Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Recent Data Breaches You Should Know

Recent Data Breaches You Should Know

Imagine for a second what would happen if your business’ data was exposed and stolen. You’d have a really difficult time going forward as your client-base dwindled and you opportunities for growth dried up. The amazing part is that some very successful companies have this type of thing happens all the time. Today, we will look at some of the largest data breaches since September 1.

September

9/5 

Providence Health Plan - 122,000 members of the Providence Health Plan had personal information leaked when an unauthorized party accessed the company’s servers. Information that was stolen included plan member names, addresses, email addresses, dates of birth, Social Security numbers, member ID numbers, and subscriber numbers.

Facebook - Facebook had an unprotected server with over 419 million records accessed.  Users had their Facebook’s user ID and phone number exposed. In some cases, user’s names, genders, and locations were also leaked.

9/16

Dealer Leader, LLC. - 198 million prospective car buyers were left exposed by an unprotected server. The information that was left out there included names, email addresses, phone numbers, addresses, and IPs.

9/27

DoorDash - The popular food delivery app had 4.9 million customers’ information breached by a third-party. The information left exposed included the names, delivery addresses, phone numbers, hashed passwords, order history, and the last four numbers of each’s credit card number. In the same hack, over 100,000 delivery drivers had their driver's license information leaked. 

9/30

Zynga - The mobile game maker, Zynga, the developer of popular mobile games such as Farmville and Words with Friends has announced that 218 million players had their data exposed after their network was breached by a hacker.  The company had player names, email addresses, login IDs, phone numbers, Facebook IDs and more left exposed.

October

10/17 

Methodist Hospitals of Indiana - The Methodist Hospitals of Indiana fell victim to an email phishing scam and it allowed hackers to steal 68,000 records that included names, addresses, dates of birth, Social Security numbers, driver’s licenses, and more. 

10/21

Autoclerk - Autoclerk, a hotel property management software developer had an open database infiltrated exposing data that included names, dates of birth, home addresses, phone numbers, dates of travel, travel costs, room numbers, and some masked credit card details of hundreds of thousands of guests. 

10/22

Kalispell Regional Healthcare - Over 130,000 Social Security numbers, addresses, medical record numbers, dates of birth, medical histories and treatment information, and names of treating physicians were exposed by hackers.

10/26

Adobe - Data was exposed that included email addresses, usernames, location, Adobe product licenses, account creation dates, and payment statuses. 7.5 million users were affected.

10/27

Network Solutions - The world’s oldest domain name provider has been exposed in a hack. Millions of individuals’ data that included names, addresses, phone numbers, email addresses, and service information was compromised.

November 

11/9 

Texas Health Resources - The Texas-based health care provider reported a data breach where 82,000 patient records were exposed. Included in the breach were names, addresses, email information, health information, and more. 

11/16 

Disney Plus - The brand-spanking-new Disney+ streaming service had new user account information hijacked by hackers. Login credentials wound up on the Dark Web soon after. 

Magic the Gathering - The popular online strategy game has reported that an unsecured website database has exposed 452,000 player records that include names, usernames, and more. 

11/18

State of Louisiana - The State of Louisiana has been a victim of a ransomware attack that took down many state agencies’ servers. Although no data is said to be lost, the state’s crucial computing infrastructure was down for several days as systems were restored from backup.

11/19

Macy’s - Macy’s had their ecommerce site hacked. Hackers embedded malicious code into their checkout page and put a skimming code on the company’s Wallet page. The malware retrieved names, addresses, phone numbers, email addresses, payment card numbers, card security codes, and card expiration dates.

11/22 

T-Mobile - T-Mobile had over a million customers’ information accessed by a hacker. Information accessed included names, billing addresses, phone numbers, rates, and calling features.

Unknown - An unsecured server containing over 622 million email addresses and 50 million phone numbers, and millions of pieces of other information was discovered. It is unknown what organization this data is tied to as the time of writing.

