Fire officials spoke with employees and learned the blaze sparked when computers were mixed with lithium-ion batteries.
According to the team, an authentication failure on the website allowed for unfettered access to all user accounts hosted by the Luscious database. Usernames, personal email addresses, locations, activity logs, genders, and some full names -- exposed through the private email addresses -- were available.
In a recent article, “How to avoid becoming the next victim of a data breach” by Ben Wolford, several tips are offer to assist individuals to help save their important electronic data from the trappings of cyber criminals.
One such tip states to:
Reduce the amount of information you give out
This isn’t always possible or practical, but companies can’t expose data they don’t have. It’s the most sure-fire way to mitigate your risk of a data breach. In the case of medical or financial information, our control is limited. Banks, credit bureaus, and other financial institutions collect your data often for regulatory purposes or through agreements you can’t opt out of.
For example, this article shows you how to delete your Google data. In the early days of Facebook, many people treated photo albums as cloud storage. But multiple privacy and security breaches at Facebook have shown that information stored on the company’s servers is not necessarily safe. Privacy settings are not a solution because the data is still vulnerable to breaches, even if your friends and followers can’t see it.
Ben Wolford is a writer at Protonmail. A journalist for many years, Ben joined Proton to help lead the fight for data privacy.
Companies and individuals must protect their data as they would their physical assets. Spend a little extra on digital security software. Monitor your systems for vulnerabilities, scan and update often, implement firewall protection, change passwords often and never repeat them, and purge legacy systems. By actively promoting good cyber hygiene practices, servers, personal computers, mobile phone and IoT devices’ data will be better protected and outside attacks will be thwarted.