Protect your data now from a LinkedIn cybersecurity breach! Linked in had a cybersecurity breach that affected 92% of its users. To be more specific, that is 700 million users that were affected.
Not the First LinkedIn Cybersecurity Hack in 2021
Interestingly, this is the second from LinkedIn 2021. Moreover, the well known cybercriminal sold more than 500 million LinkedIn account information in April. In both instances, the hacker misused the LinkedIn API and has published evidence of 1 million accounts. Unfortunately, this information is consistent with current accounts.
As a result, the cybercriminal group is currently selling this data for only $5,000 on the dark web. Such data includes:
- Full names
- Phone Numbers
- Physical Addresses
- Email Addresses
- Geolocation Records
- LinkedIn username and profile URL’s
- Personal and professional background
- Genders
- Other social media accounts and usernames
- Inferred Salaries
Are you at Risk from The LinkedIn Cybersecurity Hack?
Fortunately, no passwords were obtained by the hackers. However, the data obtained is enough to falsify your identity. For this reason, users should beware of spear-phishing attempts to extort money. Therefore, INSIs spear-phishing article can help you and your employees identify and avoid email-based identify theft scams for your peace of mind.
INSI – The Top Atlanta GA Cybersecurity Advisors
For more information about cybersecurity preventative measures for your company, connect with the top MSP in Atlanta, Contact INSI: 770-387-2424, option 2. In addition, we offer 16 different cybersecurity programs to protect you and your data.
About the Author
Deborah Frazier is the author of IT Outsourcing Secrets – A Small Business Guide to Compare IT Support Companies. Moreover, with 20-years’ experience consulting small and medium-sized businesses on their IT support needs, she brings a wealth of knowledge to INSI as Head of Marketing and Sales. Therefore, if you like this article and would like to get notified when a new article is posted, click here