• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • Latest News
  • About Us
    SEARCH
Network Security

5 Cyber Security Takeaways from the VTech Data Breach

VTech had information on customers stolen despite being a relatively small company. Here's how you can keep the same from happening to your business – large or small.

December 8, 2015 Jonathan Blackwood Leave a Comment

By now many of you will have heard about the recent cyber breach of toy maker VTech Holdings Ltd. Hackers were able to steal data revealing information about customers who downloaded children’s games, books and other educational content. What sets this breach apart from other high-profile data breaches in the past year is that much of this data provided information about the children that were using these games. Names, genders and birth-dates of these children have been compromised thanks to the breach.

“With fraud detection systems the way they are these days, most often if we have our identity used for opening a line of credit there are algorithms and other services in place that typically either identify or block the misuse of your credit,” says Chris Ensey, COO of Dunbar Security Solutions. “I believe strongly that what organizations that go after this type of data are attempting to do is find identities that don’t have a lot of credit history. You see a lot of breaches happen in colleges, where they gain access to large communities of individual identities that can be used to potentially open up new lines of credits or conduct other fraudulent uses like insurance fraud or fraudulent ID creation.”

Related: Keep Cyber Threats From Destroying Your Organization

 

VTech said in a statement that about 5 million customer accounts and related children profiles worldwide were affected. The breached database included names, email addresses, passwords, secret questions and answers for password retrieval, IP addresses, mailing addresses, download histories and children names, genders and birth dates. The targeted database did not include credit card information, ID card numbers, Social Security numbers or drivers license numbers.

“With something like this we’re focused on the children, while not talking about the fact that the bulk of information lost was adult identities,” says Ensey. “There’s related tables of information in this breach that included children names, date of birth, genders, etc., which can be tied back to the parents through a simple use of Excel skills. Utilizing that and cross-referencing the data is where it becomes more impactful. If you know the location of these children, you have a picture of them, date of birth, gender – that’s information that dark parts of the internet would pay value for. And that’s a scary thing to think about.”

What does that mean? Worst case scenario is kidnapping, human trafficking, and other nefarious, real-world schemes. An unfortunate and sickening thought, but one that is real in the world we live in. More likely, though, the information will be used to trick people, such as pretending to have kidnapped a loved one and demanding ransom money, a scheme that has been used in the past. Or, perhaps even more likely, the information will be sold, held onto for several years until these children come of age, and then the identities will be used for fraudulent credit plays. At the very least, the information can be used to portray more legitimacy when trying to use the parent’s information for fraudulent reasons.

Pages: Page 1 Page 2
Jonathan Blackwood
Jonathan Blackwood

Jonathan Blackwood is the Editor-in-Chief of TechDecisions. Jonathan joined TechDecisions in 2014 and writes about technologies that help to innovate and improve practices for companies of all sizes, K-12 and higher education, government, healthcare, hospitality, retail and large venue spaces. He is especially interested in the future of work and education and the Internet of Things. Follow him @BlackwoodTweets.

Tagged With: Antivirus, Corporate, Data Backup & Recovery, Data Security, Malware Protection, Policy

Related Content:

  • Thrive SOAR MSSP Thrive Upgrades SOC With SOAR Integration
  • 10 Cybersecurity Mistakes 10 Common Cybersecurity Mistakes Your Organization is Making
  • XorDdos, Linux DDoS Trojan Watch Out For This Linux DDoS Trojan, Microsoft…
  • CISA, MSP Is Your IT Department Augmented by an MSP?…

Free downloadable guide you may like:

  • These 10 IT Certifications Are Critical To An IT Pro’s Success in 2022

    Here are 10 cloud, data and security certifications that we identify as critical to an IT professional’s resume in 2022 and beyond, according to a variety of sources, including Indeed, Robert Half, CompTIA and others.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

The State of the IT Department in 2022

The role of the IT professional has shifted from one that supports the business to one that is deserving of a seat at the table when it comes to ma...

Hybrid Work Challenges
The Three Most Common Hybrid Work Challenges Two Years Into the Pandemic

Many of us have been working in a hybrid environment for two years now. Our editors thought this would be a good time to take a look at what’s work...

These 10 IT Certifications Are Critical To An IT Pro’s Success in 2022

Here are 10 cloud, data and security certifications that we identify as critical to an IT professional’s resume in 2022 and beyond, according to a ...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Terms of Use
  • Privacy Policy
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!

© 2022 Emerald X, LLC. All rights reserved.