{"id":12130,"date":"2019-01-24T10:14:12","date_gmt":"2019-01-24T18:14:12","guid":{"rendered":"https:\/\/www.hellotech.com\/?p=12130"},"modified":"2021-06-07T10:32:06","modified_gmt":"2021-06-07T17:32:06","slug":"a-year-of-data-breaches-in-review","status":"publish","type":"post","link":"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review","title":{"rendered":"A Year of Data Breaches in Review: What We&#039;ve Learned and What to Expect in 2019"},"content":{"rendered":"\n<p>2018 saw an unprecedented number of large scale hacks on companies that store our most personal data, and these data breaches threaten everyone&#8217;s finances, credit reputation, online reputation, and so much more. As we enter 2019, it&#8217;s important we look back at what was compromised, determine if there are any further individual security measures to take in the wake of these data breaches, and bolster ourselves against future cybersecurity threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-a-brief-history-of-data-breaches\">A Brief History of Data Breaches<\/h2>\n\n\n\n<p>Over the past decade, we\u2019ve seen a large number of Data Breaches take place, putting the personal information of millions at risk. According to a recent <a href=\"http:\/\/info.shapesecurity.com\/rs\/935-ZAM-778\/images\/Shape_Credential_Spill_Report_2018.pdf\">study from Shape Security<\/a>, 2.3 billion user credentials were obtained by hackers in 2017 alone. These breaches are not only a potentially life-altering event for the individuals affected, but they can also be rather costly for the businesses targeted.<\/p>\n\n\n\n<p>If proprietary data from your business is hacked, this can lead to a lot of expensive headaches. Anything you&#8217;re working on might fall into the wrong hands or into the hands of your competitors. If hackers get hold of customers&#8217; personal information, this will lead to a loss of trust. Some of your customers might even stop paying for your products or services. Needless to say, data breaches are big trouble and must be prevented.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-hacks-of-2018\">The Hacks of 2018<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><span data-src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/01\/aef1233bb672c731893d3ed101089301.png\" rel=\"lightbox\" data-fancybox><img decoding=\"async\" width=\"547\" height=\"363\" src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/01\/aef1233bb672c731893d3ed101089301.png\" alt=\"A Year of Data Breaches in Review: What We&#039;ve Learned and What to Expect in 2019\" class=\"wp-image-22873\" srcset=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/01\/aef1233bb672c731893d3ed101089301.png 547w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/01\/aef1233bb672c731893d3ed101089301-300x199.png 300w\" sizes=\"(max-width: 547px) 100vw, 547px\" \/><\/span><\/figure><\/div>\n\n\n\n<p>Though it\u2019s hard to predict when the next breach will be and whom it will target, one thing is certain: the internet is constantly evolving, and hackers are getting increasingly smarter. Looking back at 2018, we saw some remarkable and devastating data breaches. Below are 10 of the largest attacks over the past year:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-facebook-reported-september-2018\">Facebook (reported September 2018) <\/h3>\n\n\n\n<p>Nearly 50 million users logins were acquired, exposing their personal information and allowing their social media profiles to be used as a platform to further spread malware and spam. This was the most massive attack the social media company has faced in its 14-year history, but certainly not the first one. Facebook identified two primary bugs in their code, as well as some compounding factors, that were exploited by the hackers to obtain user login tokens. Once identified, Facebook resolved these flaws quickly; however, the hackers still got away with user information. So, if you haven&#8217;t changed your Facebook password since September 2018, you could still be at risk, and you should update your login credentials right away.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-ticketfly-reported-may-2018\">TicketFly (reported May 2018)<\/h3>\n\n\n\n<p>27 million accounts were breached in May of 2018. A hacker infiltrated TicketFly&#8217;s website accessing usernames, home addresses, email addresses, and phone numbers; however, according to TicketFly, no passwords nor payment\/financial information was stolen. The hacker initially breached the site and demanded bitcoin from TicketFly in exchange for &#8220;protection,&#8221; but TicketFly did not respond to the threat. The hacker, subsequently, disabled the website&#8217;s functionality and got away with the user information. TicketFly, eventually, regained control of the site and, as a precaution, forced all users to change their passwords. TicketFly has not released any information about how this hacker, self-identified as\u00a0IsHaKdZ, infiltrated their site. So, it&#8217;s possible we could see similar attacks in the future.