Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Recent Data Breaches You Should Know

Recent Data Breaches You Should Know

Imagine for a second what would happen if your business’ data was exposed and stolen. You’d have a really difficult time going forward as your client-base dwindled and you opportunities for growth dried up. The amazing part is that some very successful companies have this type of thing happens all the time. Today, we will look at some of the largest data breaches since September 1.

September

9/5 

Providence Health Plan - 122,000 members of the Providence Health Plan had personal information leaked when an unauthorized party accessed the company’s servers. Information that was stolen included plan member names, addresses, email addresses, dates of birth, Social Security numbers, member ID numbers, and subscriber numbers.

Facebook - Facebook had an unprotected server with over 419 million records accessed.  Users had their Facebook’s user ID and phone number exposed. In some cases, user’s names, genders, and locations were also leaked.

9/16

Dealer Leader, LLC. - 198 million prospective car buyers were left exposed by an unprotected server. The information that was left out there included names, email addresses, phone numbers, addresses, and IPs.

9/27

DoorDash - The popular food delivery app had 4.9 million customers’ information breached by a third-party. The information left exposed included the names, delivery addresses, phone numbers, hashed passwords, order history, and the last four numbers of each’s credit card number. In the same hack, over 100,000 delivery drivers had their driver's license information leaked. 

9/30

Zynga - The mobile game maker, Zynga, the developer of popular mobile games such as Farmville and Words with Friends has announced that 218 million players had their data exposed after their network was breached by a hacker.  The company had player names, email addresses, login IDs, phone numbers, Facebook IDs and more left exposed.

October

10/17 

Methodist Hospitals of Indiana - The Methodist Hospitals of Indiana fell victim to an email phishing scam and it allowed hackers to steal 68,000 records that included names, addresses, dates of birth, Social Security numbers, driver’s licenses, and more. 

10/21

Autoclerk - Autoclerk, a hotel property management software developer had an open database infiltrated exposing data that included names, dates of birth, home addresses, phone numbers, dates of travel, travel costs, room numbers, and some masked credit card details of hundreds of thousands of guests. 

10/22

Kalispell Regional Healthcare - Over 130,000 Social Security numbers, addresses, medical record numbers, dates of birth, medical histories and treatment information, and names of treating physicians were exposed by hackers.

10/26

Adobe - Data was exposed that included email addresses, usernames, location, Adobe product licenses, account creation dates, and payment statuses. 7.5 million users were affected.

10/27

Network Solutions - The world’s oldest domain name provider has been exposed in a hack. Millions of individuals’ data that included names, addresses, phone numbers, email addresses, and service information was compromised.

November 

11/9 

Texas Health Resources - The Texas-based health care provider reported a data breach where 82,000 patient records were exposed. Included in the breach were names, addresses, email information, health information, and more. 

11/16 

Disney Plus - The brand-spanking-new Disney+ streaming service had new user account information hijacked by hackers. Login credentials wound up on the Dark Web soon after. 

Magic the Gathering - The popular online strategy game has reported that an unsecured website database has exposed 452,000 player records that include names, usernames, and more. 

11/18

State of Louisiana - The State of Louisiana has been a victim of a ransomware attack that took down many state agencies’ servers. Although no data is said to be lost, the state’s crucial computing infrastructure was down for several days as systems were restored from backup.

11/19

Macy’s - Macy’s had their ecommerce site hacked. Hackers embedded malicious code into their checkout page and put a skimming code on the company’s Wallet page. The malware retrieved names, addresses, phone numbers, email addresses, payment card numbers, card security codes, and card expiration dates.

11/22 

T-Mobile - T-Mobile had over a million customers’ information accessed by a hacker. Information accessed included names, billing addresses, phone numbers, rates, and calling features.

Unknown - An unsecured server containing over 622 million email addresses and 50 million phone numbers, and millions of pieces of other information was discovered. It is unknown what organization this data is tied to as the time of writing.

