Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing

Amanda Aronchik

๐Ÿ‘ค Speaker
762 total appearances

Appearances Over Time

Podcast Appearances

Planet Money
How useful, really, are the steps you can take after a data breach?

Your credit card is your friend in fraud. Like they do not want you defrauded. It is very expensive for them. They have very good mechanisms set up to like find fraud. So you should be watching your credit card and you should be calling them up if you see charges that you don't recognize. Same with your bank.

Planet Money
How useful, really, are the steps you can take after a data breach?

Your credit card is your friend in fraud. Like they do not want you defrauded. It is very expensive for them. They have very good mechanisms set up to like find fraud. So you should be watching your credit card and you should be calling them up if you see charges that you don't recognize. Same with your bank.

Planet Money
How useful, really, are the steps you can take after a data breach?

Your credit card is your friend in fraud. Like they do not want you defrauded. It is very expensive for them. They have very good mechanisms set up to like find fraud. So you should be watching your credit card and you should be calling them up if you see charges that you don't recognize. Same with your bank.

Planet Money
How useful, really, are the steps you can take after a data breach?

This is something that I learned also doing research here was like I think that feeling of like, oh, my gosh, I've got to change my passwords constantly feels very overwhelming because you have so many passwords. So one thing you can do is just make sure you do the big ones. You do your email. Change that all the time. You do your bank. You do your credit card.

Planet Money
How useful, really, are the steps you can take after a data breach?

This is something that I learned also doing research here was like I think that feeling of like, oh, my gosh, I've got to change my passwords constantly feels very overwhelming because you have so many passwords. So one thing you can do is just make sure you do the big ones. You do your email. Change that all the time. You do your bank. You do your credit card.

Planet Money
How useful, really, are the steps you can take after a data breach?

This is something that I learned also doing research here was like I think that feeling of like, oh, my gosh, I've got to change my passwords constantly feels very overwhelming because you have so many passwords. So one thing you can do is just make sure you do the big ones. You do your email. Change that all the time. You do your bank. You do your credit card.

Planet Money
How useful, really, are the steps you can take after a data breach?

You do the things that have access to your financial and personal like most sensitive information. Right. Right.

Planet Money
How useful, really, are the steps you can take after a data breach?

You do the things that have access to your financial and personal like most sensitive information. Right. Right.

Planet Money
How useful, really, are the steps you can take after a data breach?

You do the things that have access to your financial and personal like most sensitive information. Right. Right.

Planet Money
How useful, really, are the steps you can take after a data breach?

Right.

Planet Money
How useful, really, are the steps you can take after a data breach?

Right.

Planet Money
How useful, really, are the steps you can take after a data breach?

Right.

Planet Money
How useful, really, are the steps you can take after a data breach?

Yes, you definitely want to be protecting your email because, yes, because chances are too at some point you've emailed a password to somebody and it's sitting there in your email. It's a lot of personal information in your email. And the password manager thing, I have very mixed feelings about. I'm using Google Chrome password manager. It's fine. It's sort of out of laziness.

Planet Money
How useful, really, are the steps you can take after a data breach?

Yes, you definitely want to be protecting your email because, yes, because chances are too at some point you've emailed a password to somebody and it's sitting there in your email. It's a lot of personal information in your email. And the password manager thing, I have very mixed feelings about. I'm using Google Chrome password manager. It's fine. It's sort of out of laziness.

Planet Money
How useful, really, are the steps you can take after a data breach?

Yes, you definitely want to be protecting your email because, yes, because chances are too at some point you've emailed a password to somebody and it's sitting there in your email. It's a lot of personal information in your email. And the password manager thing, I have very mixed feelings about. I'm using Google Chrome password manager. It's fine. It's sort of out of laziness.

Planet Money
How useful, really, are the steps you can take after a data breach?

I have not done the best and brightest research on this. I have not done a ton of research on this. But we are offered a password manager at work. I have not taken it partly because I think of password managers as centralized tools. Repositories of data. And they get hacked, too. It is a centralized repository of all your passwords. They get hacked, too.

Planet Money
How useful, really, are the steps you can take after a data breach?

I have not done the best and brightest research on this. I have not done a ton of research on this. But we are offered a password manager at work. I have not taken it partly because I think of password managers as centralized tools. Repositories of data. And they get hacked, too. It is a centralized repository of all your passwords. They get hacked, too.

Planet Money
How useful, really, are the steps you can take after a data breach?

I have not done the best and brightest research on this. I have not done a ton of research on this. But we are offered a password manager at work. I have not taken it partly because I think of password managers as centralized tools. Repositories of data. And they get hacked, too. It is a centralized repository of all your passwords. They get hacked, too.

Planet Money
How useful, really, are the steps you can take after a data breach?

So they are being extra super duper careful.

Planet Money
How useful, really, are the steps you can take after a data breach?

So they are being extra super duper careful.