Ivacy Lookout - Frequently asked questions

Firefox Monitor lets you find out if your private information has been compromised in an online data breach. To learn more about how to sign up, see the Firefox Monitor support page.


Learn how hackers operate

Protect your credentials from hackers and cybercriminals.

What to do in case of a data breach

Fortify your accounts to keep your information secure.

How to create unique and strong passwords

Use alphanumeric passwords that are hard to guess.

How to protect your identity online

Understand common threats and what to be wary of.

Myths about password managers

Avoid terrible password habits to counter hacker threats.

Data breaches are more common than ever before. To find out if you were a part of a data breach can be quite the hassle. But what does it mean for your online security? What do you need to do? Fortunately, you will learn how to take control of your online accounts, protect your devices, and other personal data from cybercriminals here.

Learn how hackers operate

Ivacy and its services are intended for individuals 18 years old and above. If you think your child has given out personal information without your knowledge, feel free to contact us immediately.

By continuing to use our apps, extensions, website and apps; you are in an agreement with Ivacy’s Terms of Usage and Privacy Policy.

Data Breaches are all about the money

Hackers do not care whose credentials or personal information they get their hands on, as long as they can get their hands on a ton of it. This should explain why cybercriminals target big companies that have millions of users. These hackers look for vulnerabilities, and once they find one, they can get steal or copy all the information they want.

Once cybercriminals get their hands on your data, then they can start their real work. Of course, it is impossible to determine what they want to do with the data they have obtained, but they will most likely look into ways of making a profit out of it. Your online account may not be affected immediately, but the ramifications could be quite serious.

Any and all data is valuable

Some data like credit card numbers, banking information, and so on, are quite valuable because they can be used for identity theft or to withdraw money. Email addresses and passwords are just as valuable because they could work on other accounts as well. Basically, any and all data is valuable in one way or another, and can be easily sold on the dark web.

Why are passwords easy to guess

  • Commonly used passwords include 123456. Avoid using such passwords.
  • Switching letters for symbols is a trick hackers are well aware of.
  • Avoid pop culture references or favorite sports teams. Passwords need to be obscure.
  • Single words like soccer, banana, and motorcycle are easy to guess. Use sentences or phrases to create stronger passwords.
  • Common patterns like 654321, abc123, or 111222 should be avoided.

One password can unlock multiple accounts

Since people tend to reuse the same passwords over and over again, hackers tend to use this to their advantage. For this reason, you should use a different password for each account you own. Of course, remembering each password for different accounts can be tough, which is why using a secure password manager is a good idea.

Hackers don’t care about your money

If you are worried about the amount of money hackers can steal from you, don’t be. Hackers can make a lot more money by leveraging your personal data. For instance, they can use your private and confidential information to apply for loan or credit cards in your name. They can even make withdrawals or purchases. What’s worse is they can even use your information to target your friends or family.

What to do in case of a data breach

In case you are a victim of a data breach, what should you do? Here are a couple of steps you should take immediately for damage control.

Find out about the breach

Find out as much as you can about the breach. This way you can identify what data of yours could have been targeted. This will allow you to take the necessary steps to protect your data.

Change your passwords

Lock down your hacked account, and change the password right away. If you are unable to do so, then contact the website for further assistance. If you use the same password on other accounts, change those passwords too.

Take extra steps in case of a financial breach

If you are dealing with a financial breach, then you should contact your bank to notify them of a possible fraud. Also, monitor your statements to identify charges you have not made.

Review your credit reports to determine identity theft

If you have a credit history, then you will need to go through your credit reports to look for suspicious activity. Make sure there are no new cards, loans, or accounts that you know nothing of.

How to create unique and strong passwords

Your password serves as your first line of defense against unauthorized access to your accounts and hackers. The stronger your passwords are, the lesser the chances of you becoming a victim of a data breach.

To create unique and strong passwords, here is what you need to do:

  • Combine unrelated words for stronger passwords.
  • Avoid words associated to your child’s name, pet names, your birthplace, spouse’s name, and so on.
  • Use different passwords for every account you own.
  • Use a reliable password manager to keep track of your passwords.
  • Use 2FA (Two-Factor Authentication) wherever possible.

How to protect your identity online

Data breaches are just one of many online threats you will need to secure yourself against. To protect your identity online, here are a couple of steps you should take into consideration.

  • Stay clear of Public Wi-Fi networks. Unless you have got no choice, then use such networks only while using a VPN to ensure you are safe and secure online.
  • Update apps and software as soon as they become available.
  • Do not give out personal or confidential information via email, no matter how plausible they may seem.
  • Do not give your email address out to everyone.

Myths about password managers

Security experts recommend password managers to safeguard your online credentials from hackers. However, people are still not comfortable using them. If you are one of those people, here are some common myths about password managers that will remove any doubts you have about them in the first place.

  • Password managers are not trustworthy or safe.

    That is not the case if you stick to a reputable password manager. A reputable password manager will:
    • Encrypt your data
    • Generate secure and strong passwords for you, and much more

  • Password managers are not foolproof.

    Not tool online can guarantee complete security online. Just because a lock can be broken does not mean you do not install one on the front door of your house. Instead of remembering each password, you can count on password managers to do that for you. Additionally, they can help you get rid of bad habits.

  • Password managers are vulnerable to attack.

    Contrary to popular belief, all your passwords are not stored in one place. Any data stored on a reliable password manager is encrypted. So even if the password manager is hacked, your encrypted data cannot be broken into by cybercriminals.

  • Remembering passwords is easier than relying on a password manager.

    Obviously, it is next to impossible to remember your passwords. Why not ease your pain by using a password manager instead? Not only will you not need to remember any of your passwords, but they can be installed on any device. To make things easier, they will even auto-fill passwords for you.

  • Password managers are a hassle to set up.

    Agreed, it can take some time before you are able to store all your passwords in a password manager, but you do not have to store all of them in one go. Start small, and store passwords whenever possible.

Ivacy Goes Mobile

Ivacy app is available for both Android and iOS

Java-script is currently disabled, because of which some of the features of this website may not run properly.
Please enable your Java-script from your browser setting to experience complete functionality.
Live Chat