UK tech experts · info@vividrepairs.co.uk
Vivid Repairs
Identity Protection Password Manager: Why You Need Both 2026
Best Of · Buyer's Guide

Identity Protection Password Manager: Why You Need Both 2026

Updated 19 May 202622 min read

Identity protection password manager explained: why antivirus alone isn't enough, UK GDPR context, NCSC guidance, and how layered security stops account takeover in 2026.

As an Amazon Associate, we may earn from qualifying purchases. Our ranking is independent.

How we picked

Our editors evaluated identity protection password manager options against the criteria readers actually weigh up: price, real-world performance, build quality, warranty, and UK availability. Picks lean toward what we'd recommend to a friend buying today, not specs-on-paper winners.

  • Hands-on contextEditor notes from individual reviews, not press releases.
  • Live UK pricingRefreshed from Amazon UK twice daily.
  • No paid placementsAffiliate commission doesn't change what wins.

Identity Protection and Password Management: Why Your Antivirus Needs Both 2026

If you've been relying on antivirus software to keep your digital life safe, you're only half protected. Identity protection and password manager tools address a completely different class of threat, one that antivirus was never designed to stop. Phishing emails, credential stuffing attacks, data breaches at retailers you shopped with years ago: none of these require malware to succeed. Your device can be perfectly clean and your accounts still completely compromised.

The UK Government's Cyber Security Breaches Survey found that 92% of UK cyber breaches involved phishing, and 43% of businesses experienced a breach or attack in the previous twelve months. Consumers are caught in the crossfire. Every time a company holding your data suffers a breach, your credentials enter circulation on criminal marketplaces. The question isn't whether your email address has appeared in a breach. It almost certainly has. The question is what you've done about it.

This hub explains the full landscape: what identity protection actually covers, why password management is its essential foundation, where antivirus fits in, and how to layer these tools so that a breach at one company doesn't cascade into a takeover of your entire digital life. We'll also cover the UK regulatory context that most security guides ignore entirely.

TL;DR

Identity protection and password manager tools defend your accounts and personal data against threats that antivirus cannot reach, including phishing, credential stuffing and data breach reuse. Antivirus secures your device; identity protection secures your identity. The NCSC recommends both, UK GDPR requires organisations to protect your data properly, and the only way to stay ahead of modern threats is to use layered security covering all three areas.

Quick Answer

An identity protection password manager protects your accounts and personal data from phishing, credential stuffing and data breaches, threats that antivirus software cannot stop. You need both antivirus and identity protection because they defend against fundamentally different attack vectors.

Key Takeaways

  • Antivirus blocks malware on your device but cannot stop phishing, credential stuffing or identity misuse after a data breach.
  • The NCSC explicitly recommends password managers and multi-factor authentication as among the most effective consumer protections available.
  • 92% of UK cyber breaches involve phishing, making account-level defences more important than ever.
  • UK GDPR Article 32 requires organisations to protect your data, but consumers must protect themselves with strong passwords and identity monitoring.
  • Password reuse is the single biggest amplifier of breach damage: one leaked password can unlock dozens of accounts.
  • Paid identity protection bundles typically add breached password monitoring, credit file alerts and recovery support beyond what free tools offer.
  • SIM swap fraud, fake banking sites and credential stuffing each require a different defensive layer, and no single product covers all of them alone.

What is identity protection and why does your antivirus need it?

Antivirus software does one job extremely well: it detects and removes malicious code from your device. It scans files, monitors processes, blocks known malware signatures and catches suspicious behaviour. That's genuinely valuable. But it operates entirely within the boundary of your device. Once a threat moves off-device, antivirus is blind to it.

Identity protection operates in the opposite direction. It watches what's happening to your personal data out in the world: in breach databases, on the dark web, in credit reference files, in account login attempts across the internet. It's the layer that asks: has my email address turned up somewhere it shouldn't? Has someone opened a credit account in my name? Is my password circulating in a criminal database right now?

These are not hypothetical questions. Only 19% of UK businesses review supplier risk, according to government research, which means consumers are regularly affected by breaches at third-party firms they've never heard of. A breach at a loyalty card scheme, a delivery company, or a subscription service you used once in 2019 can put your credentials into circulation today. Your device was never involved. Antivirus never had a chance to intervene.

