How to Prevent the Mastercard Data Breach
September 6, 2019
March 31, 2020
90,000 members of Mastercard’s Priceless Specials program had their data stolen and shared online. After discovering the breach, Mastercard suspended the German program and requested that all third party vendors delete program user information from their servers.
Mastercard initially stated that only partial credit card numbers were exposed. Now the leaked information includes: names, card data, IP addresses, phone numbers, and birthdays. The information has since been added to the popular data breach website Have I Been Pwned.
The breach occurred because the company outsourced customer data to a third party vendor. The vendor was subsequently breached, leaving Mastercard with the mess to deal with.
Data loss often occurs because too many people have access to a database. While access controls are an important aspect of security, the best way to deal with it is to protect the data itself.
At SecureCircle, we created a solution that does just that. We encrypt your data, and the encryption follows it wherever it goes. This includes the data being copied and pasted into a new file. That new file will be encrypted as well.
Only those with that are within our Circle, a predefined set of users with access to sensitive files, will be allowed to open the files. Anyone else, such as hackers that breach a database, will possess the files. However, they will be completely useless as they won’t be able to read them.
Even if an insider stole the information, it would be very easy to identify the perpetrator because all interactions with files are logged. Our logging can be integrated with the SIEM of your choosing, or you can stick to our default service.
Encryption ensures that you can protect your data even when it isn’t in your possession. This is extremely important in today’s business environment with the rise of cloud services to help with collaboration.
Keep your data safe and visit the rest of our site to find more information or schedule a demo.
Prevent Data Breaches
Let’s discuss your unique cybersecurity challenges and needs.