DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Southern Michigan Bank & Trust notifies customers of stolen laptop

Posted on May 13, 2016 by Dissent

Elena Hines reports:

A Southern Michigan Bank & Trust employee’s vehicle was burglarized and a laptop stolen on April 10. The bank says there is no indication of a data breach, but staff are doing what they can to protect customers.

“Once we became aware, we immediately took several steps to protect our clients,” said John Castle, SMB&T chairman and CEO.

The laptop — issued to an employee who needed to access the information on it to answer questions that came in after regular business hours — was password-protected, and “right now there is no indication any information has been breached,” Castle said.

The laptop’s contents included names, checking account numbers and social security numbers, but no personal identification numbers (PINs) or passcodes.

Well, okay, but why couldn’t there be full disk encryption on the laptop instead of just a password?

Read more on Three Rivers Commercial-News.


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
Category: Financial SectorTheftU.S.

Post navigation

← Double whammy: Avention investigating two data breaches involving employee info
Data breach affecting more than 50,000 reported by Medical Colleagues of Texas →

2 thoughts on “Southern Michigan Bank & Trust notifies customers of stolen laptop”

  1. Melissa Wood says:
    May 13, 2016 at 9:16 pm

    Why wasn’t the user set up with a secure line at home and a secure login to the server[so that the DATA need NOT be on the said laptop in the first place] and hence the DATA not STOLEN? As a network Analyst/Engineer this seems like a more secure and less irresponsible method of end-user setup to put in place, as well as placing less responsibility on the user overall. The user should know better in the future to always take the equipment into the house first before any other task.

    1. Dissent says:
      May 13, 2016 at 9:21 pm

      I thought about that, too (secure login and no data on laptop), but the way they worded the “after hours” made me wonder if they had some config that would make the server unreachable after normal hours.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.