data security: DoorDash Admits 4.9 Million Affected by Data Breach
- 11/07/19 05:03 AM
DoorDash has admitted that it has been the victim of a data breach, which has affected about 4.9 million merchants and people. In a recent blog post, DoorDash announced that it noticed some odd activity early in September from a third-party service. After looking into it, the company found that an unauthorized third party was accessing user data from DoorDash on May 4, 2019. DoorDash immediately took steps to stop any future access and to improve security. Those who were affected by this breach joined DoorDash on April 5, 2018 or before. Those who joined after that specific date were not part of
(14 comments)
|
data security: The “Mother of All Data Breaches?” It Could Be Here…
- 05/16/19 06:57 AM
You have probably heard of one data breach after another these days, but this is one that you should really pay attention to: more than 772 million unique emails, along with more than 21 million unique passwords, have been exposed. Troy Hunt, who runs the website “Have I Been Pwned,” first reported this breach, and he says that a huge file (87 GB) was uploaded to MEGA, a cloud service. This data was then sent to a popular hacking site, and now hackers have access to all of these passwords and email addresses. This data breach, known as “Collection #1,” is very serious.
(12 comments)
|
data security: Second Hand USB’s Could Have Personal Info Still Inside
- 04/25/19 12:08 PM
An unsurprising study was recently released that found even when a portable USB drive is erased, not all of the documents and images are always removed. That, of course, is frightening. Here’s how the research was done: Researchers went online to sites like eBay, to second-hand shops, and even auction stores. They bought 200 used USB drives, half from the US and half from the UK. Almost 2/3 of the devices had data on them! This data was, for the most part, personal data, and it can also be used by cybercriminals to steal someone’s identity. On top of that, these USB drives
(12 comments)
|
data security: 2017 Was the Worst year for Data Breaches EVER!
- 09/06/18 06:30 AM
It seems like 2017 broke records for all the wrong reasons…one of them being the worst year for data breaches in history. According to reports, hacking was the most common way to collect this data, but almost 70% of exposures occurred due to accidental leaks or human error. This came down to more than 5 billion records. There were several well-known public leaks, too, including the Amazon Web Services misconfiguration. More than half of the businesses using this service were affected, including companies like Verizon, Accenture, and Booz Allen Hamilton. The scariest part of this, however, is the fact that the number
(2 comments)
|
data security: Mainstream Email and Data Services Might Be Spying on You
- 08/27/18 08:11 AM
The Internet nowadays flourishes on personal data. Many of the world’s largest companies rely on this intangible commodity that users have been too willing ‘donating’ as an exchange for a ‘free’ service. As data replaces oil as the new premium commodity, buying and selling data is big business. While some companies do it legitimately, some entities do it illicit. Let’s look at some stats: Every day, there are more than 10 million hacker attacks Every hour, more than 228,000 data records are lost or stolen In 2017, thousands of data breaches exposed most everything from log-in names and passwords to Social Security numbers
(0 comments)
|
data security: Protecting Yourself from Data Breach requires Two Step Authentication
- 03/08/18 06:47 AM
Have you ever thought about how a data breach could affect you personally? What about your business? Either way, it can be devastating. Fortunately, there are ways that you can protect your personal or business data, and it’s easier than you think. Don’t assume that protecting yourself is impossible just because big corporations get hit with data breaches all of the time. There are things you can do to get protected. All of your important accounts should use two-factor authentication. This helps to eliminate the exposure of passwords. Once one of the bad guys gets access to your password, and that’s
(11 comments)
|
data security: Top 10 Tips for Securing Your Mobile Devices and Sensitive Client Data
- 01/11/18 06:30 AM
Do you have employees who bring mobile phones to work and use those devices on the corporate network? Do they store company data on these “Bring Your Own Devices (BYOD)”?? Does your company have a policy in place for this? First, the moment a person brings in their personal phone to work, there is a fusion of personal and business tasks that occur. And, equally as bad, company issued devices are used for personal use as much, if not more than the employees own devices. Not sure you believe this? Here are some stats: A recent survey asked 2,000 office workers about their
(4 comments)
|
data security: Equifax Exposed: Major Breach of Data from Major Credit Bureau
- 09/08/17 11:51 AM
If you haven’t yet heard, Equifax, one of the three major credit bureaus in the United States, has been hacked. What does this mean for you? It means that your Social Security number, and possibly even your driver’s license information, could be in the hands of hackers. Some are already calling this the worst breach of data in history. How Did This Happen? On September 7th, Equifax announced that a security breach occurred that could impact as many as 143 million people. Though this isn’t the largest breach to occur, it could be the most devastating. The data that was accessed included Social
(17 comments)
|
data security: Top 12 Tips to Destroy Your Sensitive Data
- 05/18/17 04:52 AM
Believe it or not, you just can’t shred too much. If you aren’t destroying your sensitive data, my best advice is for you to start now. There are people out there who make a living diving into dumpsters in search of credit card info, bank account number, mortgage statements, and medical bills; all things they can use to steal your identity. Here are 12 tips that you can use to help you destroy your sensitive data: Buy a shredder. That said, I don’t own a shredder. I’ll explain shortly. There are a number of different brands and models out there. Some even
(10 comments)
|
data security: Second Hand and Discarded Devices Lead to Identity Theft
- 05/10/17 05:07 AM
A new study was just released by the National Association for Information Destruction. What did it find? Astonishingly, about 40% of all digital devices that are found on the second-hand market had personal information left on them. These include tablets, mobile phones, and hard drives. The market for second hand items is large, and it’s a good way to find a decent mobile device or computer for a good price. However, many times, people don’t take the time to make sure all their personal information is gone. Some don’t even understand that the data is there. This might include passwords, usernames, company
(6 comments)
|
data security: Study Shows Millennials Choose Convenience Over Security
- 04/18/17 05:30 AM
