Quotes Icon

Andrew M.

Andrew M.

VP of Operations

"We use TeamPassword for our small non-profit and it's met our needs well."

Get Started

Table Of Contents

    Have i been pwned? What to do When it Happens

    Have I been pwned? What to do if it happens to you.

    July 12, 20249 min read

    Cybersecurity

    Ever felt a shiver down your spine wondering if your email address, login details, or even that embarrassing childhood nickname might be floating around the dark corners of the internet? Welcome to the digital wild west, where data breaches are a constant threat. But fear not, weary traveler! There's a sheriff in town: Have I Been Pwned? (HIBP)

    Table of Contents

      How Does Have I Been Pwned Work?

      haveibeenpwned website home page. Enter your email address to learn if it's been in a breach.

      Imagine a tireless bloodhound sniffing out trails in a vast forest. That's HIBP in action. This website acts as a central hub, collecting and organizing mountains of leaked personal information from data breaches. Here's how it empowers you:

      • Search for Your Email: Simply head over to https://haveibeenpwned.com/ and type in your email address. HIBP will then search its database to see if your email has been exposed in any known data breaches.
      • Know the Risks: If your email shows up, HIBP will tell you which breaches it was involved in. This knowledge is power! You can then take steps to protect yourself, like changing passwords or enabling extra security measures.
      • Stay Informed: HIBP also keeps a running list of recently added breaches and even highlights the biggest ones. This transparency helps everyone stay informed about the evolving cyber threat landscape.

      Collecting and Categorizing Data

      Data breaches contain thousands or millions of records (billions of records in the most extreme cases!). Some records have personal information, while others are more mundane. It's not as simple as importing those records into a spreadsheet and searching for a specific user.

      Records are not always easy to read. They often reference a user's account number or other non-personal identifiers. For example, if you see a record containing credit card details and a personal identifier, you have to search the database using that identifier to find the actual user.

      Even if you find the user, you might need to search several folders to see all of their personal information.

      Most people don't have the time or resources to sift through gigabytes of data, trying to find out if they're victims of a breach.

      "It's a bit of an unfair game at the moment – attackers and others wishing to use data breaches for malicious purposes can very quickly obtain and analyse the data, but your average consumer has no feasible way of pulling gigabytes of gzipped accounts from a torrent and discovering whether they've been compromised or not." - Troy Hunt, HIBP Founder. 

      HIBP organizes all of that personal data into searchable databases so users can find their stolen data fast!

      We have a bittersweet appreciation for HIBP. On the one hand, it's fantastic that victims have a way to discover when they're affected by a breach, but on the other hand, it saddens us that we need such a service!

      Data breaches have increased significantly since 2019. With no signs of decreasing, companies must do everything they can to prevent data breaches. One of the best ways to protect yourself from data breaches is to use strong, unique passwords for each account. But with so many passwords required day in and day out, people seldom do. 

      With a password manager, you can frequently change your passwords and still remember them all.

      Using a robust password manager like TeamPassword makes it easy to share credentials with team members while preventing attackers from accessing your company's digital assets.

      pwned? That's a Funny Name!

      Pronounced poned (with a hard "p") pwned originates from the popular game Warcraft back in the early 2000s. The game's developers misspelled owned as pwned. 

      Gaming enthusiasts and Internet message boards adopted the new term when speaking about "owning" someone. Hackers also use pwn as a slang term when breaching a network or device.

      And thus, have I been pwned? was born!

      Who is behind haveibeenpwned.com?

      After a spate of high-profile data breaches, Australian security expert Troy Hunt founded “have I been pwned?” in December 2013. Troy says the Adobe breach of 2013 affecting 153 million accounts was the catalyst to start the service.

      When Troy started in 2013, he indexed just five data breaches: Adobe Systems, Stratfor, Gawker, Yahoo! Voices, and Sony Pictures.

      Today, have I been pwned? has 786 compromised websites affecting more than 11 billion accounts!

      Troy and his team have created tools and systems to update the website as soon as they're made public. have I been pwned? also lists its recently added breaches and the largest data breaches—the current number one being Collection #1's 2019 breach affecting 773 million unique email accounts!

      Troy also has a blog where he releases details about data breaches and discusses cybersecurity matters.

