Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Acer Customer Credentials Stolen. Is Your Data Safe?

Alert: Acer Customer Credentials Stolen. Is Your Data Safe?

If you made use of Acer’s online store to purchase a device between May 12, of 2015 and April 28, 2016, we have some bad news for you: There’s a chance you received a letter from Acer to inform you that your card’s credentials were stolen.

If you have not received any letter, congratulations - you may have avoided being one of the 34,500 customers whose information was stolen. This information included the name and address of the cardholder, the card number itself, as well as the expiration date and security code for the card - in short, everything an identity thief would need to make fraudulent purchases on your dime. Fortunately, the social security numbers of the victims have been left untouched by the theft. Those who were affected are contained to the United States, Canada, and Puerto Rico. As an added precaution, any in-store customers would be wise to check on their account information, to be sure that they were not also involved.

Acer has remained mum as to the cause of the breach, quite possibly because many breaches of this nature occur because someone on the inside - usually an employee - falls victim to a malicious email.

While Acer is an obvious target, due to their relatively large customer base, that does not mean that your company is safe from such breaches. In the current online environment, there are dangers lurking in seemingly innocuous places. The best defense is to ensure that both your company and your employees have a comprehensive working knowledge of the threats that plague businesses, and of the best practices that will help you avoid them.

These best practices include:

  • Utilizing judgement upon opening email: Very likely the cause of Acer’s troubles, an employee naively opening an email can lead to catastrophic consequences for your business. A favorite method of infiltration, phishing attacks send malicious links to email recipients in hopes that some will shortsightedly click on the link and subject their computer (or entire system) to whatever attack was set in place. To avoid this problem, emphasize the importance of examining every email with a critical eye before clicking through to anything.
  • Emphasizing security: While many aren’t likely to admit it, there is a shockingly frequent use of over-simple passwords despite the overwhelming danger in using them. Discourage your employees from using words like “password” as a password, or (if possible) block it as an option entirely. You should also reinforce the importance of never sharing your password with anyone, and not recycling it over different accounts. Set a schedule to have employees change their password after a given period of use.

It’s very possible that Acer is facing the troubles they are because they failed to enforce similar policies with their employees. Take their example as a cautionary tale and implement practices such as these to preserve your security.

For more help in keeping your data protected, reach out to Evolve IT. We can help you implement the practices and procedures to keep your critical data protected.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Malware Business Business Computing Software User Tips Computer Workplace Tips Google Hosted Solutions Microsoft Upgrade Efficiency IT Support Mobile Devices Innovation Smartphone Windows 10 Network Security Ransomware Gmail Hardware Microsoft Office Office Bandwidth Backup Apps Business Continuity Disaster Recovery Communication Hacking WiFi Facebook Operating System The Internet of Things Social Media Alert Networking Data storage Firewall Windows Data Content Filtering Cybercrime Experience Website Mobile Device Management Money Network Employer-Employee Relationship Two-factor Authentication Managed Service Provider History Outlook Small Business Phishing App Wireless Technology Mobile Computing Android communications Big Data Safety Apple Unified Threat Management Smartphones Quick Tips Best Practice Search User Network Congestion Save Money Hard Drives Shortcut Music Managed IT services Remote Computing DDoS Cryptocurrency Heating/Cooling Laptop Word IBM Bluetooth Google Docs Education Cleaning Automation Holiday Business Management YouTube Processors Black Market Memory Office Tips LiFi Competition Staffing Entrepreneur BYOD Deep Learning Presentation Downtime Domains Streaming Media Help Desk Passwords BDR Micrsooft Visible Light Communication Disaster Vendor Management Hacker Data Management Business Growth Robot Advertising Application Recovery Society Monitors Customer Service Sports Spam Google Wallet Information Technology Running Cable Router Windows 8 Displays Internet of Things Office 365 Windows XP IT Services Hosted Solution Artificial Intelligence Documents Saving Money Tech Support End of Support Analytics Compliance Lithium-ion battery intranet Drones Social Printer Writing Browser Virtual Desktop Wireless Social Networking Unified Communications Public Speaking Securty Virtualization Document Management IP Address Encryption SaaS VoIP Law Enforcement Government Keyboard Cortana Proactive IT Retail Augmented Reality
QR-Code