To those of us consider Tom Cruise the movie star of our day or even Grunge as the music we grew up with, looking at millennials, and the way they view life, is fascinating. These “kids” or young adults, many are brilliant. They really do define “disruption”. However, that doesn’t mean that this tech savvy generation is always right. In fact, a new study shows just the opposite when it comes to internet safety. Though, they can also teach us a few things and are definitely up to speed on the value of “authentication” (which leads to accountability). Anyway…South by Southwest, or SXSW,
(2 comments)
|
data security: Security training: the Human Being is impossible to fix
- 12/08/16 06:16 AM
As long as humans sit at computer screens, there will always be infected computers. There’s just no end to people being duped into clicking links that download viruses. A report at theregister.co.uk explains how subjects, unaware they were guinea pigs, fell for a phishing experiment. Subjects were sent an FB message or e-mail from an unfamiliar sender, though 16 percent of the subjects who ultimately clicked reported they knew the sender. The sender announced they had images from a New Year’s Eve party but not to share them. 43.5% clicked the FB message link and one-quarter clicked the e-mail link. Many of
(2 comments)
|
data security: Three ways to beef up security when backing up to the cloud
- 03/21/16 12:14 AM
Disasters happen every day. Crashing hard drives, failing storage devices and even burglaries could have a significant negative impact on your business, especially if that data is lost forever. You can avoid these problems by backing up your data. Backing up means keeping copies of your important business data in several places and on multiple devices. For example, if you saved data on your home PC and it crashes, you’ll still be able to access the information because you made backups. A great way to protect your files is by backing up to the cloud. Cloud backup services like Carbonite allow you to store data
(2 comments)
|
data security: How much is your Data worth online?
- 02/08/16 09:36 PM
Cyber crime sure does pay, according to a report at Intel Security blogs.mcafee.com. There’s a boom in cyber stores that specialize in selling stolen data. In fact, this is getting so big that different kinds of hot data are being packaged—kind of like going to the supermarket and seeing how different meats or cheeses are in their own separate packages. Here are some packages available on the Dark Net: Credit/debit card data Stealth bank transfer services Bank account login credentials Enterprise network login credentials Online payment service login credentials This list is not complete, either. McAfee Labs researchers did some digging and
(23 comments)
|
data security: Data security policies need teeth to be effective
- 02/08/16 09:29 PM
Bottom line: If you have a data security policy in place, you need to make sure that it’s up to date and contains all of the necessary elements to make it effective. Here are 10 essential items that should be incorporated into all security policies: 1. Manage employee email Many data breaches occur due to an employee’s misuse of email. These negligent acts can be limited by laying out clear standards related to email and data. For starters, make sure employees do not click on links or open attachments from strangers because this could easily lead to a ransomware attack. 2. Comply with software licenses and
(1 comments)
|
data security: 2016 Information Security Predictions
- 02/01/16 09:59 PM
No bones about it, 2016 is sure to see some spectacular, news-chomping data breaches, predicts many in infosec. If you thought 2015 was interesting, get your seatbelt and helmet on and prepare for lift off… Wearable Devices Cyber crooks don’t care what kind of data is in that little device strapped around your upper arm while you exercise, but they’ll want to target it as a passageway to your smartphone. Think of wearables as conduits to your personal life. Firmware/Hardware No doubt, assaults on firmware and hardware are sure to happen. Ransomware Not only will this kind of attack continue, but an offshoot of it—“I will infect
(3 comments)
|
data security: 11 Ways to Mitigate Insider Security Threats
- 02/01/16 09:54 PM
Companies are constantly attacked by hackers, but what if those attacks come from the inside? More companies than ever before are dealing with insider security threats.Here are 11 steps that all organizations should take to mitigate these threats and protect important company data: Always encrypt your data If you want to minimize the impact of an insider threat, always encrypt data. Not all employees need access to all data and encryption adds another layer of protection. Know the different types of insider threats There are different types of insider threats. Some are malicious, and some are simply due to negligence. Malicious threats may
(0 comments)
|
data security: Tips for backing up and protecting your data while traveling
- 12/20/15 09:58 PM
The season of giving is now upon us — but don’t forget, it’s also the season of stealing — and no, I don’t mean your wallet or the gift package at your doorstep, but your Social Security number, credit card information, medical records and any other highly confidential information that you have stored on your computers. Thieves want your data — the information stored in your smartphone, laptop and other devices. People are especially vulnerable to this crime when they travel. Don’t let the hustle and bustle of holiday travel detract you from protecting your data! Make sure your devices have updated
(2 comments)
|
data security: Best practices for BYOD data storage
- 11/15/15 10:12 PM
The Bring Your Own Device (BYOD) movement has in some ways saved companies money, but in other ways put customer data at risk. Employees are onsite, telecommuting or traveling on business. This means their devices, and company data could be anywhere at any given moment. A company manager or owner realizes that company use of employee mobile devices brings benefits. But employees also use the devices for personal activities, increasing the risk of hackers getting into company data. The solution is to train these employees in BYOD, information security and awareness. They must be aware of how risky a data breach is, how
(0 comments)
|
data security: Mother Nature can ruin your business: Ready for natural disasters now
- 09/28/15 12:02 AM
September is almost over. This means National Preparedness Month is nearing its end. Nevertheless, you must be prepared all year long to stay safe. National Preparedness Month culminates September 30th with National PrepareAthon Day. In the boxing ring, if you focus on the knockout punches too much, the quick sharp jabs are what may bring you down. This is how some businesses approach their security. They put too much emphasis on preventing that mountainous data breach, while smaller everyday threats sneak by. Those smaller threats may be difficult to get at, and they can knock you out for good. A company may have all eyes
(14 comments)
|
|
|
|