Employees | 2 min read

The Capital One Data Breach: What You Need to Know

   

Want to get updates on InfoArmor News?

Have you applied for a credit card recently? If that card is managed by Capital One, your personal information may be at risk.

On July 29, 2019 Capital One Financial Corporation said it suffered a data breach that could affect approximately 100 million people in the United States who have applied for credit products owned by Capital One.

What happened?

In March 2019, an unauthorized person accessed sensitive personal data from credit applications. Specifically, the hacker targeted applications for Capital One credit cards from 2005 to 2019, including Capital One managed retail store cards. Even if you applied and were rejected, you could still be vulnerable.

The breached personal data included the following:

  • Full names
  • Physical addresses
  • Phone numbers
  • Dates of birth
  • Email addresses
  • Self-reported income information

In some cases, additional information may have been compromised, such as credit scores, credit limits, balances, payment history, and transaction data.

Capital One acknowledges that about 140,000 Social Security numbers and 80,000 linked bank account numbers were also exposed, affecting a smaller number of customers contained in this breach. It's important to note that not all accounts with Capital One may have been affected by this breach.

Concerned your personal information may be exposed?

We can help. Here are some tips on what to do next:

1. Review your PrivacyArmor account for any alerts

If you have a PrivacyArmor account, your protection is already hard at work. Log in to the portal to see if you have any alerts — if you do, you will be able to see them when you log in. If you haven't already, be sure to activate credit monitoring and enable dark web monitoring. We can monitor the dark web for the following forms of Personally Identifiable Information (PII) that may be contained in this breach:

  • Credit and debit card numbers
  • Social Security numbers
  • Bank account numbers
  • Email addresses
  • Log-in credentials

2. Take a look at your credit report

Use your PrivacyArmor account to view your credit report and make sure it’s accurate. If you don’t recognize a recent inquiry or account, report it immediately. If you’re a PrivacyArmor member, you can see your credit report in your portal by clicking "Credit Monitoring" in your dashboard menu and following the prompts under "Credit Reports."

3. If you used a password with the breached company, change it

Thieves often take advantage of people who wait before taking necessary precautions like changing a password after a breach. If you use the same or a similar password on other accounts, take care to change those as well. Whenever possible, activate two-factor authentication on your accounts — which adds an extra security measure beyond a password — to help prevent possible theft after a breach.

4. If you believe your information was exposed, place a fraud alert on your accounts

This is a quick and easy safeguard that requires vendors to verify an individual’s identity before extending credit. These fraud alerts will protect your accounts for one year and can be extended if your identity has been stolen. Our Privacy Advocates can even help our members place the alerts on your accounts.

Remember, your data is your most valuable resource and helping safeguard it is as important to us, as it is to you. It's best to do what you can to help protect yourself from theft after a data breach. And we're here to help, 24/7.

 

 

   
New call-to-action
At InfoArmor, we believe everyone deserves the right to privacy, security, and above all else, peace of mind. This is why we’re proud to offer industry-leading solutions for employee identity protection and advanced threat intelligence. From enterprise to employee, InfoArmor redefines how organizations combat an ever-changing cyber threat landscape. If you’d like more information on how we can help your organization protect its most valuable assets, reach out. We’d love to hear from you.