{"id":4890,"date":"2015-08-20T21:47:00","date_gmt":"2015-08-20T21:47:00","guid":{"rendered":"https:\/\/evssolutions.com\/ashley-madison-data-breach-proves-even-a-name-is-valuable\/"},"modified":"2023-04-18T21:40:48","modified_gmt":"2023-04-18T21:40:48","slug":"ashley-madison-data-breach-proves-even-a-name-is-valuable","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/ashley-madison-data-breach-proves-even-a-name-is-valuable\/","title":{"rendered":"Ashley Madison Data Breach Proves Even a Name is Valuable"},"content":{"rendered":"
Health care, government and education are common targets of data breaches. However, fraudsters are dominating headlines with a data breach of the affair-driven website, Ashley Madison. The breach gives cyber security professionals and citizens, a strong insight into how secure systems are in comparison to how safe users think their info may be. <\/span><\/p>\n <\/p>\n According to news reports<\/a>, the drama surrounding the breach started when fraudsters compromised the Ashley Madison website and threatened to release the data if it was not shut down. The owners of Ashley Madison did not comply; therefore, the stolen data was released to the dark web. <\/span><\/p>\n Various reports are conveying the types of personally identifying information were compromised. Thus far, the data includes names, e-mails, purchase history and more. This data breach is unique in the manner that the focus of the fraudsters was not financial gain, because they did not obtain full payment information, just a partial set of the numbers. <\/span><\/p>\n In the majority of cases, victims of a data breach would be relieved that their payment information was not at risk. However, in this instance the more than 32 million people have different information released that can be viewed as worse given the circumstance.<\/p>\n The Ashley Madison website prided itself in being anonymous and even led with that promise. Although, numerous companies instill in people how they should trust them, some people face data breaches later. In knowing the risk in the digital age, some users still provided their correct contact and payment information. <\/span><\/p>\n As an example, allegedly some people used their work e-mails to sign up, even government e-mail accounts. Some users did sign up with fake accounts, but can still be linked through their payment information. One important detail is that the reports claim that the site does not require verification of e-mail addresses, so e-mails may not be correct to the user. <\/span><\/p>\n Aside from the morality aspect of the people affected by the breach, the situation is alarming for businesses and customers. All data is important to someone, even if it is only a person\u2019s name. Likewise, businesses and customers should be aware of the data they give and store, and how this can ultimately impact their lives. While a fraudster obtaining a credit card number and spending thousands of dollars on clothes can impact a person\u2019s credit, a name and e-mail released from a site like Ashley Madison can affect a person in a completely different, yet destructive way. <\/span><\/p>\n Businesses need to protect the data that they store on servers, regardless of if they are a small business or a large corporation. Additionally, compared to the usual targets, age-restricted companies and various others may be at more risk, due to the morality focus on the Ashley Madison case. Finally, verification is key along with Knowledge Based Authentication (KBA)<\/a> to avoid not knowing if a person is who they claim to be. <\/p>\n","protected":false},"excerpt":{"rendered":" Health care, government and education are common targets of data breaches. However, fraudsters are dominating headlines with a data breach of the affair-driven website, Ashley Madison. The breach gives cyber security professionals and citizens, a strong insight into how secure systems are in comparison to how safe users think their info may be.<\/p>\n","protected":false},"author":40,"featured_media":6276,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[35,38],"tags":[],"class_list":["post-4890","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-identity-verification","category-internet-fraud"],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4890"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4890\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media\/6276"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}