ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Acer Customer Credentials Stolen. Is Your Data Safe?

Alert: Acer Customer Credentials Stolen. Is Your Data Safe?

If you made use of Acer’s online store to purchase a device between May 12, of 2015 and April 28, 2016, we have some bad news for you: There’s a chance you received a letter from Acer to inform you that your card’s credentials were stolen.

If you have not received any letter, congratulations - you may have avoided being one of the 34,500 customers whose information was stolen. This information included the name and address of the cardholder, the card number itself, as well as the expiration date and security code for the card - in short, everything an identity thief would need to make fraudulent purchases on your dime. Fortunately, the social security numbers of the victims have been left untouched by the theft. Those who were affected are contained to the United States, Canada, and Puerto Rico. As an added precaution, any in-store customers would be wise to check on their account information, to be sure that they were not also involved.

Acer has remained mum as to the cause of the breach, quite possibly because many breaches of this nature occur because someone on the inside - usually an employee - falls victim to a malicious email.

While Acer is an obvious target, due to their relatively large customer base, that does not mean that your company is safe from such breaches. In the current online environment, there are dangers lurking in seemingly innocuous places. The best defense is to ensure that both your company and your employees have a comprehensive working knowledge of the threats that plague businesses, and of the best practices that will help you avoid them.

These best practices include:

  • Utilizing judgement upon opening email: Very likely the cause of Acer’s troubles, an employee naively opening an email can lead to catastrophic consequences for your business. A favorite method of infiltration, phishing attacks send malicious links to email recipients in hopes that some will shortsightedly click on the link and subject their computer (or entire system) to whatever attack was set in place. To avoid this problem, emphasize the importance of examining every email with a critical eye before clicking through to anything.
  • Emphasizing security: While many aren’t likely to admit it, there is a shockingly frequent use of over-simple passwords despite the overwhelming danger in using them. Discourage your employees from using words like “password” as a password, or (if possible) block it as an option entirely. You should also reinforce the importance of never sharing your password with anyone, and not recycling it over different accounts. Set a schedule to have employees change their password after a given period of use.

It’s very possible that Acer is facing the troubles they are because they failed to enforce similar policies with their employees. Take their example as a cautionary tale and implement practices such as these to preserve your security.

For more help in keeping your data protected, reach out to ClearView IT. We can help you implement the practices and procedures to keep your critical data protected.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Small Business Smartphones Microsoft Office Network Mobile Devices Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Facebook Windows 10 Business Continuity Passwords Holiday Disaster Recovery Covid-19 Windows 10 IT Support Browser Apps Managed Service Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Internet of Things Remote Work Data Management Saving Money Operating System Government Artificial Intelligence Managed IT services Gadgets Workplace Strategy Networking Windows App Virtualization Spam Business Technology WiFi Blockchain Bandwidth Server Encryption Information Remote Mobile Device Management Office Apple Two-factor Authentication Information Technology Office 365 Budget History Employee/Employer Relationship Gmail BDR Analytics Conferencing Cybercrime Wi-Fi Access Control Data Security Health Big Data Help Desk Remote Monitoring Hacking Cost Management Voice over Internet Protocol Remote Computing IT Management Document Management Hacker Training Save Money Compliance Patch Management Employer-Employee Relationship Vendor Project Management Alert Vulnerabilities Hiring/Firing Outlook Mobile Office Password Legal Managed Services Data storage Money Data loss Customer Service Unified Threat Management Firewall Augmented Reality Word Search... BYOD Best Practice IBM Applications Website Computing Vendor Management Retail Hard Drive Windows 11 The Internet of Things YouTube Monitoring Twitter User Healthcare Websites Remote Workers Law Enforcement End of Support Mobility Meetings Laptop Printer Windows 7 Free Resource Google Maps Chrome Scam How To Sports Travel Social SaaS DDoS Virtual Reality VPN Mobile Computing Social Engineering Cryptocurrency Update Black Market Marketing iPhone Cleaning Running Cable Education Cortana Robot Data Breach Content Filtering Paperless Office Storage Antivirus Router Maintenance Virtual Machines Chromebook Drones Computer Repair Multi-factor Authentication Automobile Start Menu Professional Services HIPAA Downloads Computer Care How To Vulnerability Saving Time Wireless Technology Microchip eWaste Flexibility Managed Services Provider Software as a Service Data Protection Computers Bitcoin Downtime Virtual Private Network Hack Safety Identity Theft Telephone Notifications Unified Communications Current Events Virtual Desktop Google Docs Excel Solutions PowerPoint Experience Administration Bluetooth Distributed Denial of Service Office Tips Tech Terms Images 101 Integration Presentation Specifications Private Cloud Memory Display Managed IT IT Consultant Digital Virtual Assistant Disaster Employees Customer Relationship Management Co-Managed IT Taxes Avoiding Downtime Politics Entertainment Machine Learning Settings Lithium-ion battery Holidays Processor Solid State Drive Cooperation Processors Video Conferencing Physical Security User Tip Shopping Legislation News Medical IT Monitors Printing Evernote Paperless Visible Light Communication Network Management CCTV SQL Server Troubleshooting Reading Licensing Windows 8 Touchscreen PCI DSS Emergency Proxy Server Gig Economy Emails Humor Computer Malfunction Fake News Supply Chain Public Speaking Displays Business Communications Advertising Vendor Mangement Service Level Agreement Internet Service Provider Computing Infrastructure Azure Relocation Samsung Device security Managed IT Service Streaming Media Work/Life Balance Tech Support Management Regulations Compliance Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Keyboard Hard Drives Tech Human Resources Business Mangement Going Green Net Neutrality Business Cards Business Owner Tablets In Internet of Things intranet Error Financial Data Bookmark Risk Management IT Scams Wireless Hacks Shortcut Network Congestion Reliable Computing Heating/Cooling Writing Google Calendar Term Google Apps Environment Download Supercomputer Piracy HTML Windows XP Social Networking Virus Telework Browsers Smartwatch Nanotechnology Communitications Motion Sickness Microsoft 365 Cables Inbound Marketing Scalability Comparison Google Play Google Drive Upload Procurement Software License Administrator Text Messaging Proactive IT Social Network FinTech Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Point of Sale Bring Your Own Device Television Security Cameras Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value Cabling Devices Cyber security Electronic Payment Shortcuts Music Customer Resource management Organization Fileless Malware Tablet Smart Devices G Suite Tip of the week Staffing IP Address Mouse VoIP Gamification Remote Working Tracking Company Culture Telephone System AI Regulations Trend Micro Botnet Be Proactive Phone System Micrsooft Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Web Server Transportation Rental Service Digital Payment Desktop Wasting Time Flash SharePoint Content Electronic Medical Records Worker Accountants eCommerce Modem Workplace Strategies Telephone Systems Business Growth Competition Videos Access Database Surveillance Recovery Public Cloud Managing Costs Computer Accessories Time Management Health IT Equifax LiFi SSID Banking Entrepreneur Google Wallet Application Deep Learning Audit Media Spyware Tactics Development Hard Drive Disposal Employer/Employee Relationships Documents Messenger File Sharing Virtual Machine Business Intelligence Username Redundancy Reviews Startup Optimization Freedom of Information Smart Technology Business Metrics Hosted Solution Navigation 2FA Cache Addiction email scam Teamwork Securty Books Workers Mobile Security Hypervisor Domains Language Society Unified Threat Management Data Storage

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?