DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

FL: SunTrust Banks first replacing cards due to Heartland breach

Posted on April 22, 2009 by Dissent

WESH reports that SunTrust Banks sent out letters this week to customers informing them that their cards were being replaced due to the Heartland breach.

WESH’s reporter asked what I would have asked: why are notifications first being sent now? The news station reports, “When asked why it took SunTrust so long to find out and notify customers, the representative said it takes months to sort it all out and SunTrust was probably part of the last wave of banks to learn that they could be affected.”

The value of breach notifications in reducing the risk or extent of identity theft has been a matter of research and debate in the past year. Certainly, however, if notification is to reduce the risk of misuse, it needs to be timely. The Heartland breach was announced three months ago. In this day and age, three months seem too long to notify. Yes, I know that consumers have no liability in some situations, but eventually we all pay for the fraudulent charges. The Heartland breach may have challenged card issuers and financial institutions due to the scale of the breach, but hopefully someone will do an analysis of the response to the incident to determine how quickly all affected institutions were notified and provided with necessary information, and how quickly financial institutions notified affected individuals and/or replaced cards.

No related posts.

Category: Breach IncidentsFinancial SectorHackMalwareU.S.

Post navigation

← IN: Business accidently tosses records containing personal information for area residents
KS: Confidential Paperwork Found In Apartment Dumpster →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • DOJ investigates ex-ransomware negotiator over extortion kickbacks
  • Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
  • One in Five Law Firms Hit by Cyberattacks Over Past 12 Months
  • U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware
  • Senator Chides FBI for Weak Advice on Mobile Security
  • Cl0p cybercrime gang’s data exfiltration tool found vulnerable to RCE attacks
  • Kelly Benefits updates its 2024 data breach report: impacts 550,000 customers
  • Qantas customers involved in mammoth data breach
  • CMS Sending Letters to 103,000 Medicare beneficiaries whose info was involved in a Medicare.gov breach.
  • Esse Health provides update about April cyberattack and notifies 263,601 people (1)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban
  • 20 States Sue HHS to Stop Medicaid Data Sharing with ICE
  • Kids are making deepfakes of each other, and laws aren’t keeping up
  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.