6 min read
Understanding the Dark Web
The dark web has changed in the past few years. As increasing numbers of cybercriminals use the dark web for exposure extortion sites that publish...
We've crafted solutions tailored to your firm
The world of insurance for law firms can be confusing, and difficult to navigate. We've created this glossary because these common insurance terms should be easy to understand.
5 min read
LMG Security : Oct 14, 2021 12:00:00 AM
This blog post is in partnership with LMG Security. With professional hackers and cybersecurity criminals posing a constant threat to law firms big and small, the reality is that your firm’s sensitive data will always be a target. The good news? This risk can be averted by a few simple and cost-effective security strategies which you’ll learn in this CLE Cybersecurity Academy presented in partnership with LMG Security.
Stolen secrets flood the modern world. Take, for example, one of the latest data breaches to make big waves: The attack on T-Mobile that allowed a 21-year-old cybercriminal to steal the personal data of more than 54 million customers, including names, birth dates, and Social Security numbers. Current customers weren’t the only ones at risk: many of the stolen records reportedly related to former or prospective customers.
The constant onslaught of data breaches is so exhausting that the term “breach fatigue” has emerged in recent years to describe the public’s growing sense of burnout. Unfortunately, the rising risk from breaches is still very real. Attackers often leverage stolen data to commit more crimes, by breaking into accounts, transferring funds, perpetrating fraud, and more. Often, data stolen from one organization is used to hack into another, as criminals target customer accounts across many platforms and vendors with access to many systems.
While the problem of data breaches can seem overwhelming, the good news is that there are steps every organization can take to reduce risk to your community, even after a breach. In this article, we’ll discuss how criminals use stolen data, and provide practical tips for reducing risk when—not if—sensitive information is leaked to the world.
How Criminals Leverage Stolen Data
According to the 2021 Verizon Data Breach Investigations Report, the vast majority of criminals — around 90% — are motivated by financial gain. Only a very small percentage of cybercriminals are focused on espionage or other motives. For example, recently a well-known cybercriminal gang, ShinyHunters, auctioned off a database which they claimed was stolen from AT&T. Supposedly, the database contained the personal information of roughly 70 million AT&T customers and was peddled at a starting price of $200,000. When AT&T denied that the data had come from them, ShinyHunters told BleepingComputer, “I don’t care if they don’t admit. I’m just selling.”
Let’s take a look at common types of stolen data and what criminals can do with it:
Tips to Reduce Risk to Your Community
Once confidential data is released, the genie can’t be put back in the bottle—the information is out. However, there are effective steps that your organization can take to minimize the impact of stolen data.
Fighting Fatigue
“Information wants to be free,” wrote writer Stewart Brand. Unfortunately, data breaches can have devastating consequences and perpetuate even more cybercrime. The good news is that by relying less on secrets, and more on strong security technologies, you can protect your organization and your community.
At LMG, our singular focus is on providing outstanding cybersecurity consulting, technical testing, training, and incident response services. Our team of recognized cybersecurity experts have been covered on the Today Show and NBC News, as well as quoted in the New York Times, Wall Street Journal, and many other publications. In addition to online cybersecurity training, LMG Security provides world-class cybersecurity services to a diverse client base located around the United States and internationally.
6 min read
The dark web has changed in the past few years. As increasing numbers of cybercriminals use the dark web for exposure extortion sites that publish...
5 min read
7 tips for protecting your community from attacks like the one on Colonial Pipeline By LMG Security The recent ransomware attack on the Colonial...
In today's connected world, mobile phones have become an integral part of our lives. They provide us with convenience, communication, and a wealth of...