Our Blog

T-Mobile Data Breach Said to Have Impacted over 40 Million People

Aug 19, 2021 | Blog, Week By Week Breach

virus

Hackers Leave Over 40 Million T-Mobile Customers, Past and Present, Exposed

T-Mobile, the mobile telecommunications company, recently suffered one of the largest data breaches in company history. Making this the 5th breach in the past 4 years with the past two in 2020, one in 2029, and one in 2018. 

The investigation began this past weekend with the breach officially happening this past Tuesday, August 17th. The breach affects as many as 8 million postpaid subscribers, 850,000 prepaid customers and a little over 40 million past or prospective customers. No financial information has been found released online, however, the information confirmed to have been leaked is as follows:

  • Full Names
  • Addresses
  • Driver’s License Numbers
  • Date of Birth

The company is recommending all T-Mobile customers change their account PINs, despite no evidence that Account PINs have been compromised.

Customers of other T-Mobile prepaid brands including Metro, Boost and former Sprint prepaid customers have not had their PINs or names exposed, T-Mobile added. T-Mobile said in addition, the company will offer two years of free credit monitoring to affected customers. 

 To read the full notification, click here

 

HOW SECURE HALO CAN HELP

Breaches happen all the time– what can be done?

Here at secure Halo, we offer a variety of services.  We offer Security Programs and Strategic Planning, strengthening the internal team to protect against data breaches. Security program development and strategic planning is critical to a proactive and resilient cybersecurity posture. It requires a focus not simply on data security, but also on the people and processes of your organization. Secure Halo can assist your team in building an enterprise security program to help prevent intellectual property theft, secure sensitive or valuable data, and maintain business continuity. To learn more, click here.

Contact Us

More Articles from Our Blog

Top 5 Cyber Threats to Business

Top 5 Cyber Threats to Business

Top 5 Cyber Threats to Business With the ever-growing digital age, cyber crime is on a constant rise, and no one seems to be quite safe-- especially small businesses. Small businesses seem to be the primary target for cyber relating crimes, being targeted for a...

read more
Cyber’s Gender Gap

Cyber’s Gender Gap

Cyber's Gender Gap Cybersecurity and Information Technology holds a reputation for being a field of study continuously dominated by men. In 2021, women made up roughly 20-24% of the cybersecurity workforce and we now have 3.5 million unfilled cybersecurity jobs,...

read more
Supply Chain Vulnerabilities and TPRM

Supply Chain Vulnerabilities and TPRM

Supply Chain Vulnerabilities and TPRM Supply chain management and Third Party Risk Management (TPRM). Is there a difference? Companies often don't realize how frequently security breaches happen with their suppliers and third party companies, and more importantly, how...

read more