Safe Boomer Logo Art

Data Breaches in the U.S.

Data breaches are caused by unauthorized access, unlawful disclosure, or even theft of sensitive…

Data breaches are caused by unauthorized access, unlawful disclosure, or even theft of sensitive information. Examples include many of the large-scale data breaches that over the past 20 years. In 2013 AND again in 2016, Yahoo’s experienced a breach that impacted billions of accounts. The credit company Equifax experienced a data breach affecting 148 million US citizens in 2017. Capital One bank, the Louisiana Department of Motor Vehicles and many more, have experienced data breaches, which exposed social security numbers, driver’s licenses numbers, bank accounts, credit scores, employment information, and much more! Some data breaches actually can be caused by human error, such as emailing personal or sensitive information to the wrong recipient, or unknowingly downloading malware to your phone or computer by clicking on a link, or an image in a website or email. 

Here’s a more detailed breakdown:

  • Yahoo (2013 & 2016): Two separate incidents compromised billions of user accounts, exposing names, email addresses, passwords, and security questions. 
  • Equifax (2017): A vulnerability in a website application led to the theft of personal information, including names, social security numbers, and driver’s license numbers, for 148 million US citizens. 
  • Facebook (2018 & 2021): Several breaches, including one exposing 29 million users’ data due to software flaws and another exposing over 533 million users’ information.
  1. Breaches Involving Human Error:
  • Incorrect Emailing: Sending a document or email text containing sensitive data to the wrong recipient.
  • Misplaced Devices/Documents: Misplacing or losing your laptop or paper documents containing personal information.
  • Sharing Credentials: Accidental or intentional sharing of passwords or other sensitive information with “friends” or unauthorized individuals. 
  1. Malware and Phishing Attacks:
  • Malware Infections: Malicious software, like ransomware, can infiltrate systems and steal or encrypt data, holding you hostage.
  • Phishing: Deceptive emails or messages tricking users into revealing sensitive information or downloading malware. This is especially easy with emails that mimic the look and feel of a trusted company.
  • Ransomware Attacks: This involves accessing a computer (or server) and encrypting the data (making it unreadable) and then demanding a ransom (money or something of value to the hacker) for its release. 
  1. Other Examples:
  • Insider Threats: Malicious or negligent employees accessing and stealing sensitive data from a company database.
  • Insecure Endpoints: Like mentioned above, if your computer or cell phone does not have a secret pin code or some other form of identifying you as the owner, your device is vulnerable.
  • Server Misconfigurations: Improperly configured cloud storage or services leading to unauthorized access. This should not usually be an issue with the big cloud service providers. But, if you are using a company who manages their own servers, or hires a 3rd party to manage their server, this is more of a risk.
  • Third-Party Breaches: A company’s data breach can affect its vendors and partners, who also have access to their data. It can also affect you!
THE BAD GUYS - Steal or buy our personal information and use it to benefit themselves.

Thousands of devices are lost and/or stolen each year!

Similar Posts

Leave a Reply