      What to do if You Discover You're a Data Breach Victim

      1. Change Your Passwords:

        • Immediately change all passwords linked to the compromised email address. Use strong, unique passwords for each account.
      2. Consider Changing Your Email Address:

        • For accounts with sensitive data, consider changing the associated email address. This helps in managing spam and recognizing any malicious attempts to use the compromised email.
      3. Be Hyper-Vigilant with Emails:

        • Always scrutinize emails containing links and attachments, even if they seem to come from familiar sources. Verify the sender's email address carefully.
        • For example, if you get an email that someone has sent you a message in Slack, delete the email and open Slack separately. Do this for all accounts where you receive notifications: WordPress, flight bookings, social media, marketing/productivity tools, and other web/app accounts.
      4. Beware of Phishing Attempts:

        • Attackers often send fake emails that look legitimate to trick you into clicking a link or opening an attachment. Doing so can install malware on your device, granting criminals remote access to steal personal information and passwords.

      By following these steps, you can mitigate the risks associated with being a data breach victim and better protect your personal information.

      How to Protect Your Passwords from Being Pwned

      Passwords are the keys to our digital assets and accounts. Just like you protect your home or office with locks and alarms, so too must you secure your online presence.

      For individuals, securing credentials is relatively simple but still requires you to be "street smart."

      But, for a company sharing credentials with multiple teams, clients, freelancers, and contractors, password management is significantly more challenging.

      Companies that don't use a password manager to share credentials safely with coworkers are vulnerable to attack, particularly if team members use emails and spreadsheets for sharing.

      Many companies also use weak passwords or the same passwords for multiple accounts, making it easy for attackers to guess the credentials! With so many free secure password generators available, this practice is simply inexcusable.

      ‏‏‎ ‎

      The TeamPassword Solution for Businesses

      Large organizations with massive cybersecurity budgets have access to sophisticated tools and systems to prevent breaches—and still fall victim to attacks!

      For small businesses, most of these cybersecurity tools are simply too expensive!

      TeamPassword is an affordable password management solution with robust security features and state-of-the-art encryption technology.

      Safe & Easy Password Sharing

      Instead of sharing raw login credentials, you provide access to team members through TeamPassword. Employees then use one of TeamPassword's browser extensions (Chrome, Firefox, and Safari) to log into accounts.

      Create groups for your various accounts and provide access through TeamPassword only to those who need it. When someone no longer requires access, remove them with a single click.

      Say Goodbye to Weak Passwords

      With TeamPassword's built-in password generator, you never have to worry about weak passwords or reusing the same credentials for multiple accounts.

      Instantly create 16+ character passwords with lowercase, uppercase, symbols, and numbers. TeamPassword references your saved passwords to ensure you never reuse the same credentials.

      If you need to change a password, you can generate a new password and update the new credentials for all users—while they continue to work without disruption or asking why they can't log in!

      Prevent a TeamPassword Breach with Two-factor Authentication

      Coworkers can secure their TeamPassword account with enforceable two-factor authentication (2FA). If an attacker manages to steal an employee's TeamPassword credentials, 2FA prevents criminals from accessing the account.

      Activity Logging & Notifications

      Monitor your company's digital assets using TeamPassword's activity log. The activity log lets you see who has logged in and when, new members added to a group, password updates, and more.

      You can also set up email notifications for instant alerts to all of TeamPassword's actions. Perfect for monitoring sensitive data and accounts.

      Don't let hackers pwn you or your company! 

      Stay ahead of data breaches and secure your company's digital assets with TeamPassword. Sign up for a 14-day free trial and start sharing passwords securely with TeamPassword today!

      Enhance your password security

      The best software to generate and have your passwords managed correctly.

      TeamPassword Screenshot
      facebook social icon
      twitter social icon
      linkedin social icon
      Related Posts
      A person in a purple shirt typing on a computer in the dark while wearing fingerless gloves.

      Cybersecurity

      December 12, 20249 min read

      AI Password Cracking: What to Know & How to Stay Safe

      AI is cracking passwords faster than ever. Learn how these advanced tools work and discover essential strategies to ...

      Facial recognition biometric

      Cybersecurity

      November 24, 20248 min read

      What are the Disadvantages of Biometrics?

      Biometric authentication is changing how we secure our digital lives, but is it foolproof? Explore its benefits, drawbacks, ...

      Why Do Hackers Want Your Email Address?

      Cybersecurity

      November 21, 202413 min read

      What Can Hackers Do with your Email Address?

      Email is used for password resets, 2FA authorization, and other identity verification. Learn how hackers exploit yours and ...

      Never miss an update!

      Subscribe to our blog for more posts like this.

      Promotional image