{"id":4744,"date":"2012-01-18T15:04:00","date_gmt":"2012-01-18T15:04:00","guid":{"rendered":"https:\/\/leap.staging.ribbitt.com\/evs\/zappos-data-breach-prevent-further-identity-theft\/"},"modified":"2012-01-18T15:04:00","modified_gmt":"2012-01-18T15:04:00","slug":"zappos-data-breach-prevent-further-identity-theft","status":"publish","type":"post","link":"https:\/\/leap.staging.ribbitt.com\/evs\/insights\/zappos-data-breach-prevent-further-identity-theft\/","title":{"rendered":"ZAPPOS Data Breach-Prevent Further Identity Theft"},"content":{"rendered":"<p>Data. breach. These two <em>small<\/em> words can cause a BIG problem&#13;<br \/>\nfor businesses, especially those who house their consumers information for&#13;<br \/>\npurchasing reasons. The popular online retailer, Zappos.com, just recently felt&#13;<br \/>\nthe wrath of a <a href=\"http:\/\/www.databreachtoday.com\/articles.php?art_id=4406\">data&#13;<br \/>\nbreach<\/a> that happened right here in Kentucky. It is unknown exactly when the&#13;<br \/>\nbreach happened but was stated to have affected 24 million people. The company&#13;<br \/>\ntook immediate action as soon as they were aware of the attack. They chose to&#13;<br \/>\ndisconnect all phone lines and communicate with their disgruntled consumers via&#13;<br \/>\n<a href=\"http:\/\/blogs.zappos.com\/securityemail\">email<\/a> in order to avoid an&#13;<br \/>\noverload of calls.<\/p>\n<p>So what happens now? Well, as you can imagine those 24&#13;<br \/>\nmillion customers are not only a little angry, but worried about <a href=\"https:\/\/www.electronicverificationsystems.com\/solutions\/identifraud\/\">identity&#13;<br \/>\ntheft<\/a>. It was reported that the hackers were able to get a hold of&#13;<br \/>\nusernames, passwords, addresses, phone numbers, email addresses, and the last&#13;<br \/>\nfour digits of credit cards. This information may seem like a lot, but what can&#13;<br \/>\nsomeone really do with only the last four digits of a card? The answer is, a&#13;<br \/>\nlot. Zappos urged their customers to change usernames and passwords immediately&#13;<br \/>\nto avoid further breaching. They also strongly suggested changing credentials to&#13;<br \/>\nother sites using similar information to their Zappos login to avoid theft from&#13;<br \/>\nother accounts.<\/p>\n<p>Without the proper <a href=\"https:\/\/www.electronicverificationsystems.com\/solutions\/\">fraud prevention&#13;<br \/>\nmeasures<\/a>, the amount of information gained through this breach would be&#13;<br \/>\nsufficient enough for further damage. This is why ID authentication is so&#13;<br \/>\nimportant when preventing identity theft. Even with someones full name,&#13;<br \/>\naddress, password, and phone number, <a href=\"https:\/\/www.electronicverificationsystems.com\/products\/knowledge-based-authentication.aspx\">ID&#13;<br \/>\nauthentication<\/a> asks a series of questions that only the true identity&#13;<br \/>\nholder would know. Zappos is doing all they can to repair the distrust from&#13;<br \/>\ntheir consumers and hopefully will look into other <a href=\"https:\/\/www.electronicverificationsystems.com\/products\/id-verification.aspx\">ID&#13;<br \/>\nverification<\/a> and authentication measures to prevent this from happening&#13;<br \/>\nagain.<\/p>\n<p><!--EndFragment--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data. breach. These two small words can cause a BIG problem for businesses, especially those who house their consumers information for purchasing reasons. The popular online retailer, Zappos.com, just recently felt the wrath of a data breach that happened right<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,35],"tags":[],"class_list":["post-4744","post","type-post","status-publish","format-standard","hentry","category-identity-theft","category-identity-verification"],"acf":[],"_links":{"self":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/comments?post=4744"}],"version-history":[{"count":0,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4744\/revisions"}],"wp:attachment":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/media?parent=4744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/categories?post=4744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/tags?post=4744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}