• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Security   »   It’s Time for You to Get Real Time Identity Theft Monitoring

It’s Time for You to Get Real Time Identity Theft Monitoring

  • Posted on:December 23, 2013
  • Posted in:Security
  • Posted by:Christopher Budd (Global Threat Communications)
0

As we approach the winter holidays and the final weeks of 2013, two things have come together recently that underscore the dangers everyone faces now to their personal information. These events highlight that we’re increasingly in a world where best practices for everyone now needs to include real time identity theft monitoring.

First, our CTO, Raimund Genes released his annual predictions about what he thinks might happen in 2014, “Blurring Boundaries: Trend Micro Security Predictions for 2014 and Beyond”, which includes his prediction that we will see “One Major Data Breach Each Month.”

Second, as if to prove the truth of that prediction early, we’ve learned that Target, a major retailer in the United States, is confirming a large data breach that occurred from November 27 through December 15 affecting credit and debit care information of up to 40 million customers. In essence, one of the largest retailers in the United States was successfully attacked for 2 ½ weeks at the height of the shopping season.

The Target situation is still developing: we don’t know how many credit and debit cards are actually abused. But for now, the story is enough to concern anyone that shopped in-store at Target during that time.

And the news from Target should cause the retail and online security and privacy industries to take note. If an organization of the size and sophistication of Target and with the resources available for security can be compromised like this, it shows that big breaches like this will continue and likely continue to get worse.

As Raimund says, you can expect big breaches like this once a month now.

This means it’s time for all of us to start looking at real time identity theft monitoring as a necessary best practice just like real time security software on our computers and devices. The amount of personal information that’s out there combined with the increasing successes that attackers are having breaching defenses to get that data means that not only is it dangerous not to check your credit reports regularly for suspicious activity, but that we need to be running near-continuous checks on those reports. I have friends who have been the victims of identity theft and can attest that the longer the crime goes unnoticed, the harder it is for the victim to undo the damage.

The other argument to be made is peace of mind in the face of these incidents. Knowing that you have continuous monitoring in place can help mitigate the sense of panic and worry that can arise in the early stages of situations like this with Target. While they are figuring out who may or may not be affected, you can know that you at least have the protection of real time monitoring to help you if you were affected. It’s not bulletproof, but it’s better than nothing.

There was a time when people didn’t think they needed real time security software. But over time attacks became frequent and successful enough that most people now agree it’s necessary. We are at a similar tipping point regarding real time identity theft monitoring. As we look to 2014 with the prospect of one of these events a month, I certainly wouldn’t want to go into the new year without that protection.

Related posts:

  1. Advice from a Victim of Identity Theft: Tips for Limiting the Damage (Part 2 of 2)
  2. Advice from a Victim of Identity Theft: Preventative Measures (Part 1 of 2)
  3. 2015: The Year Data Theft Got Real
  4. Protecting Yourself Against Identity Theft on the Internet

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Cloud-based Email Threats Capitalized on Chaos of COVID-19
  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.