The information provided on this website does not, and is not intended to, act as legal, financial or credit advice; instead, it is for general informational purposes only. Information on this website may not be current. This website may contain links to other third-party websites. Such links are only for the convenience of the reader, user or browser; we do not recommend or endorse the contents of any third-party sites. Readers of this website should contact their attorney, accountant or credit counselor to obtain advice with respect to their particular situation. No reader, user, or browser of this site should act or not act on the basis of information on this site. Always seek personal legal, financial or credit advice for your relevant jurisdiction. Only your individual attorney or advisor can provide assurances that the information contained herein – and your interpretation of it – is applicable or appropriate to your particular situation. Use of, and access to, this website or any of the links or resources contained within the site do not create an attorney-client or fiduciary relationship between the reader, user, or browser and website owner, authors, contributors, contributing firms, or their respective employers.
Credit.com receives compensation for the financial products and services advertised on this site if our users apply for and sign up for any of them. Compensation is not a factor in the substantive evaluation of any product.
By Brian McGinley, Identity Theft 911
The number of stolen records dropped dramatically to 4 million in 2010, down from 144 million in 2009. But the tally of confirmed breaches rose sharply to 761 from 141 the previous year.
How can we explain these numbers? Hackers are changing their tactics and chasing opportunities. They’ve noticed that many larger corporations are doing a better job of protecting their information. So black hats are honing in on lower-tier business targets—organizations with less savvy, maturity and investment in countermeasures. Once they identify vulnerability, they exploit it.
The information that hackers are targeting appears to be changing, too. Information simply used to impersonate—rip off—consumers and financial institutions isn’t enough for some criminals. There seems to be a rise in the targeting of information that may provide other types of benefits or advantages for business, government or military intelligence, and Lord knows what else.
The good news: The vast majority of breaches are avoidable. They can be stopped when companies conduct the right assessments, identify vulnerabilities and take corrective action. Many of the remedies are relatively inexpensive and easy to implement. It’s all about the fundamentals of data management and information security. Ultimately we know what we ought to do, we just need the passion and discipline to do it.
More from Identity Theft 911:
Image courtesy of Stian Eikeland, via Flickr
October 19, 2023
Identity Theft and Scams
May 17, 2022
Identity Theft and Scams
May 20, 2021
Identity Theft and Scams