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-myheritage-reported-june-2018\">MyHeritage (reported June 2018)<\/h3>\n\n\n\n<p>92 million user emails and hashed passwords were taken from the site.\u00a0MyHeritage\u2019s Information Security Team were alerted to the existence of a file, outside of the organization&#8217;s internal servers, with all of this sensitive user information. The team confirmed its authenticity but also confirmed that the accounts had not been accessed, most likely thanks to the passwords on the file being hashed\/encrypted. Since MyHeritage stores the personal DNA information &#8212; extremely private information &#8212; of its users on their site, this breach had the potential to be a lot worse &#8230; to be truly devastating. Luckily, all the hacker obtained was email address information. It is possible these email addresses will be sold to research companies and, in turn, advertisers, but there is no way to know exactly what a hacker will do with acquired personal information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-exactis-reported-june-2018\">Exactis (reported June 2018)<\/h3>\n\n\n\n<p>The marketing firm, Exactis, exposed the extremely personal information of 340 million people by storing it on a readily available public database, which a security researcher came across accidentally.<\/p>\n\n\n\n<p>The researcher notified the firm and then the public. According to Wired, the information goes into &#8220;minute detail for each individual listed, including phone numbers, home addresses, email addresses, and other highly personal characteristics,&#8221; ranging from &#8220;interests and habits to the number, age, and gender of the person&#8217;s children.&#8221;\u00a0While financial information was not included on the database, this extent of nonpublic personal information is exactly what a hacker needs to execute\u00a0impersonation or profiling schemes. After the researcher informed Exactis that this data was unsecured, they quietly removed the database. However, there is no way to know who or how many bad agents accessed the nearly 2 terabytes of information during the preceding months.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-british-airways-reported-september-2018\">British Airways (reported September 2018)<\/h3>\n\n\n\n<p>Between August and September, 565,000 travelers&#8217; financial information was compromised after a hacker group collected customers&#8217; credit card information from the airline&#8217;s website.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-marriott-reported-november-2018\">Marriott (reported November 2018)<\/h3>\n\n\n\n<p>This data breach persisted, unidentified, for over four years, during which time\u00a0hackers had access to the reservation systems of many Marriott hotel chains, exposing the private details of up to 500 million customers. This is, so far, one of the biggest and longest data breaches in history, and particularly troubling in light of the kind of data that was stolen. In addition to standard personal information, hackers were able to obtain\u00a0passport numbers, travel locations, as well as arrival and departure dates. Such data empowers hackers to pursue various criminal endeavors, including identity theft. If you have stayed at a Marriott hotel, or any Starwood hotel, in the last four years, it may be worth investing in a credit monitoring service or signing up for identity theft protection.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-quora-reported-december-2018\">Quora (reported December 2018)<\/h3>\n\n\n\n<p>100 million users&#8217; logins and passwords were stolen. It\u2019s likely that hackers were looking for this information in an attempt to further attack users that may repurpose the same login credentials on more sensitive sites, such as online banking.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-under-armour-s-myfitnesspal-reported-march-2018\">Under Armour\u2019s MyFitnessPal (reported March 2018)<\/h3>\n\n\n\n<p>150 million usernames, email addresses, and hashed passwords were compromised by an unauthorized account in March.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-hudson-s-bay-saks-fifth-avenue-and-lord-taylor-reported-april-2018\">Hudson\u2019s Bay (Saks Fifth Avenue and Lord &amp; Taylor) (reported April 2018)<\/h3>\n\n\n\n<p>it\u2019s estimated that millions have been compromised by this breach that took place from July 2017 until late March 2018. This breach compromised payment systems, thereby exposing customers&#8217; debit and credit cards.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-24-7-ai-reported-april-2018\">[24]7.ai (reported April 2018)<\/h3>\n\n\n\n<p>[24]7.ai provides customer support services to many large companies, and this data breach was a hack in[24]7.ai&#8217;s AI chat feature. They are contracted out by Delta Airlines, Sears, Kmart, and Best Buy, all of whom were affected. At Sear&#8217;s alone, upwards of 100,000 customers\u2019 credit card details were accessed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-common-internet-scams\">Common Internet Scams<\/h2>\n\n\n\n<p>The best way to prevent yourself from falling victim to a future data breach that could affect your personal and financial information is to educate yourself on the most common internet scams and protect your personal data against them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-phishing-emails\">Phishing Emails<\/h3>\n\n\n\n<p>This is one of the most common forms of data breaches. Phishing is a cybercrime that happens when hackers set themselves up to look like legitimate organizations, then target victims using email, telephone, or text message. Once they\u2019ve gained your trust, these hackers lure you, their victims, into revealing your personal data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-fake-websites\">Fake Websites<\/h3>\n\n\n\n<p>Cyber attackers will often set up a fake website that looks identical to the site you are used to visiting. The difference, however, is often in a single character changed in the URL. They are hoping that you will think you&#8217;re on a site you trust and perform your usual shopping behavior, thus, entering personal information, including your credit card, into their system.<\/p>\n\n\n\n<p>To avoid this scam, always double check the URL spelling, especially when arriving at a site through an advertisement or shared link instead of by typing in the URL yourself or navigating there via a bookmark. Also, look for a padlock symbol next to the site in the URL bar, which ensures you that you&#8217;re visiting a secure sockets layer (SSL) verified site.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-viruses-malware\">Viruses &amp; Malware<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><span data-src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/01\/bdebf882c71a48a1ac5c6ef0346b626a.png\" rel=\"lightbox\" data-fancybox><img decoding=\"async\" width=\"509\" height=\"383\" src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/01\/bdebf882c71a48a1ac5c6ef0346b626a.png\" alt=\"A Year of Data Breaches in Review: What We&#039;ve Learned and What to Expect in 2019\" class=\"wp-image-22874\" srcset=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/01\/bdebf882c71a48a1ac5c6ef0346b626a.png 509w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/01\/bdebf882c71a48a1ac5c6ef0346b626a-300x226.png 300w\" sizes=\"(max-width: 509px) 100vw, 509px\" \/><\/span><\/figure><\/div>\n\n\n\n<p><br>Data breaching is also perpetrated through viruses and malware. Hackers create viruses by developing software that can copy itself to a computer and then extract whatever information the hacker requires.<\/p>\n\n\n\n<p>Malware is similar, except it can disguise itself as a legitimate program or tool that you, the victim, believe you need to download in order to perform normal functions or desired actions on your computer or mobile device.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-keeping-information-safe-requires\">Keeping Information Safe Requires:<\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li><a href=\"https:\/\/www.hellotech.com\/wifi-security-alert-malware-already-breached-countless-routers\/\">A secure and private network\/internet connection<\/a><\/li><li>Digital hygiene and education- safety tips for <a href=\"https:\/\/us.norton.com\/internetsecurity-kids-safety-grade-school-cyber-security-kit-online-safety-101.html\">children<\/a>, <a href=\"https:\/\/us.norton.com\/internetsecurity-kids-safety-high-school-kit-more-independence-online.html\">teens<\/a>, and the <a href=\"https:\/\/us.norton.com\/internetsecurity-online-scams-protect-senior-citizens-with-Norton-and-LifeLock.html\">elderly<\/a> with different needs and privacy concerns<\/li><li>Selecting and installing <a href=\"https:\/\/us.norton.com\/internetsecurity-kids-safety-top-reasons-to-use-parental-controls.html\">parental control apps<\/a> and <a href=\"https:\/\/us.norton.com\/internetsecurity-how-to-how-to-choose-antivirus-software.html\">antivirus software<\/a><\/li><li><a href=\"https:\/\/www.hellotech.com\/2018-guide-to-strengthening-your-password\/\">A strong and highly secure password<\/a><\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-tips-for-users-of-new-devices\">3 Tips for Users of New Devices:<\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li><a href=\"https:\/\/www.hellotech.com\/plans\">Enroll in an unlimited support plan<\/a> that will cover both education and immediate support<\/li><li>Startup and secure new tech before gifting it to someone<\/li><li>Enable advanced security settings and protect new tech with unique passwords<\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"<p>2018 saw an unprecedented number of large scale hacks on companies that store our most personal data, and these data breaches threaten everyone&#8217;s finances, credit reputation, online reputation, and so much more. As we enter 2019, it&#8217;s important we look back at what was compromised, determine if there are any further individual security measures to take in the wake of these data breaches, and bolster ourselves against future cybersecurity threats. A Brief History of Data Breaches Over the past decade, [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":12180,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[17583,17587,17593],"tags":[],"class_list":["post-12130","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-featured","category-news","category-staying-safe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.10 (Yoast SEO v20.10) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Breaches 2018 Roundup and 2019 Safety Tips - The Plug - HelloTech<\/title>\n<meta name=\"description\" content=\"2018 saw many large scale hacks, compromising our most personal data. As we enter 2019, we need to consider security measures to bolster ourselves against cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Year of Data Breaches in Review: What We&#039;ve Learned and What to Expect in 2019 - The Plug - HelloTech\" \/>\n<meta property=\"og:description\" content=\"2018 saw an unprecedented number of large scale hacks on companies that store our most personal data, and these data breaches threaten everyone&#039;s\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review\" \/>\n<meta property=\"og:site_name\" content=\"The Plug - HelloTech\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/hellotech\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-24T18:14:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-07T17:32:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/01\/3f203712b979395fa9cb7f6246bcf9a5.png\" \/>\n\t<meta property=\"og:image:width\" content=\"779\" \/>\n\t<meta property=\"og:image:height\" content=\"438\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The Plug\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@HelloTech\" \/>\n<meta name=\"twitter:site\" content=\"@HelloTech\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review\"},\"author\":{\"name\":\"The Plug\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/efb62d6b62f82d1d7bbc8adf533c81e9\"},\"headline\":\"A Year of Data Breaches in Review: What We&#039;ve Learned and What to Expect in 2019\",\"datePublished\":\"2019-01-24T18:14:12+00:00\",\"dateModified\":\"2021-06-07T17:32:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review\"},\"wordCount\":1518,\"publisher\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/#organization\"},\"articleSection\":[\"Featured\",\"News\",\"Staying Safe\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review\",\"url\":\"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review\",\"name\":\"Data Breaches 2018 Roundup and 2019 Safety Tips - The Plug - HelloTech\",\"isPartOf\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/#website\"},\"datePublished\":\"2019-01-24T18:14:12+00:00\",\"dateModified\":\"2021-06-07T17:32:06+00:00\",\"description\":\"2018 saw many large scale hacks, compromising our most personal data. As we enter 2019, we need to consider security measures to bolster ourselves against cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hellotech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Year of Data Breaches in Review: What We&#039;ve Learned and What to Expect in 2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#website\",\"url\":\"https:\/\/www.hellotech.com\/blog\/\",\"name\":\"The Plug - HelloTech\",\"description\":\"Turn to The Plug for informative tech news that you can use. \",\"publisher\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hellotech.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#organization\",\"name\":\"HelloTech\",\"url\":\"https:\/\/www.hellotech.