{"id":4558,"date":"2013-12-26T20:44:00","date_gmt":"2013-12-26T20:44:00","guid":{"rendered":"https:\/\/evssolutions.com\/what-data-breaches-taught-us-in-2013\/"},"modified":"2013-12-26T20:44:00","modified_gmt":"2013-12-26T20:44:00","slug":"what-data-breaches-taught-us-in-2013","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/what-data-breaches-taught-us-in-2013\/","title":{"rendered":"What Data Breaches Taught Us in 2013"},"content":{"rendered":"

As 2013 comes to an end, its time to look back at the
\nbiggest security breaches and incidents of the year. Hopefully weve all learned
\nsome lessons from these and have been provided a stronger foundation to enhance
\nprotection and create a safer online and mobile world for 2014.<\/p>\n

Every year the world of technology evolves and improves
\nwhich calls for stronger defenses against cyber
\nsecurity threats. Fraudsters are continuously adapting to cyber security. Data
\nbreaches in 2013 saw cases of criminals holding PCs ransom even trying to plant
\nmalware on smart phones via mobile apps.<\/span><\/p>\n

From LivingSocial to Adobe, some of the biggest names in the digital world were compromised this
\nyear, with tens of millions of user accounts and passwords being exposed. Most
\nrecently, Target<\/a>
\nannounced the potential number of over 40 million U.S. debit and credit
\naccounts exposed. Along with the card number, the expiration dates and card
\nverification values were exposed. Experts are recommending that banking
\ninstitutions educate customers about how to protect themselves from any fraud
\nlinked to the attack and check their credit report just to be safe.<\/span><\/p>\n

LivingSocial<\/a>
\nnotified 50 million users in April that their information may have been
\naccessed including names, email addresses, date of birth, and encrypted
\npasswords. The company informed their users to update their accounts and
\nnotified via email to change their passwords. It was also recommended to change
\nany similar passwords a user might use on other sites.<\/p>\n

On a smaller scale, the Washington State Courts announced
\nthat fraudsters accessed up to 160,000 SSN and 1 million drivers license
\nnumbers this year. The passwords werent encrypted when they were stored making
\nit easier for fraudsters to access.<\/p>\n

In March, Evernote<\/a> had to
\nreset 50 million passwords after hackers accessed
\nuser data containing user names, email addresses and encrypted passwords. While
\nlater, Adobe was hacked resulting in tens of millions of customers personal
\ndata including usernames and passwords were compromised. The prevalence, and
\nembarrassment, of ID theft in 2013 had a lot of companies going through the
\nprocess of informing and protecting their users from breaches. The Lexis Nexis,
\nDun & Bradstreet and Kroll Background America breach proved that almost
\nanyone could have their data compromised.<\/span><\/p>\n

In the coming year, we see fraudsters
\nspecifically targeting mobile
\ndevices. A large amount of consumers are dependent on their devices and
<\/a>don’t take basic precautions to protect themselves. These
\nmobile breaches can affect your company, specifically in relation to banking
\ninstitutions and individuals in the payments industry. It can take months to
\ndiscover a breach or recover from fraudulent activity. Taking every precaution
\nis going to reduce your risk of threats and breaches.<\/span><\/p>\n

Good luck in the coming year and,
\nas always, feel free to
contact us<\/a>
\nwith any questions regarding your
verification and authentication solution<\/a> for the New Year.<\/span><\/p>\n


\n<\/span><\/p>\n

[Contributed by EVS Marketing]<\/span><\/p>\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

As 2013 comes to an end, its time to look back at the biggest security breaches and incidents of the year. Hopefully weve all learned some lessons from these and have been provided a stronger foundation to enhance protection and<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[34],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4558"}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4558"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4558\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}