Monday, September 28, 07:54
Home security Data breaches: who is really responsible for them?

Data breaches: who is really responsible for them?


After multiple data breaches that have been observed from time to time, experts have come to the conclusion that the problem in our time is not just itself theft of data, but mainly how we treat the news ourselves digital time.

Especially in terms of social security numbers, in our lifetimes we share them with credit organizations, credit card companies, car rental companies, colleges and universities.

Federal rules require citizens to provide their insurance numbers only to certain government agencies, as well as to employers and in some cases to financial institutions.

However, if those numbers fall into their hands malicious agents, could be used for a series of illegal actions so that the real number holder can find his trouble.

According to Rich Mogull, Managing Director of Securosis, more and more credit monitoring agencies, utilities and credit card sellers have begun to use social security numbers as identifiers to track their customers, putting their data at risk. .

The problem even led a Quebec resident, Pierre Langlois, to launch an online protest, asking Ottawa to replace his social security numbers.

Motivated by the Desjardins Group breach, which resulted in theft of nearly 2,9 million members - including their social security numbers, names and addresses - Langlois filed a second request urging the government to propose a "swift solution". to this security problem. "

The solution, according to Mogull, lies in local transactions or encryption Save of security numbers, which would make data theft more difficult.

The encryption keys include a long series of random numbers that can be used to unlock personal data, but Greg Wolfond, chief executive of SecureKey Technologies in Toronto, wonders whether this is the answer to the problem.

“I'm afraid that hackers will still be able to steal this data and use AI technology and combine it in clever ways to try to pretend it's someone else to take out a loan or deposit a fake money back, ”Wolfond said. .

On the contrary, Wolfond advocates something called real-time verification as the most effective way to avoid such incidents.

The product of his company, called Verified.Me, allows customers to provide proof of their identity using information already provided by their financial institutions. The Verified.Me application connects with participating financial institutions and removes many of the steps currently required to verify a person's identity.

In the long run, this approach could include applying for a mortgage, renting apartments or obtaining a driving license, Wolfond said.

In the last three years, millions of consumers have been affected by attacks on a number of companies, including the website Ashley Madison, as well as her British Airways, Uber, Deloitte and Walmart.

TransUnion revealed on Wednesday that 37.000 Canada's personal information may have been compromised last summer.

Equifax announced to 2017 that a massive data breach leaked the personal information and credit card details of 143 million Americans and approximately 19.000 Canadians.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement


How to perform actions by tapping on the back of your Android phone

Gestures and shortcuts allow you to quickly access things without having to go through apps and menus. What's up...

iOS 14: The long-awaited new features!

The annual Apple iPhone update, iOS 14, is here, and in addition to the new privacy and security features there are many more.

Business - COVID-19: Storage in the cloud VS data centers!

The COVID-19 pandemic has changed the data for companies worldwide, with the result that they have to change both ...

How to use the Apple Translate App on your iPhone?

Apple's Translate app, introduced in iOS 14, allows iPhone users to do ...

How to turn off private Wi-Fi MAC addresses

Apple has changed the way the iPhone and iPad connect to Wi-Fi networks starting with the iOS 14 and iPadOS 14 updates ....

Mac: See how to rename multiple files at once!

Many people have more difficulty renaming files on a Mac than renaming Windows. The Finder of ...

How can you control the performance of your Chromebook?

Many times users wonder about the performance of their computer and would like to be able to take a look at the system ...

How To Detect Hidden Surveillance Cameras With Your Phone

During our holidays or on business trips, we are forced to stay in hotels or Airbnb ....

How to play the hidden game of Android 11

Google usually includes the so-called "Easter Eggs" in every new version of Android that is released. And Android 11 is not ...

Ring: Amazon's new device is a drone with a security camera

Amazon is ready to launch a new Ring security camera mounted on top of a flying drone.