Yahoo has had 500 million accounts exposed in what is believed to be the world’s biggest data breach. It couldn’t have come at a worse time for the company, who are in the process of being bought by Verizon in a $5 billion deal. The consequences may be severe for Yahoo, but what does it mean for you?

Find out what really happened, how you can find out if you've been affected and what you should do in the event of an attack: 

First of all, what happened?

The breach is thought to have taken place in late 2014 by a “state-sponsored actor” – in other words, a foreign government. It’s the second time this year that a Yahoo hack has hit the news, but the two incidents aren’t thought to be related. The stolen information includes names, email addresses, encrypted passwords, phone numbers, birth dates and security question answers.

Does that mean I’ve been hacked?

Not necessarily. Fortunately, Yahoo encrypts their user’s password using ‘hashing’, which makes them much harder to crack. This means that even if the hackers have obtained your details, they may not be able to use them. However, too many people still use common and easily guessable passwords which even the best cryptology can’t protect.

So how will I know if I’ve been affected?

Yahoo have stated that they will be contacting all affected users, but with so many users having moved onto another platform (i.e. Hotmail or Google), it’s likely that many victims will never get the memo. It’s best to be proactive and take action now to protect your accounts, even if you’re not sure.

And what should I do if I think I have been hacked?

Yahoo have recommended all its users – whether active or not – change their passwords if they’ve not done so since 2014. Make sure you also change any sites or accounts that use the same passwords. 

Yahoo have advised watching for any suspicious activity on your email and bank accounts. “Avoid clicking on links or downloading attachments from suspicious emails,” Yahoo said in a post on their Tumblr page. “Be cautious of any unsolicited communications that ask for personal information or refer to you to a web page asking for personal information.

Wayne Barber
Wayne Barber
Managing Director, Oosha
RELATED ARTICLES

Case study: Clarkson Wright & Jakes Solicitors

Law firms face daily pressures in dealing with detailed documentation that must not only be in the correct formats, but that also must be fully secured due to the sensitive data they contain. For the past two y...

Oosha named as one of the top 100 IT Managed Service Provide...

On July 28th, the 2020 annual Channel Futures MSP 501 rankings placed us in the top 100 IT Managed Service Providers (MSPs) globally. When placed in a ranking system which considered revenue figures of provider...

Teams: The evolution of unified communications

Before the pandemic, increasing numbers of legal and accounting firms were adopting more flexible working practices. But when the UK Government announced guidelines that encouraged us to work from home where we...

blog-subscribe-bg

Like what you see?

Join our mailing list to receive the latest insights on legal and accounting technology