16790 Centre Ct. Parker, CO 80134     Tel 303-840-8484     Fax 303-840-6150 
Hours of Operation:  Lobby Mon - Fri 9am to 5pm     Drive Through Mon - Fri 8am to 5pm

January 2016 Newsletter

1/1/16 10:00 AM / by Thomas F. Duffy, Chair, MS-ISAC

Thomas F. Duffy, Chair, MS-ISAC

The Hidden Costs of a Data Breach

From the Desk of Thomas F. Duffy, Chair, MS-ISAC

A data breach is the intentional or unintentional release of information into an untrusted environment. Occasionally the release is accidental, but sometimes malicious actors specifically target retail stores, healthcare companies, or government agencies for the express purpose of gaining access to protected information, which they can use for financial gain. Sometimes they post the information they steal on the Internet or sell it in the cyber underground. Credit card numbers and personally identifiable information (PII) are prominent targets in these thefts, but malicious actors also want access to protected health information (PHI), online accounts, and information that can be used in tax and other fraud.

Identity Theft and Identity Fraud

Data breaches commonly lead to identity theft and identity fraud because malicious actors can gain easy access to large amounts of data, including names, addresses, dates of birth, and Social Security Numbers. This data allows the malicious actors to open bank accounts, credit cards, and other lines of credit in the victim's name.

According to the Department of Justice, identity theft and identity fraud are crimes in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception.

Tax Fraud

A variation of identity fraud occurs when the victim's information is used to file fraudulent tax forms. Some variants of tax fraud occur when fraudulent tax returns are filed in the victim's name while other variants occur when the malicious actors call the victim and pretend to be Internal Revenue Service (IRS) agents. In the first instance, the information from a data breach is used to fill out the tax forms, and in the second instance, the information is used to convince the victim that the malicious actor works for the IRS and has access to the victim's tax forms.

Medical Fraud

While more rare, medical identity theft is a growing concern because malicious actors use the victim's PHI to gain fraudulent access to medical care, surgery, and prescription drugs to perpetrate additional fraud or resell on the black market.

Online Account Access

According to a TrendMicro report,1 access into online accounts are in many cases more valuable than other identifying information, and can cost $1-15 per account. This is because malicious actors can use stolen accounts to gain access to additional information, as well as the services those accounts offer, such as additional purchases and streaming videos or music. For this reason, data breaches exposing online account information are increasingly common.

Telephone Scams

Scammers who operate over the telephone often use information obtained from other sources, including data breaches, to sound more authoritative. A recent variation on the Tech Support Call Scam involves just this type of activity with the callers using information from a data breach to help them pretend to be from a company that the victim had contacted for support.

Recommendations

If you believe you are the victim of identity theft or fraud, there are a couple of steps you should take:

Further Information

1. TrendMicro. North American Underground: The Glass Tank. http://www.trendmicro.com/cloudcontent/us/pdfs/security-intelligence/white-papers/wp-north-american-underground.pdf

Provided By:

 

logo1.png  logo2.png

 

The information provided in the Monthly Security Tips Newsletter is intended to increase the security awareness of an organization's end users and to help them behave in a more secure manner within their work environment. While some of the tips may relate to maintaining a home computer, the increased awareness is intended to help improve the organization's overall cyber security posture. This is especially critical if employees access their work network from their home computer. Organizations have permission and are encouraged to brand and redistribute this newsletter in whole for educational, non-commercial purposes. Disclaimer: These links are provided because they have information that may be useful. The Center for Internet Security (CIS) does not warrant the accuracy of any information contained in the links and neither endorses nor intends to promote the advertising of the resources listed herein. The opinions and statements contained in such resources are those of the author(s) and do not necessarily represent the opinions of CIS.

Topics: Newsletter

Subscribe to Email Updates

Archives

The Champion Bank


You are now being directed to an external site
Ok