The two tools are complementary, not competing. Think of antivirus as the lock on your front door and identity protection as the alarm system that tells you if someone's been copying your house keys. You need both because the threats come from different directions. A phishing email that tricks you into entering your bank password on a fake site doesn't install malware. It doesn't touch your device in a way antivirus can detect. But it hands your credentials directly to a criminal. Identity protection, combined with a password manager that flags suspicious login pages, is what catches that.

The UK's National Cyber Security Centre (NCSC) treats password managers and multi-factor authentication as foundational consumer protections, not optional extras. Their guidance is publicly available and worth reading alongside any commercial product decision.

This is why the security industry has moved firmly towards bundled suites. Products like Kaspersky Premium combine antivirus with a built-in password manager, identity monitoring and breach alerts precisely because the threat landscape demands coverage at both the device layer and the identity layer. But the bundled approach only makes sense if you understand what each layer actually does. Buying a suite without understanding its components is like buying a car without knowing what the brakes are for.

So let's be precise about what identity protection covers, because it's not a single feature. It's a stack of five distinct capabilities, each addressing a different vulnerability.

The five layers of identity protection explained

Most people think of identity protection as a single thing, a service that watches out for fraud. In practice it's a stack of five distinct capabilities, and understanding each one helps you evaluate whether a product or bundle is actually covering your risk.

1. Password management. This is the foundation. A password manager generates, stores and autofills unique, strong passwords for every account you use. The NCSC is explicit: reusing passwords across accounts is one of the most dangerous things you can do online. One breach exposes all of them. A password manager eliminates reuse entirely, because you no longer need to remember your passwords at all. You remember one master password; the vault handles everything else. Tools like Bitwarden, 1Password and NordPass all operate on this principle, though they differ significantly in features, pricing and platform support. Our detailed password manager comparison for UK users breaks down which features actually matter and which are marketing noise.

2. Breached password monitoring. Even a unique password can be compromised if the service storing it suffers a breach. Breached password monitoring continuously checks whether your email address or stored passwords have appeared in known breach databases. When a match is found, you get an alert and a prompt to change the affected credential before it's used against you. This is a reactive layer, but a critical one, because breaches are often not discovered for months. By the time a company notifies you, criminals may have already been using your credentials.

3. Identity theft monitoring. This goes beyond passwords. It watches for signs that someone is misusing your personal information more broadly: your name, address, date of birth, National Insurance number, or financial details appearing in places they shouldn't. Some services monitor dark web forums and criminal marketplaces. Others watch for new credit applications, address changes, or fraudulent accounts being opened in your name.

4. Credit file protection. In the UK, your credit file at Experian, Equifax and TransUnion is the primary target for identity fraud. A criminal who has enough of your personal data can apply for credit cards, loans or mobile phone contracts in your name. Credit file monitoring alerts you to new applications or changes before the damage compounds. Some paid services also offer fraud alerts that prompt lenders to take extra verification steps before approving credit in your name.

5. Recovery support. If the worst happens, recovery support helps you navigate the process of reclaiming your identity: reporting fraud to Action Fraud, contacting credit reference agencies, disputing fraudulent accounts, and working through the often lengthy process of restoring your credit file. This is the layer most free tools simply don't offer. It's also the one that matters most when you actually need it.

You don't need to buy all five layers from a single provider. But you do need to make sure each layer is covered by something. A gap at any point, particularly at the password management or breach monitoring layer, leaves you exposed to the most common attack vectors.

Why antivirus alone cannot stop account takeover

Account takeover is now the dominant form of consumer cybercrime in the UK. It doesn't require sophisticated malware. It doesn't require your device to be compromised at all. It requires only that a criminal has your username and password, and in a world where billions of credentials have leaked from breached databases, that bar is lower than most people realise.

Credential stuffing is the automated process of taking leaked username and password combinations and trying them at scale across hundreds of popular websites. If you use the same password for your email, your online banking and your Amazon account, a single breach anywhere in that chain gives a criminal access to everything. Antivirus software has no mechanism to detect or prevent this. The login attempts happen on the target website's servers, not on your device.

Phishing is the other dominant vector. The UK Government's Cyber Security Breaches Survey found that 92% of UK cyber breaches involve phishing. A convincing fake page for your bank, your energy supplier, or even the HMRC tax portal can capture your credentials without any malware being involved. Modern antivirus products do include some phishing URL detection, but it's imperfect and reactive: it works against known bad URLs, not freshly registered phishing domains, which criminals rotate constantly.

92% of UK cyber breaches involve phishing. Source: UK Government Cyber Security Breaches Survey 2025. This makes account-level defences, not just device-level antivirus, the most important consumer security investment.

