Breach Guide

Learn the steps to take in the event of a data breach and stay current on the cyber threat landscape with the FTC’s Data Breach Resources, FBI’s Daily Digest Library and San Diego’s Cyber Incident Response Guide.

Federal Trade Commission (FTC) Data Breach Resources

Find out the steps to take as a business or consumer if you experience a data breach.

ftc-gov

FBI Cyber Daily Digest Library

Stay current on the global threat landscape with the FBI’s daily circulation of published data breaches and articles.

  • What the WHO Attack Teaches Us About Redefining Risk
    • As governments, organizations and individuals around the world grapple with unprecedented and rapidly evolving circumstances, opportunistic cyber attackers are making moves.
    • Experts believe the WHO attack was orchestrated by a sophisticated nation-state group with the goal of harvesting credentials used by WHO employees to access critical systems and applications.

      Security Boulevard - Jessica Sirkin | March 31, 2020
  • Marriott says 5.2 million guest records were stolen in another data breach
    • Marriott has confirmed a second data breach in three years — this time involving the personal information on 5.2 million guests.
    • Marriott said it has 'no reason' to believe payment data was stolen, but warned that names, addresses, phone numbers, loyalty member data, dates of birth and other travel information — such as linked airline loyalty numbers and room preferences — were taken in the breach.

      TechCrunch - Zack Whittaker | March 31, 2020
  • Cyber Attacks against Hospitals and the COVID-19 Pandemic: How Strong are International Law Protections?
    • A major hospital in Brno, the Czech Republic's second-biggest city, was hit by a cyber attack on March 13.
    • In a situation where most, if not all of us are potential patients, few government-provided services are more important than the efficient delivery of health care.
    • It is essential that all of these facilities can function without interruption and that they have sufficient resources as they scale up their operations due to the unfolding crisis.

      Just Security - Kubo Mačák, Laurent Gisel and Tilman Rodenhäuser | March 27, 2020
  • Hackers target mobile users in Italy and Spain, taking advantage of coronavirus hot spots
    • Coronavirus-themed scams show no signs of letting up as hackers have tried to breach mobile phone users in Italy and Spain, the two countries with the most deaths from the virus.
    • Attackers laced mobile apps with malware to try to steal data from, or otherwise compromise, Italian and Spanish residents looking for updates on the pandemic...
    • The malicious activity is part of a broader surge in COVID-19-related fraud and phishing in recent weeks.
    • Some are using attention on the Johns Hopkins COVID-19 map to distribute malware.

      Cyber Scoop - Sean Lyngaas | March 26, 2020
  • Hack the vote: terrifying film shows how vulnerable US elections are
    • Even as much of America grinds to a halt, coronavirus has yet to derail the date of the 2020 election.
    • The process of voting in the United States is idiosyncratic and often chaotic, but no matter how each polling station is managed, the vast majority rely on electronic machines produced by three companies with removable hardware such as USB flash drives or memory cards.

      The Guardian - Adrian Horton | March 26, 2020
  • Shelby still recovering from cyber attack
    • The city of Shelby is still recovering from a cyber attack that shut down many city systems.
    • The city has had systems in place to prevent or protect from attacks for some time, and still found itself falling victim to an attack.

      ShelbyStar.com - Dustin George | March 26, 2020
  • Half of firms have spotted a cyberattack - and here is the most common one you will face
    • The larger the organisation, the more likely it is that they will have identified a data breach or cyberattack – partly because they're going to be viewed as a more valuable target for cyber criminals and partly because they're more likely to have the finances and resources to implement a cybersecurity programme that helps them spot intrusions.
    • A total of 86% of businesses said they've identified phishing emails, demonstrating how phishing is still very much the top means of attack for hackers – and the number of detected phishing attacks is higher than ever before.

      ZDNet - Danny Palmer | March 26, 2020
  • Your Social Security Number Costs $4 On The Dark Web, New Report Finds
    • Social Security Numbers, despite being widely regarded as outdated and insecure, particularly in the wake of the 2018 Equifax hack, are still used as the primary means of identity verification.
    • As with Equifax, cyberattacks are often targeted at sites that will yield millions of SSNs at a time, allowing cybercriminals to steal 'in bulk.'

      Forbes - Jesse Damiani | March 25, 2020
  • Coronavirus pandemic creates 'perfect storm' for cybercriminals to exploit people working from home: Experts
    • As the country grapples with the burgeoning coronavirus pandemic, cybersecurity experts are warning that employees working from home are increasingly being targeted by aggressive cybercriminals trying to capitalize on their unfamiliarity with remote work.
    • According to Diana Burley, a cybersecurity professor at George Washington University, employees working from home simply don't have the same protections they had while working in an office.

      ABC News - Megan Christie | March 24, 2020
  • The Rise Of The Chief Cybercrime Officer
    • The TalkTalk data breach in 2015 was monumental for the cyber security industry.
    • At the time, data breaches were hardly new, but this particular breach resulted in UK MPs recommending that an officer should be appointed with day-to-day responsibility for protecting computer systems from cyber attack.
    • This governmental guidance was not a consequence of the size of the breach...

      isBuzznews - Matt Cable | March 24, 2020

San Diego Cyber Incident Response Guide

Learn more about San Diego’s region-wide cyber incident response guide and available local, state and federal resources.

San Diego Cyber Incident Response Guide October 2017