Monthly Archives: February 2023

February Recap: Personal Identifiable Information (PII) In Data Security

Personal Identifiable Information (PII)

This month, we focused on a variety of topics regarding personal identifiable information (PII). PII includes an individual’s name, address, phone number, and medical history. In this digital age, PII is increasingly being stolen from unsuspecting individuals and organizations alike. PII allows cybercriminals to easily access financial accounts, and commit identity theft, and other crimes.

You can never really underestimate these hackers and the havoc they can wreak. Just to give you an idea, take a look at some of our latest blogs about PII.

Breaches

Week 1: Top Data Breaches in 2022

In one of our recent blogs, we enumerate the top 10 data breaches in 2022 so far. These data breaches have resulted in millions of dollars worth of losses and have affected millions of unsuspecting individuals.

Data Breaches to Steal Money

Cryptocurrency websites have been attacked, with about $33 million stolen from Crypto.com in January and $625 million from Ronin Crypto, also within the first quarter of the year. Microsoft and Twitter have also been victims of massive attacks, which they are fortunately able to catch shortly.

Data Breaches to Steal Personal Identifiable Information

Other massive data breaches in the year have involved stolen credit card information sold on the dark web, insurance, and healthcare records stolen from the Australian healthcare and insurance company called Medibank, and data on missing persons stolen from Red Cross.

How Data Breaches Happen

The hacker used someone’s personal information to break into the company’s highly protected network, causing these data breaches.

identifiable Information

Week 2: Understanding Personal Identifiable Information

Personal identifiable information or PII refers to any data or detail that can be used to unequivocally identify an individual. Some of the more popularly used PII are a person’s full name, social security number, and biometrics. We talk more about PII in another of our recent blogs.

Because of the power that these bits of information wield, hackers aim to collect them by whatever means necessary. Once they get their hands on this critical data, they will be able to easily gain access to restricted areas of companies, both online and offline.

Securing Information with a Data Privacy Framework

The importance of personal identifiable information is very clear. With this in mind, it is just as important to keep this data as safe as possible. One of the best ways to ensure this is to use a reliable data privacy framework.

There are many existing ones that you can use but for the highest level of protection, it is best that you have your own framework, designed and built specifically for your company. With such a security solution in place, you can be more at ease knowing that you are better protected against potential intruders.

pii

Week 3: Protecting Your Personal Identifiable Information

In week three, we talk about specific things you can do to protect your personal identifiable information. Because no matter how much you trust your data privacy strategy, you should still take all the steps you can to be ahead of hackers at all times. Our guide lists some effective ways to protect your PII both online and offline. Read the full blog here.

Recovering from Getting Hacked

So, you have been very careful and you have done everything that you are supposed to do to keep your PII safe. But despite all this, it is still possible for some really ingenious hackers to get into your system. In case that happens, here is our Free Breach Infographic that tells you how to quickly recover from whatever damage has been done. Want to learn more about PII and how to keep your data safe? Call us today and let’s have a talk!

A Guide to Protecting Your PII

pii

PII is short for Personal Identifiable Information, which refers to any data that can identify a specific person. A hacker can exploit your PII to gain access to restricted areas, make unapproved purchases under your name, or even steal your identity entirely. To keep these incidents from happening, you must know about protecting your personally identifiable information. This is a practice that you must do both online and offline.

Physical Ways of Protecting Your PII

Although we now do most of our business online, there is still a lot of tangible data that hackers can get their hands on if you are not careful. Mail, account statements, and utility bills all have PII like your name, full address, and account numbers on them. Thus, you need to keep these documents safe from data thieves.

Secure Storage

One of the crucial steps in protecting your personal identifiable information is the safe storage of your documents. You can start by having a lock on your mailbox, which is a must. You can also use a secure PO Box where only you can access your mail. It is also advisable to keep your important documents in a fireproof safe at home instead of carrying them around in your purse.

Scrutinize Your Mail

When you get bills or account statements, go through them carefully and check for items you might not recognize. Even better, check your financial statements online regularly instead of waiting for the paper bill. Mail is notorious for including your PII, and is why mail theft is so common.

Use a Shredder

Never throw away bank statements or any financial documents, even if you don’t need them anymore. Hackers are not beneath the practice of dumpster diving, trying to recover any data that can help them do their dirty work. Invest in a personal shredder that you can use to dispose of sensitive documents.

Digital Ways of Protecting Your PII

It is now much easier for hackers to get access to people’s data because almost everything is online. Be very careful when traversing the web to keep your PII safe.

Choose Strong Passwords

Good passwords are hard to figure out because they use a combination of letters, numbers, and other special characters. Change your passwords at least once a month for more security.

Use Only One Credit Card

You are at greater risk of having your credit card information stolen if you frequently shop online. Don’t use more than one credit card when shopping online, this will keep your PII safer and less likely to be stolen.

Be Mindful

Whether you are browsing the web, checking your email, or checking your social media accounts, always keep your guard up. Do not click on suspicious links or attachments, and ignore pop-ups because these are all likely to contain malware.

PII: Steps to Take If You Think You Were Hacked

Despite all your precautions for protecting your personal identifiable information, you may still feel that someone has compromised your data. There are a few critical things that you need to take care of right away. Instead of going into a full-blown panic, we strongly recommend that you follow our FREE 10-step guide on what to do if you think you have been hacked. You might feel helpless at first, but by following this guide, you will get on the road to recovery much faster and have a good chance of recovering your data and regaining control of your network. To learn more about protecting your personally identifiable information and keeping your network safe, you can check out the many useful resources we have or give us a call!

