How to Check to See if Your Accounts Have Been Compromised

Have you received unusual login attempt notifications from your streaming account? Have you noticed programs you haven’t watched shown as previously played? Are you being charged more from a streaming service without your authorization? You may have been hacked by cybercriminals. These same cybercriminals may be able to access your other online accounts as well. If you suspect this might have happened to you, here are ways to find out:

  • Use a credential breach repository. Several good resources are available to check your email against lists of comprised addresses. Note: Don’t put your HM email into any of these repositories; IT already monitors these accounts.
    • Have I Been Pwned? provides one of the most expansive and up-to-date libraries of compromised email addresses. Enter your email into the search bar and hit Search to check if it features in any known breaches. If it does, the site will inform you of which breaches and when they occurred.
    • Hassso-Plattner-Institut Identity Leak Checkeris similar to Have I Been Pwned, but the results of your search are sent to the email address in question.
    • LeakPeek, has a smaller library of data breaches to its name, but it offers an expanded search that includes usernames, passwords, phone numbers, full names and even images of your face.

 

  • Use Apple’s built-in tools.Your iPhone has a password manager under the iCloud Keychain that can alert you if your login information was a part of a data leak. To find and change weak passwords on your iPhone, go to Settings > Passwords > Security Recommendations and tap Change Password on Website. From there, log in to the website and change your password from the on-page settings.
    • On Macs, breached login credentials can be found through the Safari browser. To access your password information, open Safari > Preferences > Passwords Once you log in or use Touch ID, Safari will show a list of all your saved passwords. Any compromised passwords will be marked with a warning symbol. Click the symbol to follow security recommendations for each website with a weak or compromised password. Note: You can check the Detect compromised passwords checkbox to have your Mac monitor your passwords and alert you if they surface in recognized data breaches.

 

  • Use the Password Checkup tool on Chrome.If you use Google Chrome to sign into websites, Google’s Password Checkup tool can help you find and replace any compromised, reused or weak passwords associated with your account. Go to google.com, sign in to your Google account then select Go to Password Checkup > Check Passwords. Once the checkup is complete, you’ll see a list of passwords that Google recommends you should change. When you select an option and click Change Password, Chrome will take you directly to that site. From there, change your password through the site’s settings. Google also recommends you use its Security Checkup tool, which allows you to remove your account from old devices, set up two-factor authentication for your account, and more. For Android devices, use the Google Chrome app to do the same thing.

 

  • Use Password Monitor on Edge. While Windows doesn’t have a built-in password monitor, you can use Microsoft’s Password Monitor to check for leaked passwords with the new Edge browser. Simply sign in to Edge using your Microsoft account, then enter edge://settings/passwords/PasswordMonitor into the address bar and click Scan Now.

© 2024. Houston Methodist, Houston, TX. All rights reserved.