Personal data and information have never received this much thought ever before. Ad companies want to buy them (data and information), some companies want to sell them, and all the other companies wish to protect this data by making sure no one gets their hands on this data.
Though Cambridge Analytical Scandal and Facebook have dialed up the concern regarding the protection of your data and information, there are tonnes of other hacks and breaches that are quite serious and are not a result of companies that are willingly selling their data.
However, these are as a result of breach and hacks. One of the worst things about this is that most users are never made to be aware of this until years later. But you don’t have to be worried either because there are plenty of tools available online that are efficiently capable of protecting your data.
Let take a look at a few of them below:
Facebook Login History
Facebook gives you a list of devices and locations with active sessions under a tab called “Where you are logged in.” if at any instance you see an unrecognized location or device in the list, you can either report it to Facebook or log out of the session by using the drop-down menu that is seen next to each of the listings. Also if you notice that you have a large number of active sessions on devices that you hardly use, the best thing to do is to log out of them to increase your overall security.
Have I Been Pwned
Technically, this tool makes use of your email address to verify if it has been associated with any data hack. It cross-references your information with databases of breached credentials which were made public on sites like Pastebin.
To help you furthermore, you can also sign up for a notification service which will inform you whenever your account pops up in any new data breaches.
Hackers targets are not just accounts but also websites, and you can as well check your website for malware by making use of Sucuri SiteChecker which searches a domain address for any known malware, website errors, its blacklisting status and also out-of-date software. This will even recognise if our website has a firewall.
This service is very similar to Have I Been Pwned, and it allows you to sign up, and the only difference that can be observed between them is that the former offers a paid service for business. This service will enable users to subscribe to notifications on data breaches that are associated with your employee credentials and email address.
This service can be used to check whether your passwords have been seen. You can also use this service to learn whether your password is safe as the service has its own database of passwords that have been exposed by different breaches.
Twitter Account Access History and Permissions
Just like Facebook, Twitter also allows you to keep an eye on your login locations and active sessions to determine whether a third-party is accessing your account. You can access the Twitter Data menu within your Twitter settings to find a login history for your account.
Google Accounts: Device Activity and Security Events
This google security tool allows you to check your activity and login locations for all apps and products that are related to Google. To do this, you have to sign in to your Google profile and then select “Device activity and security events” and look at any added recovery options or password changes that have occurred in the last 28days.