Ticketmaster Suffers Major Data Breach

Ticketmaster Suffers Major Data Breach

The world’s largest ticket retailer is in hot water after their parent company, Live Nation Entertainment filed an 8-K filing with the Security and Exchange commission admitting that they had been hacked to the tune of 1.3 terabytes of information. That amounts to 560 million customers’ personal information that has been stolen from the company’s servers. Today, we take a look at the hack and what it means for consumers.

About the Hack

A hacking group by the name of ShinyHunters breached the Live Nation Entertainment servers and was able to get their hands on a massive amount of customer data. In media reports, they gained access to the data through a third-party cloud provider and were able to take the lot of it. According to the cloud provider, the breach was a result of users who didn’t turn on their multi-factor authentication, and was breached using credentials the hackers had already obtained through the use of infostealing malware. 

How to Keep from Being a Victim of Identity Theft

If a retailer you do business with gets hacked, there really isn’t any recourse. Stand up companies will offer something—even if it is only credit monitoring—to make up for the breach of trust. There are things you can do, however, to protect yourself from identity theft. They include:

Secure Your Personal Information

  • Use strong passwords – Create complex passwords that include a mix of letters, numbers, and special characters. Avoid using easily guessable information like birthdays or simple sequences.
  • Enable multi-factor authentication – Use two-factor authentication (2FA) wherever possible to add an extra layer of security to your accounts.
  • Be careful with personal documents – Store important documents, such as your Social Security card, birth certificate, and passport, in a safe place.

Monitor Your Accounts Regularly

  • Check bank and credit card statements – Regularly review your statements for any unauthorized transactions and report them immediately.
  • Monitor your credit report – Obtain a free credit report annually from each of the three major credit bureaus. Look for unfamiliar accounts or incorrect information.
  • Set up alerts – Many financial institutions offer account alerts that can notify you of suspicious activity, such as large purchases or changes to your account information.

Be Cautious Online and Offline

  • Beware of phishing scams – Be wary of emails, texts, or phone calls requesting personal information. Verify the sender’s authenticity before clicking on links or providing information.
  • Use secure connections –  When shopping or banking online, ensure the website is secure by looking for “https://” in the URL and a padlock symbol. Don’t connect to unsecured Wi-Fi networks.
  • Limit sharing personal information – Be cautious about sharing personal information on social media and other online platforms. Information like your full name, address, phone number, and date of birth can be used by identity thieves.

If you are one of the millions of people that do business with Ticketmaster every year, keep your eyes and ears open to know exactly what kind of exposure you have to this particular hack. If you would like to follow cybersecurity and business technology, please return to our blogs soon.

Related Posts

A Man-in-the-Middle Attack is Not to Be Underestimated

Have you ever heard of the “man-in-the-middle” attack or MitM? It’s a situation where your data is stolen by an onlooker who situates themselves in the right place at the right time. Data interception is a very real thing that your business should be prepared to fight against. Let’s discuss some strategies you can use to counter these sneaky attacks. How a Man-in-the-Middle Attack Works For a ...

How to Keep the Bad Guys From Winning

There’s a reason why we tend to focus on security, and that’s because it’s not a matter of if you experience a cyberattack, but when. It’s your responsibility to make sure that you’re ready to act in the right way when faced with these attacks. One of the best ways you can be prepared is by working with a managed service provider like us. Today, we have three ways we, as a managed service provider...

These IT Threats Can Ruin Your Business

Technology is a major part of today’s business. It’s fair to say anyone that works in business today is at least semi-proficient with the technology needed to complete their tasks. Unfortunately, for many people, however, the fact that their business requires complicated technology is problematic. This is because at any given moment there are people looking to undermine their job, seeking access t...

Knowing, and Planning For, Your Organization’s Compliance Burden

Despite what detractors say, regulations are in place for good reason. They typically protect individuals from organizational malfeasance. Many of these regulations are actual laws passed by a governing body and cover the entire spectrum of the issue, not just the data involved. The ones that have data protection regulations written into them mostly deal with the handling and protection of sensiti...