• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

The life of stolen data

September 30, 2014 by Secure360 and UMSA

texelart / 123RF Stock Photo

texelart / 123RF Stock Photo

The worst has happened: your customer, company or personal sensitive data has been compromised. If you’re lucky, the breach was caught early and banks or credit card services have been notified. If not, the stolen data is going for a joyride – at your expense. But, what actually happens to the life of stolen data?

Buy in bulk

The theory of purchasing bulk goods to save time and money isn’t limited to items found at popular retailers such as Sam’s Club or Costco. Criminals purchase your stolen data (e.g. credit card or social security numbers, physical mailing addresses or medical history information) in bulk as well. The odds are in their favor to purchase large quantities in the hopes that a handful to a few hundred pieces of data will be valid.

Testing: 1,2,3

Once stolen data has been initially sold, the buyer can then determine to resell or try and use the information. However, these criminals are savvy. Instead of partaking in a mass-shopping spree, criminals like to test the waters in a process called “carding.” Criminals use your stolen data (such as credit card numbers) to make small purchases and then wait. If the transaction raises no suspicion, the data is considered valid. And, in some cases sold to a new set of criminals.

However, as if learning your personal and sensitive data has been stolen isn’t bad enough, the more information criminals have the worse your life could become. For example, if a criminal knows your address and stores you frequent, they can freely make continuous fraudulent charges.

Protect your data

Protect yourself against data breaches by increasing your information security efforts. Monitor your company, customer or personal accounts daily. Make note of any inconsistencies and be sure to follow-up on any suspicious activity. Use encryption, create strong passwords and change them frequently. If a breach does occur, notify all impacted parties immediately to try and contain the damage. Freeze accounts, request new credit card numbers and, if offered, participate in any free credit monitoring services, as an added precaution.

In order to protect your sensitive data, diligence in information security is required. Yes, attacks do happen, but implement roadblocks in order to protect your data at all costs. It’s your lifeline. After all, it’s better to be safe than sorry.

What precautions do you take in order to protect your sensitive data?

Filed Under: Cybersecurity

About Secure360 and UMSA

The Secure360 and UMSA team is made up of professionals in the security and risk management industries. Topics of expertise range from physical security, IT, risk management, cybersecurity, cloud, information security and records management.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Categories

  • Uncategorized
  • Guest Posts
  • Business Continuity Management
  • News and Events
  • Physical Security
  • Cybersecurity
  • Professional Development
  • Risk and Compliance

latest tweets

  1. Secure360 Conference
    Secure360 Conference: Spots are filling fast & you don't want to miss these benefits! Register as a #Secure360 sponsor to show off the la… https://t.co/aqNcbZ25Ek
    about 2 days ago

  2. Secure360 Conference
    Secure360 Conference: Really interesting read from our Diamond #sponsor, @Cisco! Learn how to build #resiliency through a year of change https://t.co/GTWe6a0W3A
    about 2 days ago

  3. Secure360 Conference
    Secure360 Conference: We are partnering with @cioreview for #Sec360 coming up on May 11-12, 2021. #CIOReview is a technology magazine tha… https://t.co/RD0vKU5Vrn
    about 3 days ago

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2021 Secure360. All rights reserved.