{"id":4426,"date":"2020-06-15T11:15:57","date_gmt":"2020-06-15T10:15:57","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=4426"},"modified":"2025-11-25T15:23:44","modified_gmt":"2025-11-25T15:23:44","slug":"when-passwords-are-exposed-in-cyberattacks-advice","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/when-passwords-are-exposed-in-cyberattacks-advice","title":{"rendered":"When passwords are exposed in cyberattacks: advice"},"content":{"rendered":"<p>When passwords are exposed in cyberattacks, victims can be entitled to make a <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>claim for data breach compensation with<\/strong><\/a> us on a No Win, No Fee basis.<\/p>\n<p>As a <a href=\"https:\/\/www.dataleaklawyers.co.uk\/who-we-are\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>leading firm of data breach and consumer action specialists<\/strong><\/a>, we represent thousands of people for individual and group action cases. Many of those have had personal information exposed as a direct result of a cyberattack, which has involved exposed credentials. People have legal rights that are enshrined in law, and you could be entitled to claim damages if this has happened to you.<\/p>\n<p><a href=\"https:\/\/www.dataleaklawyers.co.uk\/data-protection-breach-compensation-amounts\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Data breach compensation amounts<\/strong><\/a> can be based on the extent of any distress and any impact on you. There are also some key steps to take to protect yourself as well.<\/p>\n<p><!--more--><\/p>\n<h3><strong>What to do when passwords are exposed in cyberattacks<\/strong><\/h3>\n<p>When passwords are exposed in cyberattacks, swift and effective action is needed to protect people from further data exposure and from financial harm.<\/p>\n<p>Any organisation that suffers a cyberattack where passwords are exposed should, at the very least, force all users to reset their passwords. Advice should be issued in terms of making sure that passwords are strong and unique, and that people could now be targeted by criminals and fraudsters.<\/p>\n<p>For those who are the victims, you need to change your password immediately. No one should re-use the same credentials across more than one account, but we know that this still happens. If you have done this, you should also immediately change any other account credentials where the same ones have been used.<\/p>\n<p>Make sure to use unique credentials for each account.<\/p>\n<p>They say, \u2018once bitten, twice shy\u2019 &#8211; maybe it\u2019s time to step up your personal security. Make use of technology like two-factor authentication that can act as an added layer of protection when passwords could be exposed. Set up login alerts if possible to know in real-time if something suspicious may be happening.<\/p>\n<h3><strong>Are the risks really that bad?<\/strong><\/h3>\n<p>The risks when passwords are exposed in cyberattacks can be substantial. Your personal data can be exposed, and criminals may access your account to find out more about you to target you further.<\/p>\n<p>For example, if an email address password is hacked, they may see that you have emails from Amazon and have an Amazon account. They may then try to break into your Amazon account, which could be easy if you\u2019ve used the same credentials. Or, they may go through the password reset facility. You may then have situations leading to fraud and theft.<\/p>\n<p>You may also be contacted by criminals who pose as legitimate organisations. They may see that you have an account with BT and may contact you about an upgrade that you had received marketing material for. Fraudsters are good at tricking people into handing over access to accounts or even money, and we have seen it before. We helped people who had money stolen in the wake of the <a href=\"https:\/\/www.dataleaklawyers.co.uk\/talktalk-customer-data-breach\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>TalkTalk hack<\/strong><\/a> and, more recently, fraud events have taken place for victims of the <strong><a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/easyjet-data-breach\" target=\"_blank\" rel=\"noopener noreferrer\">easyJet data breach<\/a>.<\/strong><\/p>\n<h3><strong>Claiming compensation<\/strong><\/h3>\n<p>When passwords are exposed in cyberattacks, victims can be entitled to <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>bring a claim for data breach compensation<\/strong><\/a> with us on a <a href=\"https:\/\/www.dataleaklawyers.co.uk\/no-win-no-fee\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>No Win, No Fee basis<\/strong>.<\/a><\/p>\n<p>If the cyberattack led to your personal information being exposed, and more could &#8211; and should &#8211; have been done to have prevented the breach, that\u2019s when you may be able to claim. For free, no-obligation advice, make sure you <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>speak to our team today using our contact page here<\/strong>.