croom new

Patriot Tech Services Inc. Blog

Hack of Capital One Exposes Information on 100,000 Customers

Hack of Capital One Exposes Information on 100,000 Customers

Capital One is one of the largest credit card issuers in the world. On July 29th 2019, Capital One made an announcement, confirming it is the victim of one of the largest data breaches in financial sector history, as a former software engineer for Amazon has been indicted on charges related to the hacking.

Here’s what we know:

Capital One has admitted that the personally identifiable information (PII) of over 100 million American and Canadian credit applicants’ information has been exposed. The company did admit that no credit card account numbers or authentication credentials were compromised in the hack. They also go on to mention that in 99 percent of the files, social security numbers were not compromised. The largest category of information that was accessed were individual and small business credit applications that span from 2005 to 2019.

The perpetrator, Paige Thompson of Seattle, Washington, was a former software developer for Amazon Web Services (AWS), which took advantage of a firewall misconfiguration to gain access to the information, AWS confirmed Monday. The flaw came as a result of a setup error and not a flaw within the massively popular AWS.

The breach happened on March 22 to 23, 2019. Thompson was apprehended as a result of being reported to Capital One for storing incriminating evidence on her Github and Slack accounts. Capital One contacted the FBI on July 19, 2019 and after a short investigation, Thompson was arrested and indicted by the Western District of Washington.

The CEO of Capital One, Richard Fairbank released the following statement:

“While I am grateful that the perpetrator has been caught, I am deeply sorry for what has happened. I sincerely apologize for the understandable worry this incident must be causing those affected and I am committed to making it right.”

For a full report of the event, visit:

Capital One has said that it will inform you if you have been a victim of this massive attack, but if like many of us, too much is at stake to wait for the company to reach out to you, you can take some immediate steps to safeguard your personal information.

  • Check your accounts - Account monitoring and fraud detection should be a major part of any action you take to secure personal information.
  • Change passwords - One great way to at least feel more secure after a major hack like this is to immediately change your passwords.
  • Freeze your credit report - One option you can take to protect yourself is to freeze your credit report, this won’t let any credit reporting services check your credit, meaning if someone were to try to take money out in your name that the banks wouldn’t be able to authorize credit.
  • Avoid scams - A big part of keeping any data secure is to not give unauthorized parties access to it. That means avoiding phishing attacks and other scams.
  • Continued vigilance - Vigilance over your account information, your personally identifiable information, and your overall financial health is more important than ever. As mentioned above, credit monitoring and fraud detection services give users tools to combat unauthorized access.

Keeping yourself and your business secure online is more difficult than ever. To learn more about data security, subscribe to our blog.

