T-Mobile Data Breach Details Unravel, and It’s Not Pretty. Here’s What You Should Know
T-Mobile shares details about its recent data breach.
T-Mobile was hit by hackers, and it’s not pretty. It’s confirmed that data from over 48 million people was compromised, and the investigation is still ongoing. The majority of the stolen data includes full names, dates of birth, Social Security numbers, and driver’s license information.
While the news of the breach is alarming in its own right, what’s really eye-opening is that it turns out much of the compromised data belonged to those who weren’t even customers at all, but instead either former or prospective customers who had applied for credit with T-Mobile.
As the aftermath unravels, the fact that hackers were able to gain this data from non-customers begs the question: Why would T-Mobile need to store their sensitive data in the first place?
The need to practice data minimization.
Privacy advocates are frustrated and have reinforced the idea of data minimization for quite some time, which is simply an encouragement for companies to hold on to as little private data as possible.
Until privacy laws in America are mandated, everyone must do their part to protect their personal info and fight the battle against cybercriminals.
What can you do to protect yourself?
Cyberattacks are unpredictable but can happen to anyone. As a consumer, you must stay alert and skeptical too. Here are some things to do now to protect yourself:
- Change account passwords often. It’s always a good rule of thumb to create unique, long and complicated passwords that are different for each account. Username and password hacking is one of the most common methods hackers use to gain consumer info.
- If you don’t have to give out your data, don’t. Did you know companies or institutions don’t always need the data they ask for? If it’s not absolutely necessary that they have it, avoid doling it out.
- Always stay skeptical of emails or messages from unknown senders. When you get an urgent email request from a well-known company you have an account with, your first reaction may be to panic and do exactly what they ask. Investigate the email and the sender before you make any hasty decisions.
- Get the right cybersecurity protection. With today’s modern conveniences, having cyber protection isn’t just a “Nice-to-Have.” It’s necessary to have tools that scan and monitor your private date and notify you of any changes to your accounts, so you can act quickly to protect yourself.
And if you’re a small business owner and you think you’re not at risk for an attack, you’re wrong – small businesses are often prime targets. Here are some proactive steps to take to safeguard your business:
- Practice data minimization. Don’t keep sensitive data you don’t need.
- Educate your employees. All too often, hackers target employees of the company to gain access to secure resources. Encourage employees not to open attachments from unknown senders, investigate the email to verify the sender, and change their passwords often.
- Secure your data with the right protection tools. It’s not only important to have prevention tools, but also tools that alert you when weaknesses are found.
Your cybersecurity is critical. Take the right steps to protect it.
The T-Mobile data breach is just another example of how we need to level up, improve our cybersecurity, and take proactive steps to protect ourselves and our businesses, so you can have peace of mind knowing your private data is protected.
IDShield is a product of Pre-Paid Legal Services, Inc. d/b/a LegalShield (“LegalShield”). LegalShield provides access to identity theft protection and restoration services. For complete terms, coverage, and conditions, please see an identity theft plan. All Licensed Private Investigators are licensed in the state of Oklahoma. This is meant to provide general information and is not intended to provide legal advice, render an opinion, or provide any specific recommendations.