What is Personal Identifiable Information?

identifiable Information

Personal identifiable information, or PII is a term that is frequently mentioned these days concerning data breaches. It means any information that can find the person to whom the information is connected. With that being said, PII is considered to be confidential and must be treated as such. This information is why companies invest in cutting-edge data protection solutions to keep these details secure. PII is also the target of hackers when they break through a company’s database or network. With access to this private information, they can carry out their malicious activities, such as identity theft, more easily.

What Information Is Considered “PII”?

NIST lists an individual’s name, biometrics, and social security number as their primary personal identifiable information in the US. The NIST list also includes home address, email, passport number, driver’s license, vehicle plate number, date of birth, and more. These are also known as pseudo-identifiers or quasi-identifiers. A person cannot be identified from some of this data, such as the birthdate, because millions of people share the same date. But when put together with other information on the list, they make it clear who the person is. Individually, pseudo-identifiers are not considered PII in the US but they are so in Europe and a few other countries.

Ways to Protect Personal Identifiable Information

PII needs to be kept safe by both the organization that collects and stores it and the person who gave it to the organization and owns it. As such, in the event of a data breach, companies are not solely liable for any damage or loss that might occur. Despite this, it is still popular public opinion that the company must keep clients’ information safe and secure. So if you are a business owner, it would be in the best interest of everyone involved if you took the necessary steps to protect all the PII in your database.

You can easily do this by using a tried-and-tested Data Privacy Framework. Many are readily available, like the PCI DSS, the EU GDPR, and ISO 27000. We recommend a customized data protection framework that meets your data security needs and fits your company’s organizational structure..

Identifiable information: Creating Your Data Privacy Framework

Creating a data privacy system requires a dedicated IT team to build and manage it. Reputable managed services provider can create a solution to protect your data from nosy people. We can help you build a framework that fits your company and protects your sensitive data, from sales transactions to personal information. We will take a very close look at your company’s structure and design a system that will address all your specific needs and goals.

If you are ready to take the step to secure your data and be more protected from hackers, just let us know, and we will be there right away. In the meantime, if you think you have been hacked, here is our step-by-step guide to what you should do. Then call us so we can begin bolstering your defenses against cyberattacks.

Top 10 Data Breaches in 2022

Breaches

Cybersecurity tools and strategies have improved by a huge margin over the years. However, data breaches remain to be one of the biggest online threats. This means you can never let your guard down especially when you are operating online. In fact, even huge global companies with seemingly ironclad security systems can still be vulnerable to these attacks.

Many large companies have suffered massive data breaches this year, leaking confidential data, losing millions of dollars, and other damages. Here are the ten worst cases that have happened so far in 2022.

Crypto.com Theft

In January, hackers were able to find a way around Crypto.com’s 2-factor authentication, getting access to about $18 million in Bitcoin and $15 million in Ethereum.

Red Cross Data Breaches

It was also in January when online attackers breached the Red Cross database, specifically that of their Restoring Family Links Program. Information of individuals and families separated by war and other causes, as well as missing persons, were stolen. The Red Cross was able to stop the attacks by immediately taking their servers offline.

Ronin Crypto Theft

The Axie Infinity game became wildly popular early in 2022 and to accommodate more players, they loosened security protocols. This risky move allowed hackers to move in, who eventually managed to steal $625 million worth of cryptocurrency.

Microsoft Data Breaches

In March, the hacking group known as Lapsus$ managed to infiltrate the very tight defenses of Microsoft, putting several of the IT giant’s products at risk. Within two days, though, Microsoft was able to thwart the attack and reported that no client information had been taken.

Cash App Data Breach

A former employee who had beef with the payment company Cash App took to infiltrating their system in April. The hacker stole reports with names, portfolio values, and brokerage account numbers from over 8 million clients.

Student Loan Data Breaches

Nelnet Servicing, a student loan service provider, suffered a data breach in June that led to the exposure of confidential information of more than 2.5 million accounts, including names, contact details, and social security numbers. It was about a month before the breach was discovered.

Twitter Data Breach

In July 2022, a hacker sold data from over 5.4 million Twitter accounts on a hacking forum. The hacker was asking for $30,000 in exchange for the stolen data.

Medibank Data Breach

In October, a malicious party stole data for 9.7 million past and current customers of the Australian insurance and healthcare company Medibank. The company refused to meet the hacker’s demands, who eventually released the files online in separate batches.

Credit Card Information Leak

Also in October, details of over 1.2 million credit card accounts were posted for free on the BidenCash carding marketplace, where anyone on the dark web can use them to make online purchases. These are all active cards that have an expiry date between 2023 and 2026.

Shein Data Breaches

A third party stole 39 million Shein customers’ payment information and sold it on a hackers’ forum. Shein was fined $1.9 million for failing to disclose the 2018 data breach, which was discovered in October.

What to Do If You Think You Have Been Hacked

As you can see, these are all multimillion-dollar companies, and they can even be vulnerable to online attacks that result in data breaches. This only shows that anyone can be a victim. So if you think you are totally safe with the defenses that you have now, you might want to think again. There is no leeway when it comes to online attacks. You need to constantly reevaluate your cybersecurity strategies and keep them updated so they stay relevant to the changing times.

But in the event that you think you may have been hacked, you can follow our step-by-step guide on what to do in order to recover your data and restore your network security. If you need further assistance in reinforcing your security strategies, just call us and we will be on it right away.