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2018\/11\/HT-logo-revised-final.png\",\"contentUrl\":\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2018\/11\/HT-logo-revised-final.png\",\"width\":1000,\"height\":174,\"caption\":\"HelloTech\"},\"image\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/hellotech\",\"https:\/\/twitter.com\/HelloTech\",\"http:\/\/www.instagram.com\/hello_tech\",\"https:\/\/www.youtube.com\/channel\/UCIR-fbAKRfVuAbciDr2z4nQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/efb62d6b62f82d1d7bbc8adf533c81e9\",\"name\":\"The Plug\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9194a713172b4cb4bf283598ab3b44332e60f248aca639a51e2c893cd79061a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9194a713172b4cb4bf283598ab3b44332e60f248aca639a51e2c893cd79061a?s=96&d=mm&r=g\",\"caption\":\"The Plug\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Breaches 2018 Roundup and 2019 Safety Tips - The Plug - HelloTech","description":"2018 saw many large scale hacks, compromising our most personal data. As we enter 2019, we need to consider security measures to bolster ourselves against cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review","og_locale":"en_US","og_type":"article","og_title":"A Year of Data Breaches in Review: What We&#039;ve Learned and What to Expect in 2019 - The Plug - HelloTech","og_description":"2018 saw an unprecedented number of large scale hacks on companies that store our most personal data, and these data breaches threaten everyone's","og_url":"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review","og_site_name":"The Plug - HelloTech","article_publisher":"http:\/\/www.facebook.com\/hellotech","article_published_time":"2019-01-24T18:14:12+00:00","article_modified_time":"2021-06-07T17:32:06+00:00","og_image":[{"width":779,"height":438,"url":"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/01\/3f203712b979395fa9cb7f6246bcf9a5.png","type":"image\/png"}],"author":"The Plug","twitter_card":"summary_large_image","twitter_creator":"@HelloTech","twitter_site":"@HelloTech","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review#article","isPartOf":{"@id":"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review"},"author":{"name":"The Plug","@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/efb62d6b62f82d1d7bbc8adf533c81e9"},"headline":"A Year of Data Breaches in Review: What We&#039;ve Learned and What to Expect in 2019","datePublished":"2019-01-24T18:14:12+00:00","dateModified":"2021-06-07T17:32:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review"},"wordCount":1518,"publisher":{"@id":"https:\/\/www.hellotech.com\/blog\/#organization"},"articleSection":["Featured","News","Staying Safe"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review","url":"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review","name":"Data Breaches 2018 Roundup and 2019 Safety Tips - The Plug - HelloTech","isPartOf":{"@id":"https:\/\/www.hellotech.com\/blog\/#website"},"datePublished":"2019-01-24T18:14:12+00:00","dateModified":"2021-06-07T17:32:06+00:00","description":"2018 saw many large scale hacks, compromising our most personal data. As we enter 2019, we need to consider security measures to bolster ourselves against cyber threats.","breadcrumb":{"@id":"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.hellotech.com\/blog\/a-year-of-data-breaches-in-review#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hellotech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Year of Data Breaches in Review: What We&#039;ve Learned and What to Expect in 2019"}]},{"@type":"WebSite","@id":"https:\/\/www.hellotech.com\/blog\/#website","url":"https:\/\/www.hellotech.com\/blog\/","name":"The Plug - HelloTech","description":"Turn to The Plug for informative tech news that you can use. ","publisher":{"@id":"https:\/\/www.hellotech.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hellotech.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hellotech.com\/blog\/#organization","name":"HelloTech","url":"https:\/\/www.hellotech.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2018\/11\/HT-logo-revised-final.png","contentUrl":"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2018\/11\/HT-logo-revised-final.png","width":1000,"height":174,"caption":"HelloTech"},"image":{"@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/hellotech","https:\/\/twitter.com\/HelloTech","http:\/\/www.instagram.com\/hello_tech","https:\/\/www.youtube.com\/channel\/UCIR-fbAKRfVuAbciDr2z4nQ"]},{"@type":"Person","@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/efb62d6b62f82d1d7bbc8adf533c81e9","name":"The Plug","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e9194a713172b4cb4bf283598ab3b44332e60f248aca639a51e2c893cd79061a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9194a713172b4cb4bf283598ab3b44332e60f248aca639a51e2c893cd79061a?s=96&d=mm&r=g","caption":"The Plug"}}]}},"_links":{"self":[{"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/posts\/12130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/comments?post=12130"}],"version-history":[{"count":0,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/posts\/12130\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/media\/12180"}],"wp:attachment":[{"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/media?parent=12130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/categories?post=12130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/tags?post=12130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}