By Quentin Fottrell
When hackers break into social networking sites, medical records databases or entertainment companies, experts say it’s consumers who often end up paying the price.
Systems such as Sony’s gaming network, which was breached this year, have become increasingly attractive for cyber criminals, especially now that video gaming accounts contain such valuable personal details, says Adam Levin, chairman and founder of Identity Theft 911, an identity and data risk management company. “The Sony breach last April merely underscores something obvious: Gaming networks and similar sites are delicious targets.”
Breaches cost organizations millions of dollars, which tends to trickle down to consumers, says Evan Brown, an associate in law firm Hinshaw & Culbertson. “It is inevitable that the costs will be passed on,” he says. Apart from investigative costs, he says, many companies that are the target or victim of a data breach offer credit monitoring services to affected individuals.
The number of personal files being compromised is also on the rise, though the amount of actual cyber crimes this year is lower than last year. Some 30.4 million records were compromised in 2011 in 535 separate breaches, according to the Privacy Rights Clearinghouse. That’s up from 12.3 million in 2010.
Not all breaches involved sophisticated hackers. Those at Sutter Physicians Services in October and military healthcare program Tricare Management Activity in September were the result of the theft of hardware and software, respectively. They underscore the importance of not forgetting the low-tech protections like encrypting files and not leaving back-up disks unattended, Brown says.
Others didn’t involve social security numbers, but did have implications for password security. “Capturing a customer list containing thousands of email/password combinations represents a potential threat to online bank accounts and other web-based services,” says Steve Fox, senior security auditor at IT security business Coalfire.
Pay Dirt asked a range of security experts for the worst breaches of the year. Here they are in no particular order:
1. Epsilon: Major U.S. brands apologized to customers
This was a big one for many reasons – mainly because it involved a data hosting company and involved many of the biggest American brands, which were forced to send out apologetic emails to their customers. Some 50-60 million email addresses were breached at the Dallas, Texas.-based Epsilon, whose clients include Citibank, Tivo and JP Morgan Chase. (Epsilon did not respond to requests for comment.) Levin says lost emails make people vulnerable to “spear phishing,” which occurs when a criminal sends an email that sounds and looks like it’s from a company to the customer.
2. Sony: Victim of a massive coordinated cyber attack
For seven long days in April, Sony blocked users from playing online games and accessing Netflix and Hulu after hackers compromised over 100 million records, including 12 million unencrypted-credit card numbers. It impacted the PlayStation Network, Sony Online Entertainment and its “Qriocity” music service. Beth Givens, director and founder of the non-profit consumer advocacy group, Privacy Rights Clearinghouse in San Diego, Ca., says, “The Sony breach highlights the importance of password hygiene,” which means changing them regularly and not using the same password for different accounts. (Sony did not respond to requests for comment.)
3. Tricare: Computer backup tapes stolen from a car
Not all data breaches employ complex cyber attacks. In San Antonio, Texas, last September, backup computer tapes were stolen from a car of an employee of Science Applications International Corp., or SAIC, a defense contractor for Tricare. It included files with the social security numbers, addresses, phone numbers, and other medical information of patients. Austin Camacho, a spokesman for Tricare says SAIC has the task of transporting backup tapes between federal facilities. Approximately 4.9 million patients treated at military hospitals and clinics during the last 20 years may have been affected, he says.
4. Sutter: Desktop computer was stolen from building
It didn’t take an evil Internet genius to compromise patient records at Sutter. This data breach started with the theft in October of a company desktop from their offices in Sacramento, Calif. Some 3.3 million patients had their names, addresses, dates of birth, phone numbers, email addresses, medical record numbers and health insurance plan names exposed. Another 943,000 Sutter Medical Foundation patients had descriptions of medical diagnoses exposed, too. Sutter said in a statement that the computer did not contain patient financial records, social security numbers, patients’ health plan identification numbers or medical records.
5. Texas Comptroller: Files were publicly accessible
The names, addresses and social security numbers – plus, in some cases the driver licenses and dates of birth — of 3.5million people were inadvertently left on a “publicly accessible” state computer server by the Texas Comptroller’s Office for a year or longer. “This breach is particularly significant because individuals generally do not have a choice when providing personal information to a government agency,” Givens says. R.J. DeSilva, a spokesman for the Texas Comptroller’s Office, says it “immediately” implemented new policies and procedures to help prevent future security incidents.