With hundreds of millions of records being exposed each month, it’s hard to feel confident about giving your personal or financial information to anyone in the current threat landscape. If your business needs help trying to be secure, call us today at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity Smartphones IT Support Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Business Management Users Windows Phishing Upgrade Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Cloud Computing Office Server Save Money Data Recovery Passwords Windows 10 Tech Term Saving Money Gadgets Holiday Social Media Chrome Virtualization Managed Service Managed IT Services Automation Microsoft Office Computers Artificial Intelligence Facebook Operating System Cybercrime Internet of Things BYOD Mobile Device Management Networking Wi-Fi IT Support Hacking Health Spam Alert Office 365 Telephone Systems Remote Managed Service Provider Information Technology Covid-19 Information BDR Bandwidth Social Engineering Mobility Recovery Employer-Employee Relationship Router Mobile Computing Law Enforcement Remote Monitoring Application Password App History Money Data Breach Big Data Encryption Applications Human Resources Remote Computing How To Mobile Office Private Cloud Data Storage Managed IT Patch Management Office Tips Apps Training VPN Blockchain Paperless Office Government WiFi Avoiding Downtime IT solutions Infrastructure Entertainment Mouse Voice over Internet Protocol HaaS Website Budget Vulnerability Bring Your Own Device Data Management Work/Life Balance Windows 7 Word Wireless Servers Gmail Google Drive Settings Data Security Flexibility Two-factor Authentication Marketing Apple Employee/Employer Relationship Social RMM USB User Error Meetings Save Time Conferencing Data Protection Risk Management Cleaning Scam Hacker The Internet of Things End of Support Lithium-ion battery Vendor Management Education Physical Security Vendor Safety Managed Services HIPAA Sports Software as a Service Display Redundancy Firewall Telephone System Staff Machine Learning Keyboard Connectivity Virtual Reality Remote Work Hard Drive YouTube Google Docs Black Market Value Network Congestion Printer Identity Theft Bluetooth eWaste Spam Blocking Electronic Medical Records Computing Document Management Solid State Drive Wireless Technology Hiring/Firing Downtime Augmented Reality How to Fraud IT Consultant Wearable Technology Hard Drives Digital Signage Data storage Remote Worker Retail Automobile Instant Messaging Cryptocurrency Humor Robot Excel Business Intelligence Biometrics Computing Infrastructure Worker Virtual Desktop Procurement Audit Going Green IT Management Comparison Net Neutrality Workplace Strategy DDoS Botnet CES Help Desk IT Plan Printing Battery SharePoint Shadow IT Business Technology Content Management Legal Access Control Unsupported Software Managed Services Provider Internet Exlporer Charger Virtual Assistant Customer Service Authentication Virus Environment Database PDF Compliance Computer Care Fax Server Remote Workers OneNote Unified Threat Management Computer Accessories Current Events Telephony Processor Proactive IT Update Samsung SaaS Best Practice HVAC Peripheral Experience Skype Google Apps IaaS Digital Security Cameras Maintenance Analysis Using Data Scalability Data loss Devices Copiers Business Owner Outlook Bloatware 5G Leadership Troubleshooting Administrator Enterprise Content Management Quick Tip Start Menu NarrowBand Tablets Smartwatch Loyalty MSP Ergonomics Accountants Search Screen Mirroring Thought Leadership Development Frequently Asked Questions Printer Server Entrepreneur Credit Cards OLED iPhone Books Microchip Password Management PCI DSS Mobile Password Manager Virtual Machine Windows 10s Multi-Factor Security Employee 2FA Shortcut Fiber Optics Cast Twitter Messaging Tip of the week Cost Management Cabling Files webinar Emergency Search Engine NIST Policy Professional Services Social Networking Business Mangement Hypervisor Public Cloud Chromecast Employer Employee Relationship Trending Assessment Dark mode Smart Tech Trend Micro Addiction SMS Windows Server 2008 Amazon Default App Colocation Uninterrupted Power Supply Running Cable Procedure Tools Recycling Saving Time Memory Google Search Monitor Television Wiring dark theme Practices Shopping Cache AI Amazon Web Services IT Infrastructure Safe Mode FinTech Criminal Bing Reputation Public Computer Streaming Media GDPR Consultant Hosted Computing Social Network Wireless Internet Content Regulations Analytics Online Shopping Investment Tech Support Transportation Rootkit File Sharing Employees Employee/Employer Relationships Techology Computer Fan Science Laptop Specifications ISP Customers Camera Windows 365 Best Available Inventory WIndows 7 Wire Video Conferencing Audiobook Evernote ROI Workers Benefits Distributed Denial of Service Sales Customer Relationship Management Bitcoin FENG Travel Shortcuts Touchpad Personal Analyitcs Millennials Cryptomining IBM Printers Point of Sale Smart Office Supply Chain Management Politics Flash Programming Wireless Charging Advertising Smart Technology Monitoring Batteries Digitize Software Tips Workforce Supercomputer Notifications Virtual Private Network Windows 8.1 User Antivirus Sync PowerPoint Cables Windows Server 2008 R2 Emails Windows Media Player Customer relationships Windows 8 Nanotechnology IT Assessment Telecommuting Manufacturing Relocation Project Management Email Best Practices IT service Managing Stress Cortana Netflix Two Factor Authentication Security Cameras Computer Tips Digital Signature Managed IT Service Video Games Root Cause Analysis Tablet OneDrive Worker Commute HBO Cameras Biometric Security Knowledge Music Warranty Virtual CIO Domains

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code