Once again, personal data is stolen.

Following the latest events concerning the leak of confidential data belonging to 2.9 million Desjardins members, we wanted to bring our point of view and our recommendations to this situation.

First of all, the situation is complex, but above all very serious. Our technological product developer's expertise positions us as "creative brains" with the goal of making life easier for our users. Unfortunately, there are "creative brains" that work to greatly harm people's lives. Specifically, hackers have the opportunity to wreak havoc when we talk about a person's "digital" life.

This reality of "gigantic damage" is linked to three elements where hackers are refining their practices:

  1. 1. To "trace-free intrusion" in systems to go to the data source:
  2. Entering a system with unauthorized, disguised or simply stolen access. Most of the time, these intrusions are made by people from outside. However, as in the case of Desjardins, this reality can very often combine "physical" and "digital" stratagems. An internal person in an organization and his or her colleagues have the confidence of their employer. This confidence is often blind, but too often betrayed cavalierly and without mercy.

  3. 2. "Export in a few seconds" of millions of data:
  4. The damage starts here. One of the first functions of technology in our lives is to accelerate certain facets of our daily lives. Unfortunately, this digital "speed" is also used by hackers and it allows them to execute extremely fast crimes involving a huge amount of data.

  5. 3. Identity theft:
  6. Here, hackers collaborate with other criminals. It is a ploy that involves well-organized and often international networks. Hackers only sell pirated confidential data as a batch.

In short, a hacker is a priori a human being with convictions and is very often "impersonal and external" to your company. In any case, point # 1 is the starting point. In fact, e-mail boxes are the main gateway for hackers to make "trespassing intrusions".

I, therefore, recommend you to be proactive and eliminate these intrusions by opting for a solution that encrypts your communications by email. TagMyDoc can help you, do not hesitate to contact a TagMyDoc expert to know how we can do it: https://www.tagmydoc.com/contact