• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

5 Cyber Security Takeaways from the VTech Data Breach

VTech had information on customers stolen despite being a relatively small company. Here's how you can keep the same from happening to your business – large or small.

December 8, 2015 Jonathan Blackwood Leave a Comment

By now many of you will have heard about the recent cyber breach of toy maker VTech Holdings Ltd. Hackers were able to steal data revealing information about customers who downloaded children’s games, books and other educational content. What sets this breach apart from other high-profile data breaches in the past year is that much of this data provided information about the children that were using these games. Names, genders and birth-dates of these children have been compromised thanks to the breach.

“With fraud detection systems the way they are these days, most often if we have our identity used for opening a line of credit there are algorithms and other services in place that typically either identify or block the misuse of your credit,” says Chris Ensey, COO of Dunbar Security Solutions. “I believe strongly that what organizations that go after this type of data are attempting to do is find identities that don’t have a lot of credit history. You see a lot of breaches happen in colleges, where they gain access to large communities of individual identities that can be used to potentially open up new lines of credits or conduct other fraudulent uses like insurance fraud or fraudulent ID creation.”

Related: Keep Cyber Threats From Destroying Your Organization

 

VTech said in a statement that about 5 million customer accounts and related children profiles worldwide were affected. The breached database included names, email addresses, passwords, secret questions and answers for password retrieval, IP addresses, mailing addresses, download histories and children names, genders and birth dates. The targeted database did not include credit card information, ID card numbers, Social Security numbers or drivers license numbers.

“With something like this we’re focused on the children, while not talking about the fact that the bulk of information lost was adult identities,” says Ensey. “There’s related tables of information in this breach that included children names, date of birth, genders, etc., which can be tied back to the parents through a simple use of Excel skills. Utilizing that and cross-referencing the data is where it becomes more impactful. If you know the location of these children, you have a picture of them, date of birth, gender – that’s information that dark parts of the internet would pay value for. And that’s a scary thing to think about.”

What does that mean? Worst case scenario is kidnapping, human trafficking, and other nefarious, real-world schemes. An unfortunate and sickening thought, but one that is real in the world we live in. More likely, though, the information will be used to trick people, such as pretending to have kidnapped a loved one and demanding ransom money, a scheme that has been used in the past. Or, perhaps even more likely, the information will be sold, held onto for several years until these children come of age, and then the identities will be used for fraudulent credit plays. At the very least, the information can be used to portray more legitimacy when trying to use the parent’s information for fraudulent reasons.

Pages: Page 1 Page 2

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Jonathan Blackwood
Jonathan Blackwood

Jonathan Blackwood is the Editor-in-Chief of TechDecisions. Jonathan joined TechDecisions in 2014 and writes about technologies that help to innovate and improve practices for companies of all sizes, K-12 and higher education, government, healthcare, hospitality, retail and large venue spaces. He is especially interested in the future of work and education and the Internet of Things. Follow him @BlackwoodTweets.

Tagged With: Antivirus, Corporate, Data Backup & Recovery, Data Security, Malware Protection, Policy

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.