Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Recent Data Breaches You Should Know

Recent Data Breaches You Should Know

Imagine for a second what would happen if your business’ data was exposed and stolen. You’d have a really difficult time going forward as your client-base dwindled and you opportunities for growth dried up. The amazing part is that some very successful companies have this type of thing happens all the time. Today, we will look at some of the largest data breaches since September 1.

September

9/5 

Providence Health Plan - 122,000 members of the Providence Health Plan had personal information leaked when an unauthorized party accessed the company’s servers. Information that was stolen included plan member names, addresses, email addresses, dates of birth, Social Security numbers, member ID numbers, and subscriber numbers.

Facebook - Facebook had an unprotected server with over 419 million records accessed.  Users had their Facebook’s user ID and phone number exposed. In some cases, user’s names, genders, and locations were also leaked.

9/16

Dealer Leader, LLC. - 198 million prospective car buyers were left exposed by an unprotected server. The information that was left out there included names, email addresses, phone numbers, addresses, and IPs.

9/27

DoorDash - The popular food delivery app had 4.9 million customers’ information breached by a third-party. The information left exposed included the names, delivery addresses, phone numbers, hashed passwords, order history, and the last four numbers of each’s credit card number. In the same hack, over 100,000 delivery drivers had their driver's license information leaked. 

9/30

Zynga - The mobile game maker, Zynga, the developer of popular mobile games such as Farmville and Words with Friends has announced that 218 million players had their data exposed after their network was breached by a hacker.  The company had player names, email addresses, login IDs, phone numbers, Facebook IDs and more left exposed.

October

10/17 

Methodist Hospitals of Indiana - The Methodist Hospitals of Indiana fell victim to an email phishing scam and it allowed hackers to steal 68,000 records that included names, addresses, dates of birth, Social Security numbers, driver’s licenses, and more. 

10/21

Autoclerk - Autoclerk, a hotel property management software developer had an open database infiltrated exposing data that included names, dates of birth, home addresses, phone numbers, dates of travel, travel costs, room numbers, and some masked credit card details of hundreds of thousands of guests. 

10/22

Kalispell Regional Healthcare - Over 130,000 Social Security numbers, addresses, medical record numbers, dates of birth, medical histories and treatment information, and names of treating physicians were exposed by hackers.

10/26

Adobe - Data was exposed that included email addresses, usernames, location, Adobe product licenses, account creation dates, and payment statuses. 7.5 million users were affected.

10/27

Network Solutions - The world’s oldest domain name provider has been exposed in a hack. Millions of individuals’ data that included names, addresses, phone numbers, email addresses, and service information was compromised.

November 

11/9 

Texas Health Resources - The Texas-based health care provider reported a data breach where 82,000 patient records were exposed. Included in the breach were names, addresses, email information, health information, and more. 

11/16 

Disney Plus - The brand-spanking-new Disney+ streaming service had new user account information hijacked by hackers. Login credentials wound up on the Dark Web soon after. 

Magic the Gathering - The popular online strategy game has reported that an unsecured website database has exposed 452,000 player records that include names, usernames, and more. 

11/18

State of Louisiana - The State of Louisiana has been a victim of a ransomware attack that took down many state agencies’ servers. Although no data is said to be lost, the state’s crucial computing infrastructure was down for several days as systems were restored from backup.

11/19

Macy’s - Macy’s had their ecommerce site hacked. Hackers embedded malicious code into their checkout page and put a skimming code on the company’s Wallet page. The malware retrieved names, addresses, phone numbers, email addresses, payment card numbers, card security codes, and card expiration dates.

11/22 

T-Mobile - T-Mobile had over a million customers’ information accessed by a hacker. Information accessed included names, billing addresses, phone numbers, rates, and calling features.

Unknown - An unsecured server containing over 622 million email addresses and 50 million phone numbers, and millions of pieces of other information was discovered. It is unknown what organization this data is tied to as the time of writing.

