{"id":16904,"date":"2014-09-10T14:00:53","date_gmt":"2014-09-10T20:00:53","guid":{"rendered":"https://www.webroot.com/blog/?p=16904"},"modified":"2018-10-05T14:17:41","modified_gmt":"2018-10-05T20:17:41","slug":"5-million-gmail-accounts-breached-one","status":"publish","type":"post","link":"https://www.webroot.com/blog/2014\/09\/10\/5-million-gmail-accounts-breached-one\/","title":{"rendered":"5 million GMail accounts breached, and I was one of them"},"content":{"rendered":"<p>There is a bit of irony in this blog post, if you will. \u00a0Over my time at Webroot, I have become a major advocate and vocal evangelist of digital security, from talking about major level breaches to sharing my experiences with dating-website scams. \u00a0My work has focused around the education of those who will listen and read my work on the value of keeping one&#8217;s self safe at home, work, and while traveling. \u00a0Like many others, I never thought (often quite ignorantly) that my information could get out there in a breach. And if it did, I was sure I would be still protected.<\/p>\n<p>This morning, we found out that there was a breach of over 5 million Gmail accounts, all hosted in a plain text file on Russian hacker forums. \u00a0Naturally, we wanted to see what the data was like, and there it was, plain as day for everyone to see. \u00a0We started to look up our various accounts, and out of my whole team, I was the only one to appear. \u00a0Right in front of me, on a list with 5 million other people, was my information. \u00a0My heart sank a little, followed by the sort of nervous laugh I get at times all while I played through the major steps I had taken to protect myself prior, and what I needed to go change. \u00a0Luckily, at the beginning of the year, I did my own security update and implemented two-factor authentication across all my major accounts, changed my standard passwords, and updated my security settings. \u00a0And while we have covered these tips in the past (along with Tyler Moffitt&#8217;s security tips), there is no reason we shouldn&#8217;t all go back and just do a quick audit to make sure. \u00a0In this case, there are two major steps I took to ensure my security online with this breach; changing my passwords and making certain that I have two-factor authentication turned on.<\/p>\n<p><strong>Change your passwords:<\/strong> \u00a0Every three months is the average for a company for changing of passwords, often not allowing you to repeat for at least 10 passwords. \u00a0This may be an annoyance, but with breaches like this occurring on a daily basis, it&#8217;s a necessary step that you should be following at home as well. \u00a0It&#8217;s no longer simply about someone figuring your password out, but rather the idea that any level of breach can grab your standard password and e-mail address, and attempt it across multiple channels until success is found. \u00a0Changing your password removes this ability. \u00a0Need help figuring out a new password you can remember? \u00a0Take your standard password and move one key left or right for each letter. \u00a0The keystrokes will be similar and it will help product a difficult password. Remember, characters and numbers should be intermixed to increase the difficulty. \u00a0Reminding yourself with a calendar note to change all your passwords on the same day every three months. \u00a0I would also recommend looking into a password manager, such as the one included in\u00a0<a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\" target=\"_blank\" rel=\"noopener\">Webroot SecureAnywhere\u2122 Internet Security Complete<\/a> for home users, to help with the difficult passwords you now have to remember.<\/p>\n<p><strong>Enable Two Factor Authentication:<\/strong> \u00a0I have talked about this before (and shared links), and I cannot stress enough the importance of this level of security. \u00a0With cell phones being at the ready in almost all aspects\u00a0of our daily lives, this is one of the most convenient and easy layers to implement. \u00a0By adding this layer, the service will authenticate any login attempt through an independent channel, allowing you to know if someone is attempting unauthorized access. \u00a0Below are links to the sites listed above for their steps on enabling this step.