DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NY: Stolen Pioneer bank laptop contained some customers’ data (updated)

Posted on March 2, 2015 by Dissent

Eric Anderson reports:

Pioneer Bank over the weekend alerted some of its customers that an employee’s laptop stolen Jan. 26 contained “secured personal information of certain customers, including names, social security numbers, street addresses, and account and debit card numbers.”

Letters were sent to those customers whose information “may have been on this laptop,” Pioneer said. Not all customers were affected, and Pioneer said it was “currently unaware of any misuse of any of the customer information relating to this incident.”

Read more on TimesUnion.

I wonder what they mean by “secured.”

Update: Larry Rulisun of the Times Union has more details on the theft in a follow-up report. As a commenter on this blog reports, the bank is telling customers who call that the data were “encrypted.”

Category: Financial SectorTheftU.S.

Post navigation

← Who ‘owns’ an investigation into a security breach?
Nina Pham to sue hospital for negligence, invasion of privacy →

5 thoughts on “NY: Stolen Pioneer bank laptop contained some customers’ data (updated)”

  1. Deborah says:
    March 2, 2015 at 5:23 pm

    It took them over a month to let us know!!! They sent the notice by postal service. When you call, they say the info was all encrypted so no “security breach” occurred. I asked why they were supplying a free year of identity protection then? “Just in case you want it” was the response.

    1. Dissent says:
      March 3, 2015 at 1:51 pm

      They said it was encrypted? Thank you!

  2. Anonymous says:
    March 2, 2015 at 8:01 pm

    AS A PIONEER CUSTOMER I WOULD LIKE TO KNOW WHY IT TOOK THEM OVER A MONTH TO CONTACT US!!!

  3. Anonymous says:
    March 5, 2015 at 1:13 pm

    One month is actually quite a rapid response from any business. Most would try to cover this up.

  4. IA Eng says:
    March 10, 2015 at 11:45 am

    I hope when they say “the data was encrypted” means that the ENTIRE laptop was encrypted. An encrypted laptop will not even boot up without the proper password.

    So, if a computer boots up to a login prompt, all a thief has to do is to crack the user’s password. Once they have done that, the user usually has rights to modify and view files they were working on, so encryption at that point is pretty useless.

    People don’t get it. If you want security, pay the price. One of the SIMPLEST things in the world is a thumb drive that has a long password on it. If the wrong password is entered 10 times in a row, it self destructs, and no one gets anything. As long as employees are not lazy – this works like a charm. Have a corporate policy that states that circumventing security policies and procedures can get you fired, and things usually stay pretty straight and narrow. The company needs to physically handle and audit corporate devices every once in a while. It allows the IT folks to either do a check up on the box for patches, so simply slick the device and reinstall a new clean load, potentially wiping out anything that might be bad.

    They took a month to see if the crook who stole the laptop might try to sell it at a pawn shop, or if it would show up on Ebay or other markets. It takes TIME to do an investigation – these things don’t happen overnight. Crooks are smart. if they know the business they want to attack, they simply stalk an employee who occasionally handles laptops. They follow the employee from work to home and everywhere in between. if an opportunity presents itself, and the laptop remains in a vehicle for a few minutes unattended, all it takes is a busted in window and the laptop is gone. Again, people are lazy – Its a highly valued commodity – lock it up in your trunk if you have one.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • ConnectWise suspects cyberattack affecting some ScreenConnect customers was state-sponsored
  • Possible ransomware attack disrupts Maine and New Hampshire Covenant Health locations
  • HHS OCR Settles HIPAA Security Rule Investigation of BayCare Health System for $800k and Corrective Action Plan
  • UK: Two NHS trusts hit by cyberattack that exploited Ivanti flaw
  • Update: ALN Medical Management’s Data Breach Total Soars to More than 1.8 Million Patients Affected
  • Russian-linked hackers target UK Defense Ministry while posing as journalists
  • Banks Want SEC to Rescind Cyberattack Disclosure Requirements
  • MathWorks, Creator of MATLAB, Confirms Ransomware Attack
  • Russian hospital programmer gets 14 years for leaking soldier data to Ukraine
  • MSCS board renews contract with PowerSchool while suing them

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Home Pregnancy Test Company Wins Dismissal of Pixel Wiretapping Suit
  • The CCPA emerges as a new legal battleground for web tracking litigation
  • U.S. Spy Agencies Are Getting a One-Stop Shop to Buy Your Most Sensitive Personal Data
  • Period Tracking App Users Win Class Status in Google, Meta Suit
  • AI: the Italian Supervisory Authority fines Luka, the U.S. company behind chatbot “Replika,” 5 Million €
  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.