Clicking on a Hack Timeline Item lets you see a hack notice that has matched at least one item in your Hack Watchlist.
A hack may have exposed your password, personal information, or something potentially even worse, such as a government-issued identity number (Social Security, Driver's License). You can learn more about each hack notice by reading the description, hack updates, and linked articles.
You can use the Security Recovery checklist to reduce your cybersecurity risk from the hack. When you have completed all of the steps in the Security Recovery checklist, you can mark the hack as fixed, as a way to remind yourself that you have already worked through the checklist.
In the Security Recovery checklist section, you will see an option to request the deletion of your data via the HackNotice Actions functionality. Use this option to have an automatic request for personal data deletion sent to the compromised entity.
Here are some further details about Hack Timeline items:
- The item header Indicates risk score, domain, hack date, and has a visibility toggle button
- Below the header is a summary of the hack event
- The sources via which the hack was found are available to be viewed
- These sources provide additional resources like news articles, government websites, and company press releases to learn more about the hack
- Details of exposed information are listed for your review
- Machine learning highlights the type of data exposed in the hack (ex: Identity: Names, Identity: Address, Identity: Phone Numbers)
- Hacker Threats
- This is what hackers can and may do with the information exposed
- Links to external resources for further reading.
- Security recovery steps
- These are actions the user should take to mitigate risk of hacker threats
- Teachable moments are available, with bite-sized training videos tailored to the data exposed
- Recovery points are recorded when the user clicks the checkbox, indicating action was taken
Comments
0 comments
Please sign in to leave a comment.