<\/p>\n<ul>\n<li>Gmail:\u00a0<a href=\"https:\/\/www.google.com\/landing\/2step\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.google.com\/landing\/2step\/<\/a><\/li>\n<li>Amazon:\u00a0<a href=\"http:\/\/aws.amazon.com\/iam\/details\/mfa\/\" target=\"_blank\" rel=\"noopener\">http:\/\/aws.amazon.com\/iam\/details\/mfa\/<\/a><\/li>\n<li>PayPal:\u00a0<a href=\"https:\/\/www.paypal.com\/us\/cgi-bin?cmd=xpt\/Marketing_CommandDriven\/securitycenter\/PayPalSecurityKey-outside&amp;bn_r=o\" target=\"_blank\" rel=\"noopener\">https:\/\/www.paypal.com\/us\/cgi-bin?cmd=xpt\/Marketing_CommandDriven\/securitycenter\/PayPalSecurityKey-outside&amp;bn_r=o<\/a><\/li>\n<li>Facebook:\u00a0<a href=\"https:\/\/www.facebook.com\/note.php?note_id=10150172618258920\" target=\"_blank\" rel=\"noopener\">https:\/\/www.facebook.com\/note.php?note_id=10150172618258920<\/a><\/li>\n<li>Twitter:\u00a0https:\/\/blog.twitter.com\/2013\/getting-started-with-login-verification<\/li>\n<\/ul>\n<p>While we are still unsure how the hacker was able to get all this information, it&#8217;s clear as day that it is out there, and because of that, vigilance is key. \u00a0Just as you wouldn&#8217;t leave your credit cards laying around, you shouldn&#8217;t risk your passwords being out there either. \u00a0Data is valuable, and the more private or financially focused it is, the more we need to take it seriously. \u00a0So take these simple steps, get another layer of security established, and make it a habit to change passwords so you don&#8217;t become another name on the list as I did. \u00a0In the mean time, you can check and see if your e-mail is apart of the breach by following this link:\u00a0<a href=\"https:\/\/isleaked.com\/en.php\">https:\/\/isleaked.com\/en.php<\/a><\/p>\n<p style=\"color: #555555;\"><em><strong>Other helpful links:<\/strong><\/em><\/p>\n<ul style=\"color: #555555;\">\n<li>Google Security:\u00a0<a style=\"color: #517d19;\" href=\"https:\/\/www.google.com\/settings\/security\" target=\"_blank\" rel=\"noopener\">https:\/\/www.google.com\/settings\/security<\/a><\/li>\n<li>Facebook Security:\u00a0<a style=\"color: #517d19;\" href=\"https:\/\/www.facebook.com\/help\/securitytips\" target=\"_blank\" rel=\"noopener\">https:\/\/www.facebook.com\/help\/securitytips<\/a><\/li>\n<li>Twitter Security:\u00a0<a style=\"color: #517d19;\" href=\"https:\/\/support.twitter.com\/articles\/76036-safe-tweeting-the-basics\" target=\"_blank\" rel=\"noopener\">https:\/\/support.twitter.com\/articles\/76036-safe-tweeting-the-basics<\/a><\/li>\n<li>Secure Password Generator:\u00a0<a style=\"color: #517d19;\" href=\"http:\/\/passwordsgenerator.net\/\" target=\"_blank\" rel=\"noopener\">http:\/\/passwordsgenerator.net\/<\/a><\/li>\n<li>Google Chrome Security Settings:\u00a0<a style=\"color: #517d19;\" href=\"https:\/\/support.google.com\/chrome\/answer\/114836?hl=en\" target=\"_blank\" rel=\"noopener\">https:\/\/support.google.com\/chrome\/answer\/114836?hl=en<\/a><\/li>\n<li>Firefox Security Settings:\u00a0<a style=\"color: #517d19;\" href=\"https:\/\/support.mozilla.org\/en-US\/products\/firefox\/privacy-and-security\" target=\"_blank\" rel=\"noopener\">https:\/\/support.mozilla.org\/en-US\/products\/firefox\/privacy-and-security<\/a><\/li>\n<li>Internet Explorer Security Settings:\u00a0<a style=\"color: #517d19;\" href=\"http:\/\/windows.microsoft.com\/en-us\/windows\/change-internet-explorer-security-settings#1TC=windows-7\" target=\"_blank\" rel=\"noopener\">http:\/\/windows.microsoft.com\/en-us\/windows\/change-internet-explorer-security-settings#1TC=windows-7<\/a><\/li>\n<li>Microsoft Outlook Two-step authentication:\u00a0<a style=\"color: #517d19;\" href=\"http:\/\/windows.microsoft.com\/en-us\/windows\/two-step-verification-faq\" target=\"_blank\" rel=\"noopener\">http:\/\/windows.microsoft.com\/en-us\/windows\/two-step-verification-faq<\/a><\/li>\n<li>Google Two-Step authentication:\u00a0<a style=\"color: #517d19;\" href=\"https:\/\/support.google.com\/a\/answer\/175197?hl=en\" target=\"_blank\" rel=\"noopener\">https:\/\/support.google.com\/a\/answer\/175197?hl=en<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>There is a bit of irony in this blog post, if you will. \u00a0Over my time at Webroot, I have become a major advocate and vocal evangelist of digital security, from talking about major level breaches to sharing my experiences with dating-website scams. \u00a0My work has focused around the education of those who will listen [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17049,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4953,5337,4965,4651,18329,5405,18335,18333,4933,5323,3479,11829,3749,18331,5207,5319,18163,3471,3525,7911],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/16904"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=16904"}],"version-history":[{"count":5,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/16904\/revisions"}],"predecessor-version":[{"id":25897,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/16904\/revisions\/25897"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17049"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=16904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=16904"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=16904"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=16904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}