{"id":4744,"date":"2012-01-18T15:04:00","date_gmt":"2012-01-18T15:04:00","guid":{"rendered":"https:\/\/evssolutions.com\/zappos-data-breach-prevent-further-identity-theft\/"},"modified":"2012-01-18T15:04:00","modified_gmt":"2012-01-18T15:04:00","slug":"zappos-data-breach-prevent-further-identity-theft","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/zappos-data-breach-prevent-further-identity-theft\/","title":{"rendered":"ZAPPOS Data Breach-Prevent Further Identity Theft"},"content":{"rendered":"
Data. breach. These two small<\/em> words can cause a BIG problem
So what happens now? Well, as you can imagine those 24
Without the proper fraud prevention
<\/p>\n","protected":false},"excerpt":{"rendered":" Data. breach. These two small words can cause a BIG problem for businesses, especially those who house their consumers information for purchasing reasons. The popular online retailer, Zappos.com, just recently felt the wrath of a data breach that happened right<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,35],"tags":[],"class_list":["post-4744","post","type-post","status-publish","format-standard","hentry","category-identity-theft","category-identity-verification"],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4744"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4744\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}
\nfor businesses, especially those who house their consumers information for
\npurchasing reasons. The popular online retailer, Zappos.com, just recently felt
\nthe wrath of a data
\nbreach<\/a> that happened right here in Kentucky. It is unknown exactly when the
\nbreach happened but was stated to have affected 24 million people. The company
\ntook immediate action as soon as they were aware of the attack. They chose to
\ndisconnect all phone lines and communicate with their disgruntled consumers via
\nemail<\/a> in order to avoid an
\noverload of calls.<\/p>\n
\nmillion customers are not only a little angry, but worried about identity
\ntheft<\/a>. It was reported that the hackers were able to get a hold of
\nusernames, passwords, addresses, phone numbers, email addresses, and the last
\nfour digits of credit cards. This information may seem like a lot, but what can
\nsomeone really do with only the last four digits of a card? The answer is, a
\nlot. Zappos urged their customers to change usernames and passwords immediately
\nto avoid further breaching. They also strongly suggested changing credentials to
\nother sites using similar information to their Zappos login to avoid theft from
\nother accounts.<\/p>\n
\nmeasures<\/a>, the amount of information gained through this breach would be
\nsufficient enough for further damage. This is why ID authentication is so
\nimportant when preventing identity theft. Even with someones full name,
\naddress, password, and phone number, ID
\nauthentication<\/a> asks a series of questions that only the true identity
\nholder would know. Zappos is doing all they can to repair the distrust from
\ntheir consumers and hopefully will look into other ID
\nverification<\/a> and authentication measures to prevent this from happening
\nagain.<\/p>\n