With hundreds of millions of records being exposed each month, it’s hard to feel confident about giving your personal or financial information to anyone in the current threat landscape. If your business needs help trying to be secure, call us today at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Cybersecurity Quick Tips Business Management Users Phishing Upgrade Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Cloud Computing Server Save Money Windows 10 Passwords Saving Money Holiday Social Media Chrome Gadgets Tech Term Virtualization Automation Managed IT Services Managed Service Microsoft Office Facebook Operating System Cybercrime Artificial Intelligence Computers BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Health Wi-Fi Office 365 Covid-19 Telephone Systems Information Technology Managed Service Provider Information Alert Remote Spam Bandwidth Router BDR Social Engineering Recovery Mobility Employer-Employee Relationship Application Encryption Applications App History Big Data Law Enforcement Human Resources Data Breach Password Mobile Computing Remote Monitoring Money How To Office Tips Blockchain Training Paperless Office Government Data Storage Patch Management VPN Private Cloud Managed IT Remote Computing Mobile Office Apps Google Drive Wireless Gmail Avoiding Downtime Vulnerability Settings Windows 7 Word Infrastructure Voice over Internet Protocol Two-factor Authentication Servers Flexibility Bring Your Own Device Marketing Data Management Mouse WiFi Work/Life Balance HaaS IT solutions Entertainment Data Security Website Budget USB End of Support Education Physical Security Risk Management Safety Employee/Employer Relationship Hacker Sports HIPAA Redundancy RMM The Internet of Things Keyboard Lithium-ion battery Staff Software as a Service Telephone System Machine Learning Conferencing Connectivity Remote Work Scam Firewall Save Time Virtual Reality Apple Vendor Management Social Cleaning Vendor User Error Data Protection Meetings Managed Services Display Shadow IT Hard Drives Samsung Comparison Retail Legal Instant Messaging Processor CES Robot Excel Internet Exlporer IT Consultant Value Biometrics Hard Drive Spam Blocking Content Management Electronic Medical Records Virtual Desktop Business Technology Humor Access Control PDF Computing Hiring/Firing DDoS Virtual Assistant Proactive IT Authentication SharePoint Best Practice YouTube Black Market Digital Signage Update Customer Service Environment Business Intelligence Audit Worker Document Management Google Docs Fax Server Wireless Technology IT Management Identity Theft Solid State Drive How to Downtime Procurement Virus Net Neutrality SaaS Botnet Workplace Strategy IT Plan Unified Threat Management Computer Accessories Help Desk Data storage Augmented Reality Printing Automobile Network Congestion Unsupported Software Fraud eWaste Remote Worker Charger Computing Infrastructure Going Green Managed Services Provider Printer Compliance Cryptocurrency Bluetooth OneNote Computer Care Database Current Events Battery Wearable Technology Telephony Remote Workers Email Best Practices GDPR Root Cause Analysis IT Assessment Hosted Computing Manufacturing Audiobook Touchpad HBO Wireless Internet Knowledge Online Shopping Music Managed IT Service Security Cameras Running Cable Skype Computer Tips File Sharing Virtual CIO Camera Memory Data loss OneDrive Inventory Biometric Security Politics Specifications Advertising Troubleshooting Outlook Peripheral Wire Leadership Evernote Using Data Travel Start Menu Digital Security Cameras Notifications Printers Screen Mirroring Copiers Loyalty 5G Millennials Books Frequently Asked Questions Quick Tip Smart Office Wireless Charging Windows 10s Smartwatch Relocation Mobile Ergonomics Science Virtual Private Network Cast Development OLED Workforce Emergency Video Games Tip of the week PCI DSS Consultant webinar Virtual Machine Cables Public Cloud Fiber Optics Analytics Employer Employee Relationship Employee Worker Commute Distributed Denial of Service Customer Relationship Management Professional Services 2FA Project Management Analyitcs Messaging Nanotechnology Assessment Cabling Experience Telecommuting Scalability Programming Windows Server 2008 Policy Best Available Hypervisor Cortana Trend Micro Digital Signature Business Owner Tools Dark mode WIndows 7 NarrowBand Warranty SMS Television Default App Google Apps Search Antivirus Procedure HVAC Saving Time Windows 8 Shopping Analysis Google Search iPhone dark theme IT service Administrator AI Devices Public Computer IT Infrastructure Transportation Bing Regulations FinTech Enterprise Content Management User MSP Tablet Computer Fan Social Network PowerPoint Accountants Rootkit Windows Media Player Files Domains Chromecast Microchip Thought Leadership Investment Credit Cards Password Manager Benefits Employees Password Management Workers Employee/Employer Relationships Uninterrupted Power Supply Managing Stress FENG ISP Multi-Factor Security IaaS Colocation Maintenance Windows 365 Search Engine Bloatware Video Conferencing Twitter IBM ROI Cameras Business Mangement Smart Technology Shortcuts Monitor Flash Sales NIST Bitcoin Tablets Personal Smart Tech Cryptomining Trending Point of Sale Entrepreneur Software Tips Supply Chain Management Addiction Supercomputer Amazon Recycling Reputation Sync Monitoring Streaming Media Emails Batteries Tech Support Wiring Digitize Practices Content Shortcut Windows 8.1 Techology Laptop Cost Management Cache Windows Server 2008 R2 Amazon Web Services Printer Server Criminal Two Factor Authentication Customers Social Networking Customer relationships Safe Mode Netflix

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code