And then there's the stolen laptop scenario. If your device is physically stolen and your browser has saved passwords in an unencrypted form, every account those passwords protect is immediately at risk. Antivirus doesn't help here. A password manager with a master password requirement does, because the vault is encrypted and inaccessible without that master credential.

The point isn't that antivirus is useless. It's that antivirus solves a device-level problem, and the threats that actually compromise most UK consumers operate at the account level. You need both. The device-level and account-level threats are separate, and they require separate defences.

Understanding how password reuse amplifies breach damage is one of the most useful things you can do to understand your own risk. The maths are stark: if you use the same password across ten accounts and one of those services is breached, all ten are potentially compromised. A password manager eliminates that risk entirely.

Password managers: how they work and why the NCSC recommends them

A password manager is software that generates, stores and autofills passwords for you. You create one strong master password to unlock the vault. Everything inside the vault, every login credential for every site and app you use, is encrypted using that master password. Even if the password manager's servers were breached, your data would be unreadable without your master password, which the provider never has access to.

The NCSC's guidance on password managers is unambiguous. They recommend using one specifically because the alternative, trying to remember dozens of unique, strong passwords, is practically impossible for most people. The result of not using a manager is almost always password reuse, and password reuse is one of the most dangerous habits in digital security. The NCSC frames password managers not as a convenience tool but as a security necessity.

When you set up a password manager, the typical workflow looks like this. You install the browser extension or app. You import any saved browser passwords (most managers handle this automatically). As you log in to sites, the manager offers to save new credentials. When you create a new account anywhere, the manager generates a random, unique password of whatever length and complexity you specify, typically something like a 20-character string of letters, numbers and symbols that you'll never need to type or remember. The manager fills it in automatically next time you visit.

The practical effect is significant. Accounts you haven't visited in years, where you might have used a weak or reused password, get migrated to unique strong credentials. Newly created accounts start with strong passwords by default. And the breach monitoring layer (in paid tools or as a separate service) watches those credentials continuously.

There are important differences between free and paid options. Bitwarden is widely respected in the security community and offers genuine end-to-end encryption for free. 1Password and NordPass add features like travel mode, family sharing and breach monitoring at a cost. LastPass has had a difficult few years following its own breach disclosures, which is worth factoring into any evaluation. Our article on free versus paid password managers covers the practical trade-offs in detail, including which free options are genuinely trustworthy and which paid features are worth the subscription.

Not all password managers are equal in their security architecture. Before committing to any tool, check whether it uses zero-knowledge encryption (meaning the provider cannot access your vault) and whether it has undergone independent security audits. This information should be publicly available from any reputable provider.

One thing worth understanding: a password manager doesn't just protect your accounts from external breaches. It also protects against the very common scenario where someone with physical access to your device, a family member, a colleague, a thief, tries to access your accounts through a saved browser password. The vault requires your master password. Browser-saved passwords typically require nothing at all.

Breached password monitoring and credential reuse risk

Even if you use a password manager and have unique passwords for every account, you're not immune to breaches. The service holding your data can be breached, and your credentials can end up in criminal databases regardless of how strong or unique your password was. Breached password monitoring is the layer that catches this.

The mechanism is straightforward. Services like Have I Been Pwned (which the NCSC has formally partnered with) maintain databases of credentials from known breaches. Breached password monitoring in a password manager or identity protection service checks your stored email addresses and passwords against these databases continuously. When a match is found, you're alerted immediately.

The value of this is timing. Companies are often slow to disclose breaches. The average time between a breach occurring and a company notifying affected users has historically been measured in months. During that window, criminals are actively using the leaked credentials. An alert from a monitoring service can reach you days or weeks before the official notification, giving you time to change the affected password before it's weaponised against you.

Credential stuffing is the specific attack that breached passwords enable at scale. Criminals buy or download breach databases, then use automated tools to try those username and password combinations across hundreds of popular services simultaneously. They're not targeting you specifically. They're running millions of combinations and seeing what sticks. If your email and password combination from a breach at a small e-commerce site is the same as your Gmail password, that's what gets found.

The full guide to breached password monitoring explains how these services work technically, what they can and can't detect, and how to respond when you receive a breach alert. The short version: change the affected password immediately, check whether you've reused it anywhere else, and enable MFA on any account where it's available.

Only 19% of UK businesses review supplier risk. Source: UK Government Cyber Security Breaches Survey. This means consumers are regularly affected by breaches at third-party companies they may not even remember using, making continuous monitoring essential rather than optional.