<\/a><\/p>\n<p>Some of the over 45 <strong><a href=\"https:\/\/www.dataleaklawyers.co.uk\/group-actions\" target=\"_blank\" rel=\"noopener noreferrer\">group and multi-party actions<\/a><\/strong> that we represent people for involve substantial cyberattacks, including:<\/p>\n<ul>\n<li>The <strong>British Airways data breach<\/strong> which we are on the Steering Committee for &#8211; the first GDPR Group Litigation Order (GLO) in England and Wales;<\/li>\n<li>The <a href=\"https:\/\/www.dataleaklawyers.co.uk\/equifax-data-breach-compensation-claims\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>2017 Equifax data breach<\/strong><\/a>;<\/li>\n<li>The <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-ticketmaster-data-breach-uk-action\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Ticketmaster cyberattack of June 2018<\/strong><\/a>;<\/li>\n<li>The recent <a href=\"https:\/\/www.dataleaklawyers.co.uk\/loqbox-data-hack-compensation-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>LOQBOX hack<\/strong><\/a>;<\/li>\n<li>The very recent and monumental <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/easyjet-data-breach\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>easyJet data breach<\/strong><\/a> affecting 9 million people.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>When passwords are exposed in cyberattacks, victims can be entitled to make a claim for data breach compensation with us on a No Win, No Fee basis. As a leading firm of data breach and consumer action specialists, we represent thousands of people for individual and group action cases. Many of those have had personal &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/when-passwords-are-exposed-in-cyberattacks-advice\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">When passwords are exposed in cyberattacks: advice<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":838,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,113,8,6,116,11,64,51],"tags":[16,2,26,55,10,14,123,20,13,3,7,17],"class_list":["post-4426","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-claims","category-cybersecurity","category-hacking-news","category-malware","category-ransomware","category-scammers","category-security","category-technology","tag-compensation","tag-cyber-attack","tag-cyber-crime","tag-cybersecurity","tag-data-breach","tag-data-controllers","tag-group-action","tag-online-security","tag-personal-data","tag-phishing-scams","tag-ransomware","tag-website-hacked"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>When passwords are exposed in cyberattacks: advice - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"When passwords are exposed in cyberattacks, victims can be entitled to make a claim for data breach compensation with us on a No Win, No Fee basis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/when-passwords-are-exposed-in-cyberattacks-advice\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When passwords are exposed in cyberattacks: advice - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"When passwords are exposed in cyberattacks, victims can be entitled to make a claim for data breach compensation with us on a No Win, No Fee basis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/when-passwords-are-exposed-in-cyberattacks-advice\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-15T10:15:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-25T15:23:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/12\/password.png\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/when-passwords-are-exposed-in-cyberattacks-advice#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/when-passwords-are-exposed-in-cyberattacks-advice\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"When passwords are exposed in cyberattacks: advice\",\"datePublished\":\"2020-06-15T10:15:57+00:00\",\"dateModified\":\"2025-11-25T15:23:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/when-passwords-are-exposed-in-cyberattacks-advice\"},\"wordCount\":660,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/when-passwords-are-exposed-in-cyberattacks-advice#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/password.png\",\"keywords\":[\"compensation\",\"cyber attack\",\"cyber crime\",\"cybersecurity\",\"data breach\",\"data controllers\",\"Group Action\",\"online security\",\"personal data\",\"phishing scams\",\"ransomware\",\"website hacked\"],\"articleSection\":[\"Claims\",\"Cybersecurity\",\"Hacking News\",\"Malware\",\"Ransomware\",\"Scammers\",\"Security\",\"Technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/when-passwords-are-exposed-in-cyberattacks-advice\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/when-passwords-are-exposed-in-cyberattacks-advice\",\"name\":\"When passwords are exposed in cyberattacks: advice - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/when-passwords-are-exposed-in-cyberattacks-advice#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/when-passwords-are-exposed-in-cyberattacks-advice#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/password.png\",\"datePublished\":\"2020-06-15T10:15:57+00:00\",\"dateModified\":\"2025-11-25T15:23:44+00:00\",\"description\":\"When passwords are exposed in cyberattacks, victims can be entitled to make a claim for data breach compensation with us on a No Win, No Fee basis.