DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Still sending data via unencrypted thumb drives in the mail? It will cost you.

Posted on October 16, 2018 by Dissent
Image credit: @asb163/Dreamstime

Weibrecht Law in New Hampshire recently submitted a notification to their state with this explanation of their breach:

On or about Monday September 10th, our office sent an unencrypted electronic copy (“thumb drive”) of a client file via US Postal Service. The envelope that the thumb drive was sent in was received by the recipient, damaged and without the thumb drive enclosed. We immediately contacted the USPS to investigate.

Okay, so far that sounds really familiar, right, although why entities would still send unencrypted thumb drives thru postal mail in 2018 is a bit disheartening. In any event, their report continues (with emphasis added by me):

A representative from our office spoke with a representative in the Claims and Inquiries Department of the USPS in Manchester, NH and learned that all items recovered from the mail processing center are sent to her department. She reported that because this was a common occurrence, she had several buckets of thumb drives that had similarly been torn free from their envelope in the mail sorting process.

Buckets of thumb drives? The possibilities are staggering.

She did a visual review for the USB but did not find it. She also reported that the USPS has its own internal privacy policies that would preclude an employee from actually opening any of the USBs that are recovered.

And we know that employees always rigorously adhere to policies, right?

Based on this information, we do not have reason to believe the information has been accessed by individuals intending to misuse it. In fact, our investigation indicates that the most likely disposition of the thumb drive was that it was destroyed in a post office mail processing machine.

Complete the “write your own misdadventure” starter above.

The law firm has taken steps to provide protective and remediation services and is changing their procedures for sending files, but how much time, money, and potential reputation harm could they have avoided by encrypting files during file transfer?

These lessons are so costly and painful for SMB.  I wish we could help more entities avoid having to learn them.


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
  • Gatineau gymnastics centre warns members of possible data breach
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Hotel and Casino near Las Vegas Strip suffers data breach, documents say
Category: Business SectorLost or MissingU.S.

Post navigation

← Anthem Pays OCR $16 Million in Record HIPAA Settlement Following Largest U.S. Health Data Breach in History
The 3 Biggest Data Security Takeaways From The 11th Circuit Decision In FTC v. LabMD →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.