With hundreds of millions of records being exposed each month, it’s hard to feel confident about giving your personal or financial information to anyone in the current threat landscape. If your business needs help trying to be secure, call us today at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 19 April 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Google Business Network Security Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Communication IT Support Business Continuity Smartphones Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Business Management Users Managed IT Services Windows Phishing Upgrade Ransomware Data Backup Outsourced IT Windows 10 Save Money Data Recovery Office Cloud Computing Server Windows 10 Passwords Chrome Social Media Gadgets Virtualization Saving Money Holiday Tech Term Automation Microsoft Office Managed IT Services Managed Service Operating System Facebook Cybercrime Artificial Intelligence Computers Hacking Internet of Things Health Wi-Fi BYOD Mobile Device Management Networking IT Support Managed Service Provider Information Technology Alert Information Remote Spam Office 365 Telephone Systems Covid-19 Social Engineering BDR Mobility Recovery Employer-Employee Relationship Bandwidth Router App History Big Data Law Enforcement Data Breach Human Resources Mobile Computing Password Money Application Remote Monitoring Encryption Applications Office Tips Data Storage Government Patch Management Training Private Cloud VPN Blockchain Paperless Office Managed IT Remote Computing Apps Mobile Office How To Wireless Avoiding Downtime Vulnerability Windows 7 Word Gmail Settings Servers Flexibility Marketing WiFi Two-factor Authentication Bring Your Own Device Data Management IT solutions Work/Life Balance Entertainment Website Data Security Mouse Budget HaaS Infrastructure Voice over Internet Protocol Google Drive Conferencing Employee/Employer Relationship The Internet of Things Lithium-ion battery Scam RMM Save Time Firewall Vendor Management Software as a Service Telephone System Staff Machine Learning Virtual Reality Cleaning Apple Connectivity Remote Work Social USB End of Support User Error Physical Security Meetings Education Vendor Safety HIPAA Sports Managed Services Display Redundancy Risk Management Keyboard Data Protection Hacker Best Practice Hard Drive DDoS Comparison YouTube Business Intelligence Black Market CES SharePoint Audit Worker Computing IT Management Virus Business Technology Content Management Document Management Access Control Customer Service Botnet Solid State Drive Wireless Technology How to Unified Threat Management Environment IT Plan Downtime Computer Accessories Virtual Assistant Authentication Fax Server Digital Signage Unsupported Software Data storage Automobile SaaS Charger Printer Update Computing Infrastructure Compliance Bluetooth Procurement OneNote Going Green Computer Care Workplace Strategy Current Events Net Neutrality Network Congestion Google Docs Telephony eWaste Identity Theft Help Desk Samsung Printing Battery Shadow IT IT Consultant Legal Value Wearable Technology Spam Blocking Internet Exlporer Augmented Reality Electronic Medical Records Managed Services Provider Humor Fraud Retail Hard Drives Instant Messaging Database Robot PDF Excel Remote Worker Hiring/Firing Remote Workers Biometrics Cryptocurrency Processor Virtual Desktop Proactive IT Computer Tips Assessment Cache Managed IT Service Amazon Web Services Security Cameras Video Games Windows Server 2008 Virtual CIO Safe Mode OneDrive Best Available Criminal Biometric Security Worker Commute Hosted Computing Experience Tools Science GDPR Peripheral WIndows 7 Digital Security Cameras Television Wireless Internet Using Data Online Shopping Scalability File Sharing Copiers 5G Business Owner Inventory Distributed Denial of Service Specifications Customer Relationship Management NarrowBand Camera Quick Tip Ergonomics Public Computer Wire Evernote Smartwatch Search Analyitcs Travel Programming Regulations iPhone Development Transportation OLED User Virtual Machine PowerPoint Millennials Windows Media Player Computer Fan Printers PCI DSS Rootkit 2FA Smart Office Fiber Optics Wireless Charging Employee Files Workers Messaging Benefits Cabling Antivirus Managing Stress Hypervisor Workforce Windows 8 FENG Chromecast Virtual Private Network Policy Dark mode IBM Trend Micro Cables IT service Cameras Flash Colocation Uninterrupted Power Supply SMS Smart Technology Default App Nanotechnology Saving Time Telecommuting Tablet Project Management Procedure dark theme Supercomputer Shopping Cortana Google Search Domains Software Tips Monitor Sync Emails AI Digital Signature IT Infrastructure IaaS Bing Maintenance Warranty FinTech Streaming Media HVAC Social Network Google Apps Bloatware Reputation Printer Server Netflix Tech Support Two Factor Authentication Analysis Investment Content Devices Employee/Employer Relationships Techology Tablets Root Cause Analysis Laptop Administrator Employees Windows 365 Knowledge Enterprise Content Management Music ISP Entrepreneur HBO Customers Audiobook Skype MSP Video Conferencing Accountants ROI Thought Leadership Bitcoin Credit Cards Shortcuts Shortcut Data loss Touchpad Microchip Sales Outlook Point of Sale Leadership Password Management Personal Troubleshooting Password Manager Cryptomining Cost Management Politics Multi-Factor Security Social Networking Start Menu Advertising Supply Chain Management Loyalty Twitter Batteries Screen Mirroring Search Engine Monitoring Frequently Asked Questions Windows 8.1 Notifications NIST Digitize Books Business Mangement Running Cable Trending Mobile Windows 10s Smart Tech Windows Server 2008 R2 Customer relationships Addiction Amazon Memory Cast Tip of the week Relocation Email Best Practices webinar IT Assessment Emergency Consultant Recycling Manufacturing Analytics Professional Services Public Cloud Wiring Employer Employee Relationship Practices

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code