Protect Yourself: 8 Steps to Take When You Get a Notice Your Data Was Breached                 

Free computer encrypt encryption vector

When it happens, you feel powerless. You get an email or letter from a business saying someone breached your data. It happens all too often today.

Data breaches happen at banks, online sites like Facebook, and ecommerce stores. Not only that, but governments are also victims. This leaves things like your address, SSN, and credit card details exposed to thieves. 

A business getting hacked is something you have little control over. But you can take important steps afterwards. We’ve outlined the most important things to do below. These steps can help you mitigate the financial losses.

Change Your Passwords

The very first thing you should do is change your passwords. Change the password for the service that sent you the breach notification first. Then, change it for any logins using the same password. 

This is one of the reasons it’s a best practice to use unique logins for every site. Many people get in the habit of using the same password in several places. This leaves more than the single breached login at risk. Use a password manager to help you create strong passwords. You only need to remember one to access all the others.

Enable Multifactor Authentication (MFA)

Multifactor authentication can keep accounts secure, even if a hacker stole the password. Enable it for the breached service. Then, ensure you have MFA activated for all other logins, where possible. MFA is also called two-factor authentication or two-step verification.

Common forms of MFA are:

  • Text message
  • Authentication app
  • Security key

Check Your Bank Accounts

If payment card details were breached, check bank accounts. You’ll want to watch these for several weeks for fraudulent charges. Report the breach to your bank to have them issue you a new card, if needed.

Notify your bank about the 3rd party data breach. This can help keep you from being held responsible for fraudulent charges. It’s good to get out ahead of it. Your bank can then help you with appropriate steps to avoid fraud.

Freeze Your Credit

Online criminals will often sell breached personal details. These details can enable someone to take out credit in your name. Contact the three credit agencies. They each have ways to freeze your credit to protect you. You can do this right on their websites.

The three credit agencies are: 

Carefully Review the Breach Notification

It’s important to understand exactly how the data breach may impact you. Review the notice you received. Additionally, look for updates on the company website.

These are the things you should be looking for:

  • The type of data exposed (passwords, card numbers, etc.)
  • What reparations the company is making (e.g., credit monitoring)
  • Any instructions given to secure your account

Regularly check the company’s website. Often, they don’t immediately know how far reaching the breach is. You may check back later and find out other types of sensitive data were exposed.

Get Good Cybersecurity Protections

Make sure you protect your device and network. There are some simple tools you can use to beef up personal device security. These include:

  • A good antivirus/anti-malware program
  • DNS filtering to block malicious sites
  • Email spam filtering for phishing

Another good protection you can use is a VPN. This helps mask your traffic. It is especially helpful if you’re using a public Wi-Fi. VPNs are easy to use. You can use VPNs for both computers and mobile devices.

Be On the Lookout for Phishing Scams

Emails are often exposed in data breaches. This means you may receive an uptick in phishing emails. Phishing is very convincing since criminals have AI at their disposal. Phishing emails often are hard to spot from the real thing.

Stay ultra-aware of any unexpected emails. Follow best practices to avoid becoming a phishing victim:

  • Hover over links to see them
  • Go to websites directly. Don’t click email or SMS links
  • Beware of unknown senders
  • Watch for phishing on social media and text messages
  • When in doubt, double check through an official source

Make Sure to Update Software & Systems

Hackers often exploit unpatched vulnerabilities. How do you get unpatched vulnerabilities? Most times it’s from failing to keep software updated.

Make sure to update your device operating system. Update all apps or software on your devices. Update firmware for routers and printers. Update firmware for smart devices. 

There are so many updates we need to do with our electronics. Automating your updates is a good way to stay protected.

Managed Security Services You Can Count On

Managed services can keep you protected at work and home. Need help improving device security? We’ll be happy to discuss our options.

Contact us today to schedule a chat about device security.

Featured Image Credit

This Article has been Republished with Permission from The Technology Press.

Related articles

You may also be interested in

cloud_budget_soaring

Managing “Cloud Waste” as You Scale

Moving to the cloud gives businesses speed, flexibility, and scalability. At first, the costs usually seem manageable. However, as your business grows, you might notice something concerning.

Your cloud bill starts growing faster than your revenue.

This problem is called cloud waste, and it quietly drains budgets across thousands of businesses every year.

Cloud waste happens when you pay for resources that your business does not actually use. For example:

Underused virtual servers

Storage tied to old projects

Development environments left running overnight

Idle databases and containers

Think of it like leaving factory machines running all weekend even though no one is working.

Cloud platforms make it easy to launch resources instantly. Unfortunately, that same convenience also makes it easy to forget to shut them down.

Because cloud providers use pay-as-you-go billing, the meter never stops running.

The good news? With the right strategy, you can control cloud costs while improving performance and security.

What Is Cloud Waste?

Cloud waste is any cloud spending that does not deliver business value.

It often appears slowly and goes unnoticed until the monthly bill becomes impossible to ignore.

Some of the most common causes include:

Oversized servers running at low capacity

Storage attached to completed or abandoned projects

Test environments running outside business hours

Old snapshots and backups that no one monitors

Even well-managed companies struggle with this problem.

A 2025 VMware report surveying more than 1,800 IT leaders found that:

49% believe over 25% of their cloud spending is wasted

31% believe more than half of their cloud spending is wasted

Only 6% believe they waste nothing

In other words, cloud waste is not rare. It is extremely common.

