Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Acer Breach Compromised Customer Credit Cards

Alert: Acer Breach Compromised Customer Credit Cards

Users of Acer’s online store between May 12th, 2015, and April 28th, 2016, may be in for a rude awakening. Acer may be attempting to contact you to relay that your credit card’s credentials have been lifted by hackers. The breach in question resulted in 34,500 customers having their credentials stolen, including the user’s name, address, credit card number, expiration date, and security code.

In other words, the breach revealed basically everything that a hacker would need to hijack your identity and make fraudulent purchases using your finances. Those were are affected by this breach are limited to the United States, Canada, and Puerto Rico, though it’s always a best practice to check on your accounts for any unauthorized transactions. In-store customers should also keep tabs on their accounts, just to be on the safe side.

Acer has kept quiet to the nature of the breach, perhaps due to internal user error. This is one of the major reasons why data breaches happen, and it can be as easy as giving sensitive credentials, like passwords or usernames, to the wrong person. All it takes is one phishing email to trick an employee who doesn’t know any better, which is both an embarrassing and frustrating occurrence.

Acer, due to their relatively large consumer base, was a big target for hackers and criminals, but this doesn’t mean that small companies are any safer from threats. While it certainly helps to keep a low profile, today’s online environment shows that even inconspicuous small businesses could accidentally contract and foster the growth of viruses or malware. The best bet that your business has is to prepare for the worst and to educate your employees on how to keep themselves and your business’s data safe in an online environment.

These best practices include:

  • Practice good judgment: If an employee opens up an email that seems to be legitimate, and clicks on suspicious links or attachments, this invites tragedy into your business’s network. Phishing attacks, like the aforementioned example, are common threats that your employees need to be prepared to deal with. Educate your employees on how to identify common signifiers of phishing attacks, and to approach each message with a critical eye.
  • Make security part of company culture: Password protocol is a major problem, particularly because people tend to use simple passwords that are easy to remember, rather than ones that are secure. Therefore, you need to reinforce that your employees should use complex passwords that combine letters, numbers, and symbols. These passwords should be changed regularly, just to stay on the safe side.

For more assistance with keeping your data protected, contact Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 01 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Email Google Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords AI Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Information Automation Artificial Intelligence Facebook Miscellaneous Holiday Covid-19 Gadgets Cloud Computing Compliance Training Managed Service Provider Outsourced IT Remote Work Server IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Blockchain Business Technology Windows 10 Bandwidth Virtualization Wi-Fi Two-factor Authentication Vendor Data Security Apps Managed Services Mobile Office Mobile Device Management Tip of the week Gmail Chrome WiFi Budget Networking Apple Employer-Employee Relationship App BYOD Voice over Internet Protocol Access Control HIPAA Office 365 Applications Managed IT Services How To BDR Conferencing Hacker Physical Security Avoiding Downtime Computing Information Technology Marketing Health 2FA Analytics Office Tips Router Augmented Reality Retail Storage Password Big Data Bring Your Own Device Help Desk Computers Operating System Healthcare Virtual Private Network Website Risk Management Paperless Office Infrastructure Windows 11 Free Resource Project Management Firewall Windows 7 Document Management Excel Microsoft 365 Solutions The Internet of Things Scam Data loss Monitoring Social Patch Management Save Money Managed IT Service Customer Service Remote Monitoring Going Green Vulnerability Telephone End of Support Vendor Management Cybercrime Remote Workers Cooperation Display Printer Telephone System Word Cost Management Vulnerabilities Virtual Desktop Data storage LiFi Images 101 Supply Chain Machine Learning Mobility Outlook Multi-Factor Authentication Safety Money Modem User Tip Humor Processor Maintenance Mobile Security Antivirus Employees Integration Sports Mouse Smart Technology Administration Holidays Data Privacy Saving Time Customer Relationship Management Data Storage Robot Video Conferencing Downloads Hacking Managed Services Provider Virtual Machines Professional Services Settings Presentation IT Management Printing Licensing Wireless Content Filtering VPN Meetings Wireless Technology Entertainment YouTube Cryptocurrency Computer Repair iPhone Monitors Legislation Tech Experience Outsource IT Hard Drives Telework Google Docs Social Networking Cyber security Unified Communications Communitications Bitcoin Running Cable Environment Domains Fileless Malware CES Media Content Supply Chain Management Google Wallet Websites Wearable Technology Comparison Term Small Businesses Refrigeration Health IT FinTech Motherboard Assessment IT Assessment Windows 8 Electronic Medical Records Permissions Laptop Displays SharePoint Public Speaking Directions Lithium-ion battery Flexibility Drones Value Writing Specifications Outsourcing Lenovo Organization Entrepreneur Microchip Digital Security Cameras Internet Exlporer Smart Devices Virtual Reality Fraud Halloween Workplace Server Management Username Remote Working Private Cloud Memory Data Breach Black Friday Google Play Hiring/Firing Superfish Undo Identity Theft Videos Paperless Database Electronic Health Records Hacks Twitter Scary Stories Fun Co-managed IT Error IT Technicians Wasting Time Cookies Trend Micro Deep Learning Social Engineering Cyber Monday Security Cameras Technology Care Proxy Server Business Communications Tactics Software as a Service Remote Computing Hotspot Scams Application Mirgation Managing Costs Education Nanotechnology eCommerce SSID Hybrid Work Tablet IBM Human Resources Addiction Surveillance Mobile Computing Alert Language Virtual Assistant Search Cables Managed IT Management File Sharing Chatbots Virtual Machine Dark Data Screen Reader Best Practice How To Distributed Denial of Service Medical IT Reviews Google Apps Service Level Agreement Development Notifications Computing Infrastructure Transportation Buisness IT Maintenance Legal Travel Identity Hypervisor IT solutions Smart Tech Optimization Business Growth PowerPoint Business Intelligence Techology Competition Bookmark Shopping Google Maps Shortcuts Download Alerts Employer/Employee Relationships Navigation Cortana Ransmoware PCI DSS Unified Threat Management Connectivity Alt Codes Break Fix Vendors Unified Threat Management Browsers Gig Economy Be Proactive User Upload Internet Service Provider Teamwork Downtime Multi-Factor Security Evernote Workforce Social Network Regulations Compliance Hosted Solution Network Congestion IoT Memes Typing Dark Web Threats User Error IP Address Workplace Strategies Trends Net Neutrality SQL Server Google Calendar Knowledge Meta Customer Resource management Financial Data Google Drive Point of Sale Regulations History Star Wars IT Microsoft Excel Amazon Data Analysis Smartwatch Network Management Recovery Gamification Procurement Tech Support Staff Azure 5G

Blog Archive