Tip of the Week: Organization Inside Windows 10
Best Practices for Setting Up Your Backups and You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, August 24 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Network Security Internet Productivity Hackers Business Computing Google Cloud User Tips Microsoft Innovation Software Computer Data Tech Term Efficiency Malware Mobile Devices Business Management Workplace Tips Smartphones Hardware Data Backup Smartphone Browser Hosted Solutions Email Windows 10 Upgrade Data Recovery Windows 10 Small Business Apps Internet of Things Office 365 Backup Business IT Services Communication communications Android Windows Gadgets Cybersecurity IT Support Mobile Device Management Miscellaneous Data Security Business Continuity Network Passwords Outsourced IT Productivity Best Practice VoIP Automation Operating System Artificial Intelligence Disaster Recovery Health Cybercrime Spam Holiday Information Server Employer-Employee Relationship Users Gmail Managed Service Two-factor Authentication Networking Virtualization Office Saving Money Phishing OneNote Social Media Blockchain Ransomware Managed Service Provider Hacking Google Drive Data Management Money Budget Wireless Applications Facebook Remote Computing User Error Bandwidth Update Bring Your Own Device Word Vulnerability Managed IT Services Alert Cost Management Chrome Tech Support Microsoft Office Government Collaboration Law Enforcement Travel Mobile Device DDoS Wireless Charging Conferencing Search Politics Sports Cortana Proactive IT Personal Information Risk Management Encryption Data Breach Firewall Access Control Data Loss Quick Tips Financial Going Green Telephony eWaste Evernote Project Management Information Technology Wireless Technology Human Resources Managed IT Services Google Docs Meetings Devices The Internet of Things Saving Time Router Computers Social Engineering Printing Hybrid Cloud Apple Save Money Mobile Security Wi-Fi Password Windows 7 BYOD Streaming Media Business Technology Recovery Cloud Computing Telephone Systems VPN Google Assistant Safety Application Fraud iPhone Retail Social File Sharing Marketing Office Tips App Internet Exlporer Identities Software as a Service Biometrics Testing Smartwatch Data storage Value Emergency Security Cameras IT solutions Audit Edge Virtual Assistant PowerPoint OneDrive Wearable Technology Administrator Data Privacy Peripheral Storage Hosted Solution Break/Fix Augmented Reality Data Theft Reputation Identity Theft Co-Managed Services Development Touchscreen Avoiding Downtime Maintenance Memory Tablets Language Camera Server Maintenance Distributed Denial of Service Machine Learning Ciminal Alexa for Business Voice over Internet Protocol Remote Monitoring Running Cable Access Gifts Hard Drive WiFi Medical IT Customer Service Teamwork Legislation Computing Telephone Micrsosoft Data Protection Trending History Device Security WannaCry NFL Bluetooth Instant Messaging Projects Investment Computer Forensics Downtime BDR Vendor Sabotage Transportation Credit Cards Chromebook Admin 5G Files Comparison App store Humor Hyperlink Digital Signage Shortcut IT Management Private Cloud E-Commerce Fax Server Uninterrupted Power Supply Virus ROI SaaS Television Laptop Workers Management Benefits IT budget Business Intelligence Vendor Management Employee-Employer Relationship PC Bloatware Managed IT Robot FAQ Keyboard Shortcuts Excel Antivirus YouTube Microsoft Excel Specifications IT Support Wasting Time Processor Spyware Payment Cards Windows Ink Proactive Battery Windows Server 2008 R2 Customer Relationship Management Touchpad Updates Wireless Internet Mobility Branding Mobile Computing Paperless Office Lithium-ion battery Commerce Charger PDF Payroll Amazon Legal Scam Employees Chromecast Sales Identity Entertainment Accessory Education Patch Management Employee Google Maps Disaster Websites Display Mobile Office Operating Sysytem Microsoft Word Gamification Hacker Black Market Training Text Messaging intranet Flexibility Employer Employee Relationship Virtual Reality Cache Experience Solid State Drive Outlook Analytics SharePoint HBO Printer Server Phone System Keyboard Computer Fan Near Field Communication Company Culture Data Storage Twitter Cleaning Thank You Presentation Scalability Music Hard Disk Drive Sync Hiring/Firing CrashOverride Worker Commute Network Congestion Emails Science Automobile Screen Mirroring Worker Congratulations How To Computer Care Unified Threat Management End of Support Books Big Data Smart Technology User Work/Life Balance Webinar Monitors USB Printers Cast Tablet WIndows 7 Compliance Current Events Unsupported Software Administration IT consulting Advertising Electronic Medical Records Adobe Video Games Relocation IT solutions WIndows Server 2008 Nanotechnology Computer Accessories Upgrades Cameras Managing Stress Save Time Regulation Samsung Regulations iOS Licensing Best Available Settings Windows 10s Hard Drives Root Cause Analysis Point of Sale Mouse Consultant Printer HaaS

Sign Up For Our Newsletter

  • First Name *
  • Last Name *

      Latest Blog Entry

      When you are in the market for some new computers for your business, ensuring that you are targeting the right hardware is important. To educate people on what they should be looking for in a new computer, we have decided to put together a multi-part series detailing the dif...

      Latest News

      Patriot Tech Services Inc. launches new website!

      Patriot Tech Services Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login