… w
ell, not quite that fast. But nine minutes is pretty quick, as FTC researchers recently confirmed.
The FTC’s Office of Technology Research & Investigation (OTech) ran an experiment in April and May, posting made-up personally identifiable information in plain text on two different Internet paste sites. The phony PII was consumer account information for 100 fictitious people, including name, address, phone number, email address, password, and payment means (credit card number, online payment account, or Bitcoin wallet). Then, OTech waited to see what would happen, monitoring for access attempts on email and payment accounts, attempted credit card charges, and calls and texts received.
The results, and the speed of those results, were a surprise to all but the most jaded. Here’s what OTech’s monitoring revealed:Continue Reading How quickly is stolen PII fraudulently used? Faster than you can tweet “covfefe”

Sometimes one must look past the headlines (
I always look forward to Verizon’s annual Data Breach Investigations Report. Verizon dropped the
Effective June 16, New Mexico will be the 48th state with a PII data breach notification statute. New Mexico joins the vast majority of states, plus the District of Columbia, Puerto Rico, Guam, and the U.S. Virgin Islands, in requiring notice to affected residents of PII security breaches – as of June, only Alabama and South Dakota will lack such a law.
I wish I had a bitcoin for every time I get an email with the subject line “Data Breach,” yet the facts upon investigation reveal no notifiable breach occurred.
Sorry to revive ugly memories of last fall’s vituperative presidential campaign, in which
News reports today
As the calendar year turned there were several great
Having too much data causes problems beyond needless storage costs, workplace inefficiencies, and uncontrolled litigation expenses. Keeping data without a legal or business reason also exacerbates data security exposures. To put it bluntly, businesses that tolerate troves of unnecessary data are playing cybersecurity roulette … with even larger caliber ammunition.