DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

If you don’t know whether data were extracted, why say the risk of harm is low?

Posted on May 8, 2013 by Dissent

A breach notification letter submitted this week to the Vermont Attorney General’s Office by WorldVentures Marketing had me grinding my teeth.

According to the notification to consumers, WorldVentures recently became aware of unauthorized access to their servers. The access may have occurred from October 23, 2012 through March 14, 2013.  The server held customers’ credit card numbers with expiration dates.  They do not indicate how they became aware of the unauthorized access.

The firm says that they do not have any evidence that the card data were extracted. Then again, do they have any firm proof it wasn’t extracted?

“We believe the risk of harm to you is low.” 

If you don’t know for sure that data were not extracted, should you write that?  No.

The firm did not offer affected customers any free credit monitoring services.

 

 

Category: Breach IncidentsBusiness SectorHackU.S.

Post navigation

← UK: Hospital worker breaks into confidential records
IL: Police investigating computer theft at Dept of Family services →

2 thoughts on “If you don’t know whether data were extracted, why say the risk of harm is low?”

  1. Adam says:
    May 8, 2013 at 10:37 am

    because you like being sued?

  2. IA Eng says:
    May 8, 2013 at 12:58 pm

    This is a classic in house investigation. Much like having security of your network at an all-time low on the expeditures list, the same applies to calling in experts to rummage through their network.

    I can almost here some one saying:

    “Thats going to cost alot of money and knock down our profit magin! Can’t we do this investigation in house? Can’t the PR people figure out how to word the responses so we don’t knee-jerk people into complaining. How can we rectify this occurence without making it look like it was a big deal ?”

    There isn’t any proof data was extracted, because the people who are attempting to look for clues are – actually clueless. They way I look at it, the comanies who act as true profiteers ( somewhat close to racketeers, pirates and such) look at success only in the piles of cash they are able to produce. Risk, which most consider – is unmerited and cuts into the “bottom line”. So, how long can a company operate with minimal security controls in place before thy pants fall around their ankles?

    Oh, we have a nest egg for fines. We have insurance in case an incident occurs that is beyond our control.

    They also see that most class action cases crash and burn, so being sued successfully is minimal. So it’s a report it when you can, clean it up, mop and move forward. They occasionally listen for the knock on the door from an entity that may request more information or, have an intent to sue them for the way they are running their business. Most will shrug and say the stereotypical line – it was only a matter of time before they hacked us too. We’re a victim here, we were doing it the same way everybody else is doing it.

    The law isn’t strict enough when it comes to the storage of personal information. Some businesses think of it like craps at the casino. There is only a small chance that your number is going to come up (in a bad way), so whil the gettin’ is good, enjoy the success at a minimal cost.

    Until the CC agency slaps them silly with a hefty fine. Same with the government. There should be a mandatory, set fine per individual (person) record that was breeched. In order to lower the fine, security controls like full disk encyption, in-line IPS, a staff that is qualified, and up to date on certifications, may allow for a litle of the fine to be offset, but no more than half. the initial fine needs to sting. Otherwise its a flea bit and the shoddy businesses can afford it and pay it without doing any advances to their security program.

    The technology and infrastructure is out there. It doesn’t have to cost an arm and a leg. send select IT people to courses that can use commercial off the shelf or freeware style products to secure your network. But, if it affects the bottom line, more than likely its something that won’t be funded.

    The way of doing business is broke. The cow is fat and full of milk. the hackers will drink it dry before they realize it.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Massachusetts hacker to plead guilty to PowerSchool data breach
  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.