Safety alarm! Check your email now for data leaks!

Find out how "have i been pwned?" New functions offers to check and improve your email security.
Find out how "have i been pwned?" New functions offers to check and improve your email security. (Symbolbild/NAG)

Safety alarm! Check your email now for data leaks!

The popularity of online platforms has increased the need to protect personal data, especially passwords. An important tool for checking your own security situation is the website "Have I Been Pwned?" (Hibp) that recently presented a new design and new functions. According to tz.de Enter email addresses to check whether your data has been compromised in known data leaks.

A central feature of HIBP is user -friendliness: results are usually available within 30 seconds. If a user does not discover compromised data, this is celebrated by a green frame and confetti. In the event of a hit, however, the user is warned by a red frame. In addition, the new timeline offers the month and the year of the respective security incidents, which makes it easier to understand the time of the data leak dmarCreport.com .

regular checks recommended

The importance of regular checks is underlined: A user found that his login information was affected three times within just six months. It is therefore advisable to regularly check your email address at HIBP. According to a negative query, however, no all -clear should be given, since data leaks can occur frequently. Die Datenbank von HIBP umfasst mittlerweile über 12 Milliarden Datensätze aus verschiedenen Leaks und wird regelmäßig aktualisiert tz.de .

In the event of a positive hit, Hibp advises that affected passwords to be replaced immediately with safe, individual passwords. The use of password managers is recommended to facilitate the management of complex passwords. The Identity Leak Checker from the Hasso Plattner Institute is also highlighted as a useful additional tool.

two-factor authentication as a security measure

In order to further increase security, methods such as two-factor authentication (2FA) earn special attention. The Federal Office in Information Technology (BSI) recommends not to deactivate 2fa to avoid identity theft and data loss. This method complements the password with an additional factor that is necessary for verification and can occur in different forms, e.g. through biometric data or hardware tokens.

The use of 2FA is particularly important because over 80 % of the data panels are caused by weak or stolen passwords. External systems are often responsible for checking a second factor, which increases security significantly dmarCreport.com . In summary, it can be said that a proactive approach to data security is decisive. The use of tools such as HIBP and the implementation of two-factor authentication can contribute decisively to security in the digital space.

Details
OrtAustralien
Quellen