Welcome!

News Feed Item

TransUnion Alerts Canadians to StubHub Data Breach and Arms Them With Tips for Creating Stronger Passwords

TORONTO, ON -- (Marketwired) -- 07/23/14 -- Today, StubHub, the ticket reselling company, announced that cyberthieves accessed the accounts of more than 1,000 customers and bought tickets for unspecified events. The breach reaches from the United States to Canada to the United Kingdom. The thieves got the login and password information of account holders from data breaches at other Web sites -- another reason not to use the same information for multiple Web sites. TransUnion, one of the national credit reporting companies that helps individuals protect their identity, takes this opportunity to remind consumers of how to create stronger passwords to better minimize their risk of becoming a victim of identity theft.

"Identity thieves are getting smarter and faster at stealing consumers' personal information -- so consumers have to act smart and stay ahead of them," said Ken Chaplin, senior vice president at TransUnion. "Consumers should change their online account passwords more often and create passwords that are difficult for an identity thief to decode."

At TransUnion, we think of ourselves as your partner in identity and credit protection. That's why we'd like to share some easy ways you can create strong passwords.

  • Different account? Different password. If a thief steals from one of your accounts, don't make it easy for them to steal from others.
  • Don't be obvious. The first passwords thieves will try are ones like: password, 1234567890 or similar.
  • Be random. Pick something obscure. Don't use your name and stay away from real words.
  • Misspelling is good. If your password is "I hate yellow" replace some letters with numbers and symbols like "1 h8 y3Ll0w
  • The longer, the better. The longer the password, the harder it could be to figure out.
  • Use a mnemonic. Think up a sentence, such as "My favorite color is green," and use the first or last letter of each word as your password ("Mfcig" or "yErsN" in the example).

Strong passwords are a must. But with so much of our personal data spread across the web -- and with thieves getting smarter and smarter -- creating good passwords for your accounts may not be enough. Review your credit and personal information for signs of suspicious activity.

To learn more and to better safeguard your identity from thieves by obtaining your credit report, visit www.TransUnion.ca.

About TransUnion
TransUnion Interactive, Inc. is a consumer subsidiary of TransUnion. As a global leader in credit and information management, TransUnion creates advantages for millions of people around the world by gathering, analyzing and delivering information. For businesses, TransUnion helps improve efficiency, manage risk, reduce costs and increase revenue by delivering comprehensive data and advanced analytics and decisioning. For consumers, TransUnion provides the tools, resources and education to help manage their credit health and achieve their financial goals. Through these and other efforts, TransUnion is working to build stronger economies worldwide. Founded in 1968 and headquartered in Chicago, TransUnion employs associates in more than 33 countries on five continents. www.transunion.com. Follow us on Facebook at http://www.facebook.com/TransUnion.

For More Information:
John Branham
512.351.3512
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...
SYS-CON Events announced today that Enzu will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive ad...
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTrend processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
There are 66 million network cameras capturing terabytes of data. How did factories in Japan improve physical security at the facilities and improve employee productivity? Edge Computing reduces possible kilobytes of data collected per second to only a few kilobytes of data transmitted to the public cloud every day. Data is aggregated and analyzed close to sensors so only intelligent results need to be transmitted to the cloud. Non-essential data is recycled to optimize storage.
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
Stratoscale, the software company developing the next generation data center operating system, exhibited at SYS-CON's 18th International Cloud Expo®, which took place at the Javits Center in New York City, NY, in June 2016.Stratoscale is revolutionizing the data center with a zero-to-cloud-in-minutes solution. With Stratoscale’s hardware-agnostic, Software Defined Data Center (SDDC) solution to store everything, run anything and scale everywhere, IT is empowered to take control of their data ce...
In his session at @DevOpsSummit at 19th Cloud Expo, Robert Doyle, lead architect at eCube Systems, will examine the issues and need for an agile infrastructure and show the advantages of capturing developer knowledge in an exportable file for migration into production. He will introduce the use of NXTmonitor, a next-generation DevOps tool that captures application environments, dependencies and start/stop procedures in a portable configuration file with an easy-to-use GUI. In addition to captur...
SYS-CON Events announced today that SD Times | BZ Media has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. BZ Media LLC is a high-tech media company that produces technical conferences and expositions, and publishes a magazine, newsletters and websites in the software development, SharePoint, mobile development and commercial UAV markets.
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain.
In the first article of this three-part series on hybrid cloud security, we discussed the Shared Responsibility Model and examined how the most common attack strategies persist, are amplified, or are mitigated as assets move from data centers to the cloud. Today, we’ll look at some of the unique security challenges that are introduced by public cloud environments. While cloud computing delivers many operational, cost-saving and security benefits, it takes place in a public, shared and on-demand ...
Both SaaS vendors and SaaS buyers are going “all-in” to hyperscale IaaS platforms such as AWS, which is disrupting the SaaS value proposition. Why should the enterprise SaaS consumer pay for the SaaS service if their data is resident in adjacent AWS S3 buckets? If both SaaS sellers and buyers are using the same cloud tools, automation and pay-per-transaction model offered by IaaS platforms, then why not host the “shrink-wrapped” software in the customers’ cloud? Further, serverless computing, cl...