Identity theft monitoring and credit file protection in the UK

Password security is the first line of defence, but identity theft goes further than account access. A criminal with enough of your personal data, your name, date of birth, address and National Insurance number, can open financial accounts, take out loans, apply for mobile phone contracts and commit fraud in your name without ever touching your online accounts. This is where credit file monitoring and identity theft monitoring become essential.

In the UK, your credit file is held by three main credit reference agencies: Experian, Equifax and TransUnion. Every time a lender runs a credit check on you, it appears on your file. Every new account opened in your name appears there too. Credit file monitoring watches for these events and alerts you when something unexpected happens: a hard search you didn't authorise, a new account you don't recognise, or an address change you didn't request.

Some identity protection services go further by monitoring dark web forums and criminal marketplaces for your personal data. This is less precise than credit file monitoring (the dark web is vast and not fully indexable) but can provide early warning that your data is in circulation before it's been used to open fraudulent accounts.

The UK's Data (Use and Access) Act 2025, which came into force in December 2025, established a statutory trust framework for digital verification services under UKAS accreditation. This gives consumers clearer criteria for evaluating which identity verification and monitoring services meet legitimate standards, rather than relying solely on marketing claims.

If you discover fraudulent activity on your credit file, the process of correction is managed through the credit reference agencies directly, alongside a report to Action Fraud (the UK's national fraud reporting centre). Some paid identity protection services include case management support for this process, which can be genuinely valuable given how complex and time-consuming it can be to unwind fraudulent accounts. Our dedicated article on identity theft monitoring in the UK covers the credit file protection process, what each agency offers, and how to set up fraud alerts.

UK regulatory context: GDPR, ICO guidance and your rights

Most consumer security guides treat regulation as a footnote. It shouldn't be. Understanding the UK's regulatory framework helps you know what protection you're legally entitled to from the organisations holding your data, and what you need to provide for yourself.

UK GDPR Article 32 requires organisations to implement appropriate technical and organisational measures to protect personal data. This includes encryption, access controls, and the ability to detect and respond to breaches. The Data Protection Act 2018 gives this domestic legal force. In practice, this means any company holding your data, your bank, your energy supplier, your favourite online retailer, is legally required to protect it with appropriate security measures.

But here's the gap: those obligations apply to organisations, not to you as an individual consumer. When a company is breached, you have the right to be notified (if the breach is likely to affect your rights and freedoms) and the right to complain to the ICO. What you don't have is a guarantee that the company's security was adequate enough to prevent the breach in the first place. And when a breach does occur, the damage to you is real regardless of whether the company was negligent.

The ICO's guidance for consumers recommends strong, unique passwords and MFA as personal best practice. The NCSC's Cyber Aware campaign makes the same recommendations. Neither body mandates specific products, but both treat password managers and MFA as the practical implementation of best practice for individual users. You can read the NCSC's top tips for staying secure online directly on their website.

The ICO also has enforcement powers when organisations fail in their data protection obligations. You can report a suspected breach or misuse of your data at ico.org.uk/make-a-complaint. This doesn't undo the damage of a breach, but it does create accountability and can trigger investigations that protect other consumers.

UK GDPR and the Data Protection Act 2018 give you the right to know what data an organisation holds about you (a Subject Access Request), the right to have inaccurate data corrected, and in some circumstances the right to have data deleted. These rights are relevant if you're dealing with the aftermath of identity theft.

Protecting your household: family and shared-device password hygiene

Most security advice is written for a single person managing their own accounts. The reality for most UK households is messier. Shared devices, children's accounts, elderly relatives who need help with passwords, multiple streaming subscriptions with shared logins: the household security picture is genuinely complicated, and most competitor guides simply don't address it.

The first problem is shared devices. If multiple people use the same computer or tablet, browser-saved passwords are accessible to everyone who uses that device. A password manager with a master password requirement solves this: each user has their own vault, protected by their own master password, and the family device doesn't become a single point of failure for everyone's accounts.

The second problem is family password sharing. Sharing passwords for streaming services like BBC iPlayer, Netflix or Disney+ is common. It's also a security risk, because shared passwords tend to be weak (easy to remember and communicate) and tend to be reused. A family password manager plan, offered by tools like 1Password Families and Bitwarden's family tier, allows controlled sharing of specific credentials without exposing the rest of your vault. You share the Netflix password; you don't share your banking credentials.

