{"id":15396,"date":"2020-01-17T10:21:47","date_gmt":"2020-01-17T04:51:47","guid":{"rendered":"https:\/\/www.the-next-tech.com\/?p=15396"},"modified":"2023-03-10T18:52:28","modified_gmt":"2023-03-10T13:22:28","slug":"the-worst-and-biggest-hacks-data-breaches-that-happened","status":"publish","type":"post","link":"https:\/\/www.the-next-tech.com\/security\/the-worst-and-biggest-hacks-data-breaches-that-happened\/","title":{"rendered":"The Worst and Biggest Hacks\/Data Breaches that Happened in 2019"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">There are many things that can unfortunately happen that can be incredibly harmful to a company. You can have a product defect, your website can go down or your suppliers can discontinue selling an important part of your product. All of these can hurt your profits and force you to get creative with how to respond.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, worse than all of these is that your company can be <a href=\"https:\/\/www.the-next-tech.com\/security\/your-whatsapptelegram-media-files-may-be-hacked-security-news\/\">hacked<\/a>. A hack, or data breach, is when an individual or group gains access to the information or data that your company holds. This could be sensitive data about your company, but also the personal information and data of your customers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As you could imagine, this has the potential to be terrible. These data breaches can <\/span><a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">cost companies millions of dollars<\/span><\/a><span style=\"font-weight: 400;\"> in fines and damage control, and can ruin their reputation in the public eye. And unfortunately, they are <\/span><a href=\"https:\/\/www.ciodive.com\/news\/data-breaches-up-54-yoy-2019-set-to-be-worst-year-on-record\/561359\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">on the rise<\/span><\/a><span style=\"font-weight: 400;\"> and some of the largest companies on the planet fell victim to data breaches recently.<\/span><\/p>\n<p>With that in mind, this article is going to look at some of the biggest and worst hacks\/<a href=\"https:\/\/www.the-next-tech.com\/business\/what-should-organizations-do-about-it-when-cybersecurity-breaches-are-inevitable\/\">data breaches<\/a> that took place in 2019.<br \/>\n<!-- Home page 728x90 --><br \/>\n<ins class=\"adsbygoogle\" style=\"display: inline-block; width: 728px; height: 90px;\" data-ad-client=\"ca-pub-9864771813712812\" data-ad-slot=\"3152971286\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<h2><span style=\"font-weight: 400;\">Facebook<\/span><\/h2>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-15397 aligncenter\" src=\"https:\/\/s3.amazonaws.com\/static.the-next-tech.com\/wp-content\/uploads\/2020\/01\/19174553\/Facebook.jpg\" alt=\"Facebook\" width=\"600\" height=\"400\" srcset=\"https:\/\/s3.amazonaws.com\/static.the-next-tech.com\/wp-content\/uploads\/2020\/01\/19174553\/Facebook.jpg 600w, https:\/\/s3.amazonaws.com\/static.the-next-tech.com\/wp-content\/uploads\/2020\/01\/19174553\/Facebook-300x200.jpg 300w, https:\/\/s3.amazonaws.com\/static.the-next-tech.com\/wp-content\/uploads\/2020\/01\/19174553\/Facebook-27x17.jpg 27w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Facebook is one of the most popular sites and social media platforms on the planet. Unfortunately 2019 wasn\u2019t the kindest to Facebook in terms of hacks and data breaches. In March, hundreds of millions of people woke up to learn that their passwords were exposed openly in unprotected servers. Then, in April, over 500 million Facebook users have their usernames and passwords once again left on unprotected servers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">They have admitted to storing millions of passwords and other information in unsafe places. However, their rough 2019 wasn\u2019t done just yet. In November, many Facebook app developers were given too much access to the data on user profiles, which could have led to terrible results. Here\u2019s hoping that <a href=\"https:\/\/www.the-next-tech.com\/development\/facebooks-cryptocurrency-libra-and-digital-wallet-calibra\/\">Facebook<\/a> can take their security to the next level in 2020 and prevent this unsettling trend from continuing.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Dubsmash, MyFitnessPal and Others<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">In February of 2019, over 600 million people had their accounts and personal information stolen in a hack that affected 16 different sites. Some popular sites\/platforms included in this breach were Dubsmash, MyFitnessPal, MyHeritage and ShareThis. The information that was stolen included customer names, emails, and passwords.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some people even had their location and other personal data compromised as well. Worse yet, this massive amount of information was up for sale on the dark web. The information was sold for less than $20,000 in Bitcoin, likely to either spammers or those who stuff credentials. As you could imagine, many people were affected more than once, if they had accounts on multiple affected platforms.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Elasticsearch<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">While this breach didn\u2019t get as much publicity as many others, there is no doubting the magnitude that it had. In October, a staggering 1.2 billion unique individuals had their records\u00a0<\/span><span style=\"font-weight: 400;\">exposed on an Elasticsearch server. In total, there were more than 4 billion social media profiles sitting there unprotected. In addition to social media profiles, data that was exposed includes jobs, locations, names, emails and phone numbers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The exposed records were thankfully found by security researchers, but that is a mind-blowing amount of information that could have easily fallen into the wrong hands. The data was originally sourced from People Data Labs, which is a data enrichment company, but they weren\u2019t the owner of the unsecured server and database.<\/span><br \/>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/mobile-apps\/spotify-duo-pros-cons\/\">What Is Spotify Premium Duo? Explained (Pros & Cons)<\/a><\/span>\n<h2><span style=\"font-weight: 400;\">Precautions for Data Security in 2020<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">If you want to ensure your company doesn\u2019t suffer through an equally debilitating hack or data breach in 2020, there are thankfully some things you can do to help. Some ways to lower your chances of going through a <a href=\"https:\/\/www.the-next-tech.com\/security\/data-breach-is-a-nightmare-event-the-ways-how-you-can-safeguard-your-personal-data-online\/\">data breach<\/a> in 2020 include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Keep up with the best new security practices by checking out online resources. These are full of great information and interesting\/important conversations.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Control who has access to different types of information. People should only have access to data that they need to do their jobs.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Use strong passwords and ensure security software and tools are updated frequently<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Educate your employees on best practices so they know the best things to do in certain situations.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Have systems in place to be able to identify intruders or other errors, before they cause a major issue.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Keep only what you need, and make sure it\u2019s on a safe space in the cloud; for example using a log management software (you can check more about it here: <\/span><a href=\"https:\/\/www.loggly.com\/solution\/log-management\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">log management software &#8211; online tool with free trial, Loggly<\/span><\/a><span style=\"font-weight: 400;\">).<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Perform regular tests and audits to ensure that everything is working as it should.<\/span><\/li>\n<\/ul>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/business\/best-zapier-alternatives\/\">Top 10 Zapier Alternatives & Competitors In 2025<\/a><\/span>\n<span style=\"font-weight: 400;\">In conclusion, the breaches and hacks included in this article were among the worst in 2019, though they are far from the only ones. Use the tips and precautions within this article to protect yourself and your company from data breaches in 2020 and beyond.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are many things that can unfortunately happen that can be incredibly harmful to a company. You can have a<\/p>\n","protected":false},"author":494,"featured_media":15398,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[49],"tags":[1013,1014,209],"_links":{"self":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/15396"}],"collection":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/users\/494"}],"replies":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/comments?post=15396"}],"version-history":[{"count":6,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/15396\/revisions"}],"predecessor-version":[{"id":18456,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/15396\/revisions\/18456"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media\/15398"}],"wp:attachment":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media?parent=15396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/categories?post=15396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/tags?post=15396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}