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/when-passwords-are-exposed-in-cyberattacks-advice#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/when-passwords-are-exposed-in-cyberattacks-advice\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/when-passwords-are-exposed-in-cyberattacks-advice#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/password.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/password.png\",\"width\":725,\"height\":250,\"caption\":\"passwords are exposed in cyberattacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/when-passwords-are-exposed-in-cyberattacks-advice#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"When passwords are exposed in cyberattacks: advice\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"When passwords are exposed in cyberattacks: advice - Data Leaks, Breaches &amp; Hacks","description":"When passwords are exposed in cyberattacks, victims can be entitled to make a claim for data breach compensation with us on a No Win, No Fee basis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/when-passwords-are-exposed-in-cyberattacks-advice","og_locale":"en_GB","og_type":"article","og_title":"When passwords are exposed in cyberattacks: advice - Data Leaks, Breaches &amp; Hacks","og_description":"When passwords are exposed in cyberattacks, victims can be entitled to make a claim for data breach compensation with us on a No Win, No Fee basis.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/when-passwords-are-exposed-in-cyberattacks-advice","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2020-06-15T10:15:57+00:00","article_modified_time":"2025-11-25T15:23:44+00:00","og_image":[{"width":725,"height":250,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/12\/password.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/when-passwords-are-exposed-in-cyberattacks-advice#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/when-passwords-are-exposed-in-cyberattacks-advice"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"When passwords are exposed in cyberattacks: advice","datePublished":"2020-06-15T10:15:57+00:00","dateModified":"2025-11-25T15:23:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/when-passwords-are-exposed-in-cyberattacks-advice"},"wordCount":660,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/when-passwords-are-exposed-in-cyberattacks-advice#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/12\/password.png","keywords":["compensation","cyber attack","cyber crime","cybersecurity","data breach","data controllers","Group Action","online security","personal data","phishing scams","ransomware","website hacked"],"articleSection":["Claims","Cybersecurity","Hacking News","Malware","Ransomware","Scammers","Security","Technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/when-passwords-are-exposed-in-cyberattacks-advice","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/when-passwords-are-exposed-in-cyberattacks-advice","name":"When passwords are exposed in cyberattacks: advice - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/when-passwords-are-exposed-in-cyberattacks-advice#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/when-passwords-are-exposed-in-cyberattacks-advice#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/12\/password.png","datePublished":"2020-06-15T10:15:57+00:00","dateModified":"2025-11-25T15:23:44+00:00","description":"When passwords are exposed in cyberattacks, victims can be entitled to make a claim for data breach compensation with us on a No Win, No Fee basis.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/when-passwords-are-exposed-in-cyberattacks-advice#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/when-passwords-are-exposed-in-cyberattacks-advice"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/when-passwords-are-exposed-in-cyberattacks-advice#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/12\/password.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/12\/password.png","width":725,"height":250,"caption":"passwords are exposed in cyberattacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/when-passwords-are-exposed-in-cyberattacks-advice#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"When passwords are exposed in cyberattacks: advice"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4426","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=4426"}],"version-history":[{"count":2,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4426\/revisions"}],"predecessor-version":[{"id":9465,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4426\/revisions\/9465"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/838"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=4426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=4426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=4426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}