Children's accounts deserve particular attention. Young people are frequently targeted by phishing attacks, particularly through gaming platforms and social media. Teaching children to use a password manager from an early age builds good habits, but it also requires a family plan that gives parents oversight without removing the child's privacy entirely. Some family security suites include parental controls alongside password management, which is worth considering if you have children using devices at home.

Elderly relatives present a different challenge. Password managers require a level of technical comfort that some older users find daunting. The practical solution is often to set up the manager for them, create strong unique passwords for their key accounts (banking, email, NHS login), and ensure MFA is enabled on the accounts that matter most. Our guide to family password management in the UK covers the specific scenarios in detail, including how to support less technical household members without creating new security risks.

When setting up a password manager for a household, start with the three highest-risk accounts: email (because it controls password resets for everything else), online banking, and the primary social media account. Get those three right first, then work through the rest systematically.

Scenario-based buying: which protection covers which threat

Abstract security advice is easy to ignore. Concrete scenarios make the risk real. Here's how the different layers map to the specific threats most likely to affect UK consumers in 2026.

Phishing attack via fake banking site. You receive an email that looks like it's from your bank, click the link, and enter your login details on a convincing fake page. Antivirus may or may not catch the URL depending on whether it's in a known blocklist. A password manager helps here in a specific way: it only autofills credentials on the legitimate domain it saved them for. If the URL doesn't match, it won't autofill, which is a strong signal that something's wrong. MFA is the backstop: even if your password is captured, the criminal can't access your account without the second factor.

Data breach at a retailer. A shop you used online three years ago suffers a breach. Your email and hashed password are leaked. If you used a unique password (managed by a password manager), only that one account is at risk. Breached password monitoring alerts you to change it. If you reused that password elsewhere, you're exposed across every account that shares it.

SIM swap fraud. A criminal contacts your mobile provider, convinces them to transfer your number to a new SIM, and then uses SMS-based password resets to access your accounts. The defence here is layered: use an authenticator app rather than SMS for MFA, enable a security lock on your mobile account with your provider, and monitor your credit file for any unexpected activity. Our full guide to SIM swap fraud protection covers the specific steps for each major UK mobile provider.

Stolen laptop. Your laptop is stolen. If your browser has saved passwords unencrypted, every account is potentially accessible. A password manager with a master password requirement means the vault is encrypted and inaccessible. Full-disk encryption (built into Windows 11 via BitLocker and macOS via FileVault) adds another layer at the device level. Antivirus doesn't help here, but the combination of a password manager and device encryption does.

Identity fraud via personal data. A criminal uses your name, address and National Insurance number (obtained from a previous breach or through social engineering) to apply for credit in your name. Credit file monitoring alerts you to the new application. Identity theft monitoring may catch your data circulating on dark web forums before it's used. Antivirus and password managers are irrelevant here: this threat operates entirely outside your devices.

The pattern is consistent. Antivirus addresses device-level threats. Password managers address credential-level threats. Identity and credit monitoring address the broader identity-level threats that operate independently of your devices entirely. Layering all three closes the gaps that any single tool leaves open.

Choosing between free and paid identity protection

The honest answer is that free tools cover the basics well, and for many users they're genuinely sufficient. Bitwarden is open-source, independently audited, uses zero-knowledge encryption, and is free for individual use. It generates strong passwords, stores them securely, and syncs across devices. That's the foundation, and it costs nothing.

Where free tools fall short is in the layers beyond password storage. Breached password monitoring is limited or absent in most free tiers. Identity theft monitoring is almost entirely a paid feature. Credit file protection requires either a direct subscription with a credit reference agency (Experian's free tier offers some monitoring, but the paid tier is more complete) or a bundled identity protection service. Recovery support, the human assistance layer for dealing with actual identity theft, is exclusively a paid feature.

For a single user with straightforward needs, a free password manager plus free breach monitoring (via Have I Been Pwned's email alerts, which are genuinely useful) plus MFA on key accounts covers the most critical risks at no cost. That's a defensible baseline.

For households, the maths shift. A family plan from a paid password manager often works out cheaper than multiple individual subscriptions, and adds sharing features that free tools don't offer. For anyone who has previously experienced identity theft, or who holds significant financial assets online, the recovery support and credit monitoring layers of a paid service are worth the premium.

