{"id":1262,"date":"2013-03-01T10:01:04","date_gmt":"2013-03-01T15:01:04","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=1262"},"modified":"2020-02-26T18:56:12","modified_gmt":"2020-02-26T14:56:12","slug":"data-breach-letters-affected-by-identity-theft","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/data-breach-letters-affected-by-identity-theft\/1262\/","title":{"rendered":"One in Four That Receive Data Breach Letters Affected by Identity Theft"},"content":{"rendered":"<p>The number of those affected by identity theft is on the rise again according to recent research. A quarter of consumers that received data breach letters last year wound up becoming a victim of <a href=\"https:\/\/threatpost.com\/en_us\/blogs\/study-shows-one-four-who-receive-data-breach-letter-become-fraud-victims-022013\" target=\"_blank\" rel=\"noopener nofollow\">identity fraud<\/a>. That boils down to about 12.6 million people \u2013 up a million people from the year before.<\/p>\n<p>The news comes as part of an annual study performed by California-based Javelin Strategy and Research. Jim Van Dyke, the company\u2019s CEO, insists the study shows that consumers should take data breach notification letters more seriously and better protect their personal information.<\/p>\n<p>\u201cThis underscores the need for consumers to take all notifications seriously. Not all breaches are created equal,\u201d Van Dyke wrote in a statement on the research.<\/p>\n<p>The study notes that $21 billion was stolen in 2012 from those almost 13 million consumers, higher than any amount in the last three years.<\/p>\n<p>The report goes on to highlight the importance of safeguarding information other than just your credit card number. Last year 10 percent of incidents involved consumers\u2019 online banking login, username and password while 16 percent of incidents involved consumers\u2019 Social Security numbers.<\/p>\n<div class=\"pullquote\">Last year 10 percent of incidents involved consumers\u2019 online banking login, username and password while 16 percent of incidents involved consumers\u2019 Social Security numbers.<\/div>\n<p>Identity theft and <a href=\"https:\/\/me-en.kaspersky.com\/blog\/if-cybercrime-is-so-easy-why-arent-there-more-cyberciminals\/\" target=\"_blank\" rel=\"noopener\">cybercrime<\/a> are major problems for consumers, and while they\u2019re often the ones who suffer the most from data breaches, sometimes there\u2019s only so much consumers can do. Corporations, state agencies, and those responsible for handling customers\u2019 personal information are routinely found failing to properly protect it. The <a href=\"https:\/\/threatpost.com\/en_us\/blogs\/36-million-south-carolina-taxpayers-risk-id-theft-102612\" target=\"_blank\" rel=\"noopener nofollow\">data breach in South Carolina<\/a> that made headlines last fall stemmed from the state\u2019s Department of Revenue accidentally leaking 3.6 million Social Security numbers and credit card numbers. Only 16,000 of the 387,000 credit card numbers were encrypted however, which maximized the attack and led the state down a long line of data privacy reform, employee training and attack analysis.<\/p>\n<p>What you can do if you receive a letter:<\/p>\n<ul>\n<li>Pay close attention to any data breach notification letter you receive. Do not assume that the company notifying you about the breach will watch your account.<\/li>\n<li>Take advantage of any credit-monitoring services offered by the company.<\/li>\n<li>Change any pertinent information in the affected account and then watch any credit or other accounts attached to the affected service for unusual activity.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The number of those affected by identity theft is on the rise again according to recent research. A quarter of consumers that received data breach letters last year wound up<\/p>\n","protected":false},"author":32,"featured_media":1263,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[314,246,315],"class_list":{"0":"post-1262","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-data-breach","9":"tag-data-theft","10":"tag-identity-theft"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/data-breach-letters-affected-by-identity-theft\/1262\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/data-breach-letters-affected-by-identity-theft\/1262\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/data-breach-letters-affected-by-identity-theft\/1262\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/data-breach-letters-affected-by-identity-theft\/1262\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/data-breach-letters-affected-by-identity-theft\/1262\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/data-breach-letters-affected-by-identity-theft\/1262\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/data-breach-letters-affected-by-identity-theft\/1262\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/data-breach\/","name":"data breach"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1262"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1262\/revisions"}],"predecessor-version":[{"id":15482,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1262\/revisions\/15482"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/1263"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}