Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Data Breach Lawsuits Revived: Court Turns in Favor of Consumers
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Uncategorized > Data Breach Lawsuits Revived: Court Turns in Favor of Consumers
Uncategorized

Data Breach Lawsuits Revived: Court Turns in Favor of Consumers

thu@duosecurity.com
thu@duosecurity.com
6 Min Read
SHARE

Contents
  • Class-Action Lawsuits Tied to Company Data Breaches
  • Protecting Against Common Threats

A data breach may be in the news one week and out the other, but the real lasting business impact and consumer effects can be felt long after the fact, as the recent reinstatement of a lawsuit tied to the Neiman Marcus breach of January 2014 proves.

A data breach may be in the news one week and out the other, but the real lasting business impact and consumer effects can be felt long after the fact, as the recent reinstatement of a lawsuit tied to the Neiman Marcus breach of January 2014 proves.

More Read

Starting Your Own Personal Data Quality Crusade
Jeremy Blogged in Class Today!
When Bad Data Becomes Acceptable Data
Aggregating Tags
6 SMB Technology Trend Predictions for 2016

Exposing data for 350,000 Neiman Marcus customers, the liability case held the company accountable for potential damage to consumers that spent time and money repairing credit card accounts after the breach, as well as dealing with any future identity theft.

And there were at least 9,200 of them that were actually used for fraud, according to The Wall Street Journal. This proves that simply reimbursing customers for fraud and giving them free credit monitoring isn’t going to cut it anymore, as the impact of stolen identities can continue if their information is sold and reused to open up new credit cards.

Class-Action Lawsuits Tied to Company Data Breaches

Of course, this isn’t the first retailer or organization that has had to settle class-action lawsuits as a result of a data breach.

In March, Target agreed to pay $10 million as a result of their 2013 breach in which attackers stole an estimated 42 million customers’ credit or debit card information, according to NPR.org. Sixty-two million total had their personal information stolen in the breach.

The lawsuit also stipulated certain security changes that would have to happen in the company, including appointing an actual chief information security officer (CISO); documenting an information security program and security risks; and offering security training to key employees.

The turning of the courts in favor of consumers is significant, as most U.S. lawsuits filed in response to data breaches typically fail, since proving harm and future injury can be difficult, as BankInfoSecurity.com noted.

But now that the courts are recognizing the real impact on consumers, businesses that experience breaches of consumer data need to be aware of the costly consequences of skimping on information security.

Protecting Against Common Threats

Two retailers, two major class-action consumer lawsuits. A few key points about their cases:

  • Similar payment card scraping malware was found in NM’s stores and Target’s systems
  • NM hackers had access for more than eight months to payment card data
  • NM attackers compromised the company’s point-of-sale system by leveraging an Internet-facing server – their card data network was not segmented
  • Target’s breach was traced back to network credentials stolen from a third-party HVAC vendor that allowed them to log into their networks remotely
  • NM hackers extracted data with custom hacking software and sent data out through a virtual private network (VPN)
  • Target hackers used file transfer protocol (FTP) to extract card data, according to Bloomberg Business

One of the main commonalities in both cases is the use of remote access to gain initial entry into systems, install malware, take over servers, and send data back to their own command and control servers.

Most recently, Hacking Team’s Remote Access Control spyware has been making news, as the surveillance tool can turn on microphones, cameras, and track all data on different devices, including passwords and browser history. It can also hide itself and install malicious apps as root on devices.

How can your company protect against remote access threats, often deployed over remote access applications with weak authentication? Implementing two-factor authentication can stop an attacker from accessing your network, either by cracking or stealing passwords. Only a user with personal device tied to your account, such as a smartphone or smartwatch, can verify and authenticate your real identity.

Learn more about two-factor authentication mobile apps, and download our latest guide, The Essential Guide to Securing Remote Access.

As The Wall Street Journal stated, information security insurance isn’t as easy to get as it was a year or two ago, nor is it a catchall for security failures. Insurers are taking a closer look at potential clients’ security practices before issuing policies that can protect chief information officers (CIOs) and other senior executives from a data breach fallout.

Instead, try investing in the security basics upfront and protect your company and executives from future data breach legal battles.

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

protecting patient data
How to Protect Psychotherapy Data in a Digital Practice
Big Data Exclusive Security
data analytics
How Data Analytics Can Help You Construct A Financial Weather Map
Analytics Exclusive Infographic
AI use in payment methods
AI Shows How Payment Delays Disrupt Your Business
Artificial Intelligence Exclusive Infographic
financial analytics
Financial Analytics Shows The Hidden Cost Of Not Switching Systems
Analytics Exclusive Infographic

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

The TV revolution: Changing the players

2 Min Read

3 Ingenious Use Cases for Business Intelligence Tools

8 Min Read

3 Things You Really Should Know About Other People’s Cloud VMs

4 Min Read
Image
Uncategorized

Power to the Tablets: The BYOD Bullseye

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive
AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?