Bundled security suites, where antivirus, password management and identity monitoring come in a single subscription, are increasingly the most cost-effective option for users who want all three layers covered. Kaspersky Premium, for example, bundles antivirus with a password manager and identity monitoring features in a single plan. The value proposition isn't just cost: it's that the layers are designed to work together, with breach alerts feeding directly into the password manager's change workflow. Whether a bundle or a mix of best-in-class separate tools is right for you depends on your specific needs, and our MFA setup guide for UK consumers is a good starting point for the authentication layer regardless of which password manager you choose.

Be cautious of identity protection services that charge significant monthly fees but offer little more than what free tools provide. The key differentiators worth paying for are: genuine dark web monitoring (not just breach database checks), credit file alerts from all three UK agencies, and real recovery support from a human team, not just a knowledge base.

Where to go next

This hub has laid out the framework: why identity protection and password management are distinct from antivirus, what the five layers of protection actually cover, how UK regulation shapes your rights and responsibilities, and how to match specific threats to the right defensive layer. The framework is the starting point. The spoke articles in this cluster take each area deeper.

If you're not sure which password manager suits your needs, our UK password manager comparison evaluates the leading options on encryption standards, platform support, family features and breach monitoring, so you can make a genuinely informed choice rather than defaulting to the most-advertised name.

If you're weighing up whether a free tool is enough or whether a paid plan adds meaningful value for your situation, the free versus paid password manager guide breaks down exactly what you gain and lose at each price point, including which free options are trustworthy and which paid features are genuinely worth the subscription.

For the authentication layer, which the NCSC consistently treats as one of the highest-impact single changes you can make, the multi-factor authentication setup guide for UK consumers walks through the process for the accounts that matter most, including online banking, email and government services like HMRC and NHS login.

And if your household includes children, elderly relatives, or multiple people sharing devices, the family password management guide addresses the specific scenarios that generic security advice ignores: shared devices, controlled credential sharing, and how to bring less technical family members into a secure setup without creating new vulnerabilities in the process.

Security isn't a product you buy once. It's a set of habits and layers you build over time. The framework here gives you the map. The spoke articles give you the directions for each specific journey.

Frequently Asked Questions

Antivirus blocks malware and viruses on your device. Identity protection monitors and defends your personal data, accounts and credit file against theft, misuse and fraud. A stolen password or phishing attack can compromise your accounts even if your device is completely virus-free. Both layers are needed for complete security because they defend against different threats.

Yes. The NCSC advises using a password manager to generate and store unique, strong passwords for every account. This prevents password reuse, which is a critical vulnerability because one breach can expose many accounts simultaneously. A password manager is the practical way to manage dozens of unique passwords without memory overload, and the NCSC treats it as one of the most effective consumer protections available.

Breached password monitoring checks whether your email address or passwords have appeared in known data breaches. If a match is found, you receive an alert so you can change the affected password before criminals use it in credential stuffing or account takeover attacks. This matters enormously given that 92% of UK cyber breaches involve phishing, according to the UK Government's Cyber Security Breaches Survey.

Identity protection is not legally mandated for individual consumers, but UK GDPR Article 32 requires organisations to implement appropriate security measures for personal data, including authentication and access controls. For consumers, strong passwords, MFA and identity monitoring are recommended by both the NCSC and ICO as best practice to reduce the risk of account takeover and identity theft.

Yes, free password managers such as Bitwarden offer strong encryption and password generation at no cost. However, paid options typically add identity monitoring, breached password alerts, and customer support. For household use, or if you want integrated identity theft monitoring alongside your password vault, a paid plan usually offers better overall value than stitching together separate free tools.

SIM swap fraud occurs when a criminal convinces your mobile provider to transfer your phone number to a SIM card they control. They can then intercept SMS codes and reset passwords on accounts linked to that number. Protect yourself by using an authenticator app rather than SMS for MFA, enabling account security locks with your mobile provider, and monitoring your credit file for suspicious activity.

Change the password immediately on that account and on any other account where you reused it. Use a password manager to generate a new, unique password for each. Enable MFA where available. Monitor your credit file and bank accounts for suspicious activity. If the breach involved sensitive data such as your National Insurance number, consider identity theft monitoring or a credit alert through Experian, Equifax or TransUnion.

Multi-factor authentication (MFA) requires two or more forms of proof to access an account, for example your password plus a code from an authenticator app. The NCSC treats MFA as one of the most effective consumer defences available because a stolen password alone is not enough for account access. Even if a criminal obtains your login credentials through phishing or a data breach, MFA stops them at the door.

Pairs well with these guides

  • Free UK delivery on most picks
  • 30-day Amazon UK returns
  • A-to-Z purchase protection
  • Live prices, refreshed twice daily