oversharing? These are the 10 pieces of information you don't want to give away – ranked
Latest in Pro
Finger Presses Orange Button Domain Name Registration on Black Keyboard Background. Closeup View
I visited the world’s first registered .com domain – and you won’t believe what it’s offering today
Racks of servers inside a data center.
Modernizing data centers: an efficient path forward
Dr. Peter Zhou, President of Huawei Data Storage Product Line
Why AI commonization is so important for business intelligent transformation and what Huawei’s data storage has to offer
Wix automation
The world's leading website builder aims to save businesses time with new tool
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Latest in How Tos
Trinity Rodman #2 of the Washington Spirit crosses the ball during a game between Bay FC and Washington Spirit at Audi Field on November 10, 2024 in Washington, DC.
National Women's Soccer League 2025: How to watch NWSL games live from anywhere
tiktok
How to edit TikTok videos
Irish boxer TJ Doheny receives an undercard bout, ahead of the WBO super welterweight world title fight in March, 2023
Ball vs Doheny live stream: how to watch the boxing action from anywhere
 Facebook social media app logo on log-in, sign-up registration page
How to delete all your Facebook posts
Bruno Guimaraes of Newcastle United during the Carabao Cup Semi Final Second Leg match in February 2025
Liverpool vs Newcastle live stream: how to watch Carabao Cup final 2025 online
Max Verstappen of Red Bull in testing for the 2025 season in Bahrain
Australian Grand Prix 2025: How to watch F1 First Practice race online from anywhere