DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Data breach notification fatigue: Do consumers (eventually) tune out?

Posted on April 12, 2011 by Dissent

George V. Hulme writes:

Earlier this month more than 50 companies were involved in a massive heist of names and email addresses from Epsilon Interactive. With millions of customers of companies such as Best Buy, Brookestone, Dell, Marriott and many others affected, the question is being raised: are so many breach notifications from so many companies numbing their impact?

Read the opinions of a number of people George interviewed on CSO.

Rather than comment on all of the different views expressed, I’ll confine myself to one comment:

Still, others think that all of the breach notifications regarding names and email addresses are not doing anyone any good. “I certainly think it’s a mistake,” says [Mark Rasch, director of cybersecurity and privacy consulting at Computer Sciences Corporation]. “It’s not that I think corporations should conceal these incidents. When it’s a name and email address the statutes don’t require a notification. But that’s not why I think that they shouldn’t do it. They shouldn’t do it because it’s not helpful.”

Ah, but it could be  helpful if consumers who have received, 5, 6, 7 or even  more notifications from WFNNB-issued credit cards  stop and think, “Do I really need all of these store-branded credit cards or am I just creating more accounts that can be hacked or compromised? Would I be better off only using one or two cards such as Mastercard and Visa instead of all these cards?”

Giving stores just a store-specific email address for email promotions  is not a huge deal if they get hacked, as you can kill the email address without impacting anything important.  Giving their bank your personal details to get a credit card opens up more serious risks.

There are lessons that can be learned by people who received a lot of notifications after the Epsilon breach.  Being aware of spear-phishing is an important one, but it’s not the only one.  Hopefully, more consumers will start to think about all of the credit cards they’ve opened for stores and gas stations and think about whether they really need them all or would be better off reducing their risk by only using one or a few major cards.


Related:

  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • Some lower-tier ransomware gangs have formed a new RaaS alliance -- or have they? (1)
  • Uncovering Qilin attack methods exposed through multiple cases
  • Predatory Sparrow Strikes: Coordinated Cyberattacks Seek to Cripple Iran's Critical Infrastructure
Category: Breach IncidentsBusiness SectorCommentaries and Analyses

Post navigation

← OK State Dept. of Health: Stolen laptop contained personal and medical information on 133,000
OK State Dept. of Health: Stolen laptop contained personal and medical information on 133,000 →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.