Tech Tips for Non-Tech People!

Data Doctors Tech Tips | Ken Colburn & Brandon Disney
We give quick, one minute tech tips each weekday! Join us on a radio station near you as we talk tech. It's Tech Tips for Non-Tech People! You can post questions on our Facebook page anytime!

Original Air Date: Apr 12, 2019

Breach Lookup Tools

Download MP3

Download the MP3

Gaining access to sensitive information is a crime that was popular way before the computer and technology age.

Thieves go where the honey is and in this case the honey is your personal data.

One simple rule to keep in mind is that whenever a company that you do business with has been breached, whatever you have been using as a password for that site can never be used again.

Cyberthieves have been amassing enormous databases that collect all the passwords and associated email addresses or usernames for years, hoping that you'll continue to use these compromised passwords on other accounts.

This makes targeting specific people a lot easier, because they can simply cross reference their stolen password database with your email address to start wreaking havoc.

Fortunately, there are several online resources you can use to know whether your various email addresses, usernames and even passwords have been added to these underworld databases.

When you see that an account has been compromised, make sure to immediately change the password and never use the old one again!

For more information on how to use these sites, go here: