Earlier this week, cybersecurity firm UpGuard reported that cloud-based data storage from Alteryx, a data analytics firm, had left the personal information of 123 million Americans exposed. Alteryx is a partner of both Experian, the credit monitoring firm, and the U.S. Census Bureau. Although the Census data was already publicly available, when coupled with the sensitive Experian information, UpGuard raised concern that the exposed information could impact nearly every household in the country.
Our credit scores can determine more about our future than our education, salary, and connections. So, when creditors call demanding prompt payment, Americans are quick to action. The problem is, not every call you receive from a debt collector is legitimate; many of these calls are part of a scam called vishing.
Here’s what you need to know.
If you’re one of the 80% of working Americans who had your personal data exposed over the summer, you’re likely filled with a number of questions and a great deal of concern.
The highlights of the sessions are an interpretation by InfoArmor and not necessarily those of any government agencies or representatives. The second annual (and only forum of its kind) Incident Response Forum held true to form by providing informative and interactive panel discussions without death by PowerPoint and it proved to be thought provoking with open and lively conversations.
Internal, external, phishing, third party, malware, hacking, rogue employee, unencrypted laptop and the list goes on. When you begin listing the litany of opportunities an organization has to lose employee data it begins to look like the lyrics of Billy Joel’s “We Didn’t Start the Fire” where he lists all the worlds challenges since the industrial revolution. For businesses, the list of potential losses is long and suffering, a breach of current and/or former employee data adds an additional layer of additional complexity.
BY CHRISTIAN LEES, SPECIAL TO THIRDCERTAINTY
The most common credentials are a combination of username and password, but those have lost a good bit of their protective powers. Next-generation credentials also are edging toward a precarious place. Here’s what you need to know about the dangers of compromised credentials and how to mitigate those risks.
In InfoArmor’s report, “Healthcare Is Under Attack,” our underground research team identified multiple instances where cyber criminals had infiltrated EHR systems and leveraged the compromised data for extortion and ransom. In this report by InfoArmor regarding further risks to the national healthcare infrastructure, InfoArmor has identified substantial infiltration by cyber criminals into peripheral systems.
In early March 2016, the InfoArmor Threat Intelligence Team investigated several targeted cyber-attacks against select US-based healthcare institutions. The bad actors are claiming that they have exfiltrated more than 3TB of data that contain sensitive PII that clearly distinguish the patients along with other confidential medical data.
Through targeted phishing scams criminals are obtaining W-2 forms by gaining trust from employees within organizations. They’re taking advantage of employees and executives within a company to obtain W-2 forms for their own financial gain. The imposter asks the lower-level staff member to share W-2 records or payroll information. Believing that they are fulfilling their bosses request, the employee shares the sensitive data with a criminal.