Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Hack of Capital One Exposes Information on 100,000 Customers

Hack of Capital One Exposes Information on 100,000 Customers

Capital One is one of the largest credit card issuers in the world. On July 29th 2019, Capital One made an announcement, confirming it is the victim of one of the largest data breaches in financial sector history, as a former software engineer for Amazon has been indicted on charges related to the hacking.

Here’s what we know:

Capital One has admitted that the personally identifiable information (PII) of over 100 million American and Canadian credit applicants’ information has been exposed. The company did admit that no credit card account numbers or authentication credentials were compromised in the hack. They also go on to mention that in 99 percent of the files, social security numbers were not compromised. The largest category of information that was accessed were individual and small business credit applications that span from 2005 to 2019.

The perpetrator, Paige Thompson of Seattle, Washington, was a former software developer for Amazon Web Services (AWS), which took advantage of a firewall misconfiguration to gain access to the information, AWS confirmed Monday. The flaw came as a result of a setup error and not a flaw within the massively popular AWS.

The breach happened on March 22 to 23, 2019. Thompson was apprehended as a result of being reported to Capital One for storing incriminating evidence on her Github and Slack accounts. Capital One contacted the FBI on July 19, 2019 and after a short investigation, Thompson was arrested and indicted by the Western District of Washington.

The CEO of Capital One, Richard Fairbank released the following statement:

“While I am grateful that the perpetrator has been caught, I am deeply sorry for what has happened. I sincerely apologize for the understandable worry this incident must be causing those affected and I am committed to making it right.”

For a full report of the event, visit: https://www.capitalone.com/facts2019/

Capital One has said that it will inform you if you have been a victim of this massive attack, but if like many of us, too much is at stake to wait for the company to reach out to you, you can take some immediate steps to safeguard your personal information.

  • Check your accounts - Account monitoring and fraud detection should be a major part of any action you take to secure personal information.
  • Change passwords - One great way to at least feel more secure after a major hack like this is to immediately change your passwords.
  • Freeze your credit report - One option you can take to protect yourself is to freeze your credit report, this won’t let any credit reporting services check your credit, meaning if someone were to try to take money out in your name that the banks wouldn’t be able to authorize credit.
  • Avoid scams - A big part of keeping any data secure is to not give unauthorized parties access to it. That means avoiding phishing attacks and other scams.
  • Continued vigilance - Vigilance over your account information, your personally identifiable information, and your overall financial health is more important than ever. As mentioned above, credit monitoring and fraud detection services give users tools to combat unauthorized access.

Keeping yourself and your business secure online is more difficult than ever. To learn more about data security, subscribe to our blog.

Improve Your Business’ Communication with VoIP
Alert: Microsoft is Retiring Two Major Operating S...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, September 16 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data Backup Hosted Solutions Network Security IT Support Data Privacy Cloud Software Data Recovery Outsourced IT IT Services Internet Email Malware Tech Term Managed IT Services Business Computer User Tips Innovation Hackers Windows 10 Cloud Computing Business Management Small Business Microsoft Efficiency Ransomware Collaboration Paperless Office Upgrade Hardware Mobile Devices Android Phishing Google VoIp Encryption Remote Monitoring Server Business Continuity Managed Service Managed Service Provider Workplace Tips Communication Communications Managed IT Artificial Intelligence Office 365 Vulnerability Backup Smartphones Save Money Document Management Quick Tips Healthcare Internet of Things Managed IT services Cybersecurity Passwords Browser Applications Data Management Business Technology Holiday Laptops Saving Money Wi-Fi Help Desk Government Bandwidth Mobile Device Automation Microsoft Office Tip of the week Compliance Blockchain BDR Smartphone Processor Employer-Employee Relationship Project Management Information Antivirus Disaster Recovery Scam Windows 7 BYOD Website Access Control Windows Data Security Vendor Management Infrastructure IT Management Avoiding Downtime RMM Customer Relationship Management Chrome Two-factor Authentication Router Social Media VPN Analytics Remote Monitoring and Management Financial Machine Learning Networking Operating System Training Mobile Security Professional Services Employees Unified Communications Unified Threat Management Recycling Downtime Files Virtual Private Network Mobility The Internet of Things Company Culture Gmail Risk Management Cooperation Server Management Network Word Remote Workers Software as a Service Net Neutrality Regulations Patch Management IoT Assessment Management Tablet File Sharing Internet Exlporer Users Data Loss Dark Web Network Management Proactive Consultation Smart Technology Alert Storage Monitoring Redundancy Maintenance HIPAA Facebook Bring Your Own Device Authorization Teamwork Information Technology Identity Outlook Disaster Resistance Features Firewall Time Management Cybercrime Screen Reader Emergency Multi-Factor Security Return on Investment Remote Computing Comparison Licensing Heating/Cooling Options Modem High-Speed Internet Printer Politics Tech Support Search How To Test Technology Tips OneDrive Managed Services G Suite Unified Threat Management Office Private Cloud Data Warehousing Flexibility Trending WPA3 Legislation Shared resources Going Green Mobile Shortcut Proactive IT Electronic Health Records Procurement Distributed Denial of Service Statistics Database Management Smart Tech Settings Personal Information Consulting Specifications Servers 5G Development Instant Messaging Virtual Assistant Bitcoin IT Technicians Cost Management Lenovo Employee-Employer Relationship Digital Payment Hotspot Manufacturing Vendor Motherboard Chromebook Bookmarks ROI Operations Samsung Fleet Tracking Zero-Day Threat Recovery Virtualization Batteries IT Consulting Cyberattacks Social Managed IT Service Bluetooth GDPR Connectivity Customer Service Transportation Active Directory Migration eWaste Managed Services Provider Mobile Device Management Black Friday Wireless Internet Cookies Cables SharePoint Wasting Time Current Events Superfish Wireless Mouse Language Password Vulnerabilities Mail Merge User Error Favorites Apps Money Asset Tracking Backup and Disaster Recovery Gadgets CIO applications Remote Work Managing Stress Data Breach Read Only Security Cameras Break Fix MSP Finance Permissions Windows Server Chatbots Point of Sale Tech Terms Cyber Monday Staff Websites Employer/Employee Relationships Nanotechnology Wires Downloads Database Miscellaneous Mirgation Hard Drive Computing Infrastructure Hard Disk Drives Mobile Computing Address WiFi Conferencing Microsoft Excel Star Wars Human Error File Management Spam Enterprise Content Management Printing Augmented Reality Notes Wearable Technology Authentication Google Calendar Fraud User Management Identity Theft Enterprise Resource Planning Techology E-Commerce Theft SaaS Proactive Maintenance App Voice over Internet Protocol Projects Cache Electronic Medical Records Computing Alerts Solid State Drives Geography Meetings Utility Computing OneNote Permission Travel Value of Managed Services Social Networking Technology Laws Remote Worker Virtual Reality Touchscreen Hacking PowerPoint Display Regulation Twitter Marketing Smart Devices Education Sensors CEO Printers Students Daniel Stevens

Latest Blog

Managed services offer businesses an improved means of obtaining and managing the technology they rely on. With data being so important to the modern business, much of this technology is devoted to storing, securing, and leveraging this data. Working with a managed service p...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...