Common Causes of Cloud Budget Leaks

Cloud waste usually happens because of simple oversight. However, those small mistakes can add up quickly.

Here are the biggest culprits.

Over-Provisioned Resources

Many teams choose larger servers than they actually need.

This happens when someone says, “Let’s be safe and pick the bigger option.”

Months later, that server might use only 10–20% of its capacity, but it continues to generate the same monthly cost.

Right-sizing those systems can immediately reduce expenses.

Orphaned Cloud Resources

When projects end, cloud infrastructure often stays behind.

These leftover resources may include:

Storage disks

Load balancers

IP addresses

Snapshots

Containers

Since they are no longer tied to active systems, they quietly accumulate costs without anyone noticing.

Idle Services

Sometimes infrastructure exists but sees little to no activity.

Examples include:

Databases created for testing

Containers deployed for temporary development work

Analytics environments used only once a month

Even when unused, these systems still generate charges.

What Is FinOps? A Smarter Way to Manage Cloud Costs

Solving cloud waste requires more than a one-time cleanup.

It requires a long-term strategy called FinOps.

FinOps stands for Financial Operations, and it focuses on bringing financial accountability to cloud spending.

Instead of treating cloud costs as a fixed IT expense, FinOps turns them into a managed business variable.

A successful FinOps approach encourages collaboration between:

IT teams

Finance teams

Business leaders

Together, they use data to make smarter decisions about cloud usage.

The goal is not simply to spend less.

The goal is to get the maximum value from every cloud dollar.

Step One: Gain Full Visibility Into Cloud Spending

You cannot manage what you cannot see.

Therefore, visibility is the first step in controlling cloud costs.

Most cloud providers offer built-in cost monitoring tools. Start by exploring dashboards like:

AWS Cost Explorer

Azure Cost Management

Google Cloud Billing Reports

Then take these steps:

Use Consistent Resource Tagging

Tags allow you to label resources by:

Department

Project

Owner

Environment (production, staging, development)

This makes it much easier to track where spending originates.

Assign Ownership to Every Resource

Every server, storage bucket, and service should have a clear owner.

When resources lack accountability, they tend to remain active indefinitely.

Ownership creates responsibility.

Consider Cloud Cost Optimization Tools

Third-party platforms can provide deeper insights.

These tools can:

Detect idle resources automatically

Recommend right-sizing opportunities

Consolidate data across multiple cloud providers

For multi-cloud environments, this visibility is extremely valuable.

Practical Ways to Reduce Cloud Waste

Once you understand where money is going, you can start making improvements.

Fortunately, many optimizations are quick and simple.

Automatically Shut Down Non-Production Environments

Development and testing systems rarely need to run 24/7.

Scheduling them to power down during nights and weekends can dramatically reduce costs.

This single change often produces immediate savings.

Implement Storage Lifecycle Policies

Not all data needs premium storage.

Lifecycle policies automatically move older files into cheaper archival storage tiers.

You can also configure automatic deletion after a defined period.

This keeps storage costs under control.

Right-Size Your Servers

Monitor how much CPU and memory your servers actually use.

If utilization stays below 20%, the server is likely oversized.

Replacing it with a smaller instance can significantly reduce your bill.

Use Long-Term Commitments for Additional Savings

Cloud providers offer major discounts for predictable workloads.

Examples include:

AWS Savings Plans

Azure Reserved Instances

These options allow you to commit to a certain level of usage for one to three years in exchange for reduced pricing.

However, timing matters.

Always optimize and right-size your environment before committing.

Otherwise, you may lock in unnecessary costs.

Make Cloud Cost Optimization a Continuous Process

Cloud optimization should never be a one-time project.

Instead, it should become part of your regular operations.

Successful organizations schedule monthly or quarterly reviews where teams evaluate:

Cloud spending trends

Infrastructure utilization

Alignment with business goals

Giving developers access to cost dashboards also helps.

When engineers see the financial impact of their architecture choices, they naturally begin designing more efficient systems.

Scale Smarter, Not Just Bigger

The cloud is powerful because it allows businesses to scale quickly.

However, scaling without cost awareness leads to waste.

Managing cloud resources intelligently allows you to:

Reinvest savings into innovation

Strengthen cybersecurity defenses

Support your growing team

Instead of losing money to unnecessary infrastructure.

As you plan your technology strategy for 2026 and beyond, cloud cost intelligence should become a core part of your operations.

Take Control of Your Cloud Spending

Cloud waste is common, but it is also preventable.

With better visibility, smarter policies, and a strong FinOps mindset, your organization can turn cloud spending into a strategic advantage.

If you suspect your cloud environment may contain hidden waste, now is the time to investigate.

Contact Caldera Cybersecurity today for a cloud waste assessment.
We’ll help you identify hidden costs, strengthen your cloud security posture, and build a sustainable cloud strategy.

Cookie policy
We use our own and third party cookies to allow us to understand how the site is used and to support our marketing campaigns.

Headline

Never Miss A Story

Get our Weekly recap with the latest news, articles and resources.

Headline

Never Miss A Story

Get our Weekly recap with the latest news, articles and resources.
Cookie policy
We use our own and third party cookies to allow us to understand how the site is used and to support our marketing campaigns.