• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Cyber Security Solutions, Compliance, and Consulting Services - IT Security

We offer It security management, data, network, & Information security services for protecting information & mitigating security risks to your organization.

  • Home
  • About Us
  • Solutions & Services
    • Security Governance
    • NETWORK SECURITY
    • CLOUD SECURITY
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

The Top 5 Cyber Security Breaches of 2017

Avatar

By MD Shahabuddin | At March 19, 2018

March 19, 2018

The Top 5 Cyber Security Breaches of 2017

data securityCybersecurity breaches kept us on our toes in 2017

The year 2017 witnessed many of the massive cyber attacks launched against some of the largest companies. In the first six months of 2017, more than 1.9 billion data records were either stolen or lost, according to a study.

Majority of the cyber attacks were carried out by cybercriminals who exploited security loopholes in the data storage systems, weak cybersecurity defenses, and improper security settings. When we take a look at the biggest attacks, it becomes evident that the cybercriminals didn’t even use highly complex attack mechanisms. They simply used the common cybersecurity loopholes to execute their nefarious designs.

Here are the biggest cybersecurity breaches of 2017:

1. Equifax

Possibility the largest data security breach of 2017 happened when cybercriminals managed to steal the identity information and credit card data of more than 143 million customers of Equifax. The cause of the breach was said to be a fissure in open source software that the company used. The loophole let the attackers steal the sensitive information of the company’s customers.

2. Verizon

In July 2017, cybercriminals managed to expose the personal data of Verizon’s more than fourteen million customers. The attack happened because a third-party vendor of Verizon stored the data of the company’s customers on an insecure Amazon S3 server. The exposed data included names, PINs, contact information, and any other information stored on the server.

3. Uber

In 2016, Uber became the target of cybercriminals, but the company disclosed the news only in 2017. Uber said hackers managed to steal the personal data of about 57 million customers and drivers in Oct. 2016. So, what did Uber do then to neutralize the hackers? Well, the company paid them a ransom of $100,000 to destroy the stolen data. The stolen information included names, contact information, ride information, and other sensitive data.

4. RNC Contractor

The RNC had entered into an agreement with marketing firm Deep Root Analytics to reach out to 200 million voters. The marketing firm stored the data on an unprotected Amazon server. The database saved on the server was not correctly configured. As a result, a massive data breach happened. While the data belonged to the contractor, it severely affected RNC’s image.

5. Deloitte

Cybercriminals attacked Deloitte in 2017 by hacking into its global email server. The attack saw the hackers stealing the sensitive information of the company’s customers and key clients. Also, the attackers were able to access the company’s internal email communications. The criminals also managed to steal the usernames, passwords, and other sensitive data.

Filed Under: Cyber security news, General, Risk assessment and management

Primary Sidebar

Archives

  • [+]Cloud security (9)
  • [+]Compliance (16)
  • [—]Cyber security news (57)
    • 03 security concerns for low-code and no-code development
    • 04 ways to improve your security posture in 2020
    • 05 ways malware can bypass endpoint protection
    • 2020: The year that cybersecurity went from reactive to proactive
    • 3 Huge Cyberattacks Show the True Extent of Cyber Crime
    • 4 Cybersecurity trends in 2019
    • 4 Reasons why website security is important
    • 5 Methods to Make Customer Experience Safer
    • All About Data Repository
    • Attacker’s phish Office 365 users with fake voicemail messages
    • Changing Trends in Cybersecurity Training
    • Common types of cybersecurity threats
    • Coronavirus Used to Spread Malware
    • Cybercrime economy is worth $1.5 trillion in illegal profits: study
    • Cybersecurity challenges for small businesses
    • Cybersecurity in the Aviation Industry
    • Cybersecurity: Guiding Principles for Board of Directors
    • Everything You Need to Know About Brute Force Attacks
    • Five experimental cybersecurity trends your business needs to know about
    • Four major data breaches 2018
    • Four significant changes coming to cybersecurity in 2020 and beyond
    • Hackers are using famous file sharing services to hack email accounts
    • History of Cybersecurity and Hacking
    • Hostinger suffers from data breach and resets password for 14 million users
    • How AI can help you stay ahead of cybersecurity threats
    • How Cybersecurity Makes Journalism Safer
    • How does spyware work?
    • Measures taken by WhatsApp to avoid spam
    • One in three organizations suffered data breaches due to mobile devices
    • Predictions of Future Cybersecurity Trends in 2020 and Onwards
    • Protect backup from ransomware attacks and recover safely
    • Qbot Banking Malware is back with a new version
    • School Re-Openings Disturbed by Ransomware Attacks
    • The 4 biggest ransomware attacks of the last five years
    • The Post-COVID Situation for Small Business Cybersecurity
    • The rise of cryptojacking
    • The shortcomings of centralized server architecture
    • The Top 5 Cyber Security Breaches of 2017
    • Three trends shaking up multi-factor authentication
    • Top five cybersecurity predictions for 2019
    • Two in three businesses faced insider attacks in 2020
    • Two-factor authentication explained
    • Unsecure Server Compromises 350 Million Emails
    • US insurance company has customer data leaked on a forum
    • US-based auto parts distributor has sensitive data leaked by cybercriminals
    • Use of OSINT tools for security and their functions
    • What is Encryption and its common types
    • What is information security? Definition, principles, and policies
    • What is Magecart? How it works and how to prevent it?
    • What is Typosquatting and How to Stay Safe
    • Which Industries at Higher Risk of Cyber Attacks in 2021
    • Why 2021 Could Witness an Outbreak of Ransomware Attacks
    • Why Cybersecurity Has to Be a CEO Level Matter
    • Why Cybersecurity is the Answer for the Sharing Economy?
    • Why You Should be Concerned About How Phishing Attacks are Evolving
    • Will 5G improve mobile security?
    • World’s largest data breaches
  • [+]Cyber security threats (139)
  • [+]Cyber security tips (148)
  • [+]E-Commerce cyber security (3)
  • [+]Enterprise cyber security (3)
  • [+]Financial organizations cyber security (2)
  • [—]General (29)
    • 5 Industries That Top the Hit List of Cyber Criminals in 2017
    • 5 Misconceptions About Cyber-Security
    • Change Control Management and Information and Event Monitoring in Cyber Security
    • Common Types of Phishing Attacks
    • Ethical Hacking as Explained by White Hat Hackers
    • HIPAA Compliance for Businesses: The Three Crucial Aspects
    • How New Technologies Affect Cyber Security
    • How Security Updates Can Save You From Targeted Cyber Attacks
    • How to Alleviate Third Party Cyber Security Risks
    • How to Enhance Data Security With Encryption, Discovery, and Classification
    • How to Find the Best Cyber Security Consulting Company
    • How to Make an Incident Response Plan
    • How To Use DLP and FIP for Enhanced Data Protection
    • Identity and Access Management and Its Importance for Organizations
    • Newsletter: Law Firms and Cyber Ransom
    • Predictions for the Cybersecurity Landscape of 2018
    • Reasons Why Cloud Security is Critical to Your Organization
    • Reasons Why Data Safety Should be at the Core of Cloud Security
    • Reasons Why Law Firms Need Foolproof Cyber Security
    • Reliable Ways to Enhance Your System Security
    • The Top 5 Cyber Security Breaches of 2017
    • Things to Look for to Choose the Best Cybersecurity Service for Your Business
    • Tips to optimize your VPN security
    • Top Cybersecurity Myths Busted
    • Two Critical Components of Security Operations
    • What Is a Data Breach?
    • What is Ransomware and How to Prevent It
    • Why Cybersecurity Has to Be a CEO Level Matter
    • Why Should You Implement 3rd Party Vendor Assessment Program in Your Organization
  • [+]Government cyber security (2)
  • [+]Healthcare cyber security (2)
  • [+]Law Firms Cyber Security (1)
  • [+]Network security (3)
  • [+]Newsletter (1)
  • [+]Ransomware (4)
  • [—]Risk assessment and management (3)
    • HIPAA Compliance for Businesses: The Three Crucial Aspects
    • Reasons Why Cyber Security Assessments Are Important for Organizations
    • The Top 5 Cyber Security Breaches of 2017
  • [+]Security management and governance (7)
  • [+]System security (3)
  • [+]Uncategorized (15)
  • [+]Vendor security (4)

Footer

Infoguard Cyber Security

San Jose Office
333 W. Santa Clara Street
Suite 920
San Jose, CA 95113
Ph: (833) 899-8686

Irvine Office
19800 MacArthur Blvd.
Suite 300
Irvine, CA 92612

Recent Posts

  • Why 2021 Could Witness an Outbreak of Ransomware Attacks
  • Why You Should be Concerned About How Phishing Attacks are Evolving
  • 2020: The year that cybersecurity went from reactive to proactive

Get Social

  • LinkedIn
  • Home
  • About Us
  • Solutions & Services
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

Copyright © 2021