![]() ![]() “In addition, despite large breaches of personal data by all carriers over time these incidents do not appear to have led to more SIM jacking or identity theft incidents,”Broomhead said. “While there are state-level data breach disclosure laws in place, this timing barely meets most of them at 30 days and clearly does not meet the 10-day requirement in states like New York and Massachusetts.”īroomhead gives credit to T-Mobile, and other telecommunications companies that have been affected by cyber attacks, for being proactive in highlighting threats and deploying solutions for emerging cyber-attack vectors such as IoT and endpoint security. The wireless giant is facing the second major breach in as many years. “Any delays in customer notification increases the risk and severity of individuals being exploited,” Broomhead said. The Lapsus hacking group stole T-Mobile’s source code in a series of breaches that took place in March, as first reported by. ![]() “We expect to see organizations like T-Mobile provide more detailed analysis on the technical cause of the data breach - by providing a more detailed analysis, it would help the entire industry to take proactive steps to avoid similar issues,” Mandy said.īud Broomhead, CEO at Viakoo, said what he found most concerning is the time between the breach being detected (March 27) and when customers were notified (April 28). If your information was compromised in the 2022 T-Mobile data breach, you may qualify to participate in a T-Mobile data breach lawsuit investigation. Mandy continued that it is also disappointing that details provided by T-Mobile on how the breach occurred and what data was actually impacted is still vague. T-Mobile has begun notifying customers of a security breach that might affect an undetermined number of them, possibly revealing their names and addresses. Last month, T-Mobile and Experian agreed to pay 16 million to resolve numerous claims lobbied at the companies by state attorneys general in response to their handling of a 2015 data breach. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |