Page 4 - End of Year 16 Page Booklet QTY 50
P. 4

In order for this new tool to be the most efficient and effective, it needs to have meaningful data
             made available to analyze. We have done the work to build a tool that minimizes confusion and
             gives  actionable  plans  to  consumers  on  a  breach-by-breach  basis,  but  companies  need  to  be

             more  transparent and  granular  with  their  disclosures.   When  breach  notification  letters  simply

             list the compromised data as “Employee records”, “XXXX” or even just “Other” (these examples
             have been taken from actual notifications we reviewed this year), we cannot provide the affected
             consumers the action plans they need and deserve because we cannot assess what their true risk is.




             Data breaches are the new normal. We – all of the various stakeholders in this new era of data
             breaches – need to create tools that can be used and adopted easily by a large segment of the
             population.  To effect systemic change, it will require us all to come together to ensure victims have

             what they need to face this new status-quo.




                                            LESSONS LEARNED FROM 2018



             The variety of industries and types of businesses impacted by breaches in 2018 opened the
             eyes of many consumers to the fact that breaches have become “the new normal”. It’s

             not so much a matter of “if” a breach will happen, but “when” a breach will happen.


             Data  security  professionals  are  quickly  trying
             to  outpace  hackers  who  are  working  to

             access and monetize personally identifiable
             information, but the professionals are not

             always  successful.  Vulnerabilities  in software
             platforms and human error and susceptibility to

             increasingly  sophisticated phishing  scams  are
             exploited by individuals trying to steal information.


             As consumers, we need to protect our information

                                 when companies that house our

                                 data are the target of breaches.








                       © IDENTITY THEFT RESOURCE CENTER 2019  |  IDTHEFTCENTER.ORG
                         © IDENTITY THEFT RESOURCE CENTER 2019  |  IDTHEFTCENTER.ORG
   1   2   3   4   5   6   7   8   9