DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Southern Michigan Bank & Trust notifies customers of stolen laptop

Posted on May 13, 2016 by Dissent

Elena Hines reports:

A Southern Michigan Bank & Trust employee’s vehicle was burglarized and a laptop stolen on April 10. The bank says there is no indication of a data breach, but staff are doing what they can to protect customers.

“Once we became aware, we immediately took several steps to protect our clients,” said John Castle, SMB&T chairman and CEO.

The laptop — issued to an employee who needed to access the information on it to answer questions that came in after regular business hours — was password-protected, and “right now there is no indication any information has been breached,” Castle said.

The laptop’s contents included names, checking account numbers and social security numbers, but no personal identification numbers (PINs) or passcodes.

Well, okay, but why couldn’t there be full disk encryption on the laptop instead of just a password?

Read more on Three Rivers Commercial-News.


Related:

  • Two more entities have folded after ransomware attacks
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Bitcoin holds steady as hackers drain over $40 million from CoinCDX, India's top exchange
  • Missouri Adopts New Data Breach Notice Law
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
Category: Financial SectorTheftU.S.

Post navigation

← Double whammy: Avention investigating two data breaches involving employee info
Data breach affecting more than 50,000 reported by Medical Colleagues of Texas →

2 thoughts on “Southern Michigan Bank & Trust notifies customers of stolen laptop”

  1. Melissa Wood says:
    May 13, 2016 at 9:16 pm

    Why wasn’t the user set up with a secure line at home and a secure login to the server[so that the DATA need NOT be on the said laptop in the first place] and hence the DATA not STOLEN? As a network Analyst/Engineer this seems like a more secure and less irresponsible method of end-user setup to put in place, as well as placing less responsibility on the user overall. The user should know better in the future to always take the equipment into the house first before any other task.

    1. Dissent says:
      May 13, 2016 at 9:21 pm

      I thought about that, too (secure login and no data on laptop), but the way they worded the “after hours” made me wonder if they had some config that would make the server unreachable after normal hours.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.