{"id":36803,"date":"2024-08-20T08:57:52","date_gmt":"2024-08-20T08:57:52","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=36803"},"modified":"2024-08-20T08:57:53","modified_gmt":"2024-08-20T08:57:53","slug":"national-public-data-breach","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/","title":{"rendered":"2.9 Billion Records Exposed in NPD Breach: How to Stay Safe"},"content":{"rendered":"\n<p>A cataclysmic data breach has cast a long shadow over the privacy of billions of individuals. Reports claim that a staggering 2.9 billion records, including Social Security numbers, have been compromised in a <a href=\"https:\/\/www.esecurityplanet.com\/threats\/what-is-a-cyber-attack\/\">cyberattack<\/a> targeting National Public Data (NPD), a company specializing in background checks.<\/p>\n\n\n\n<p>This unprecedented scale of data exposure highlights the vulnerabilities inherent in our interconnected world and the immense value placed on personal information by cybercriminals. The fallout from this breach has the potential to ripple through societies globally, with far-reaching consequences for individuals, businesses, and governments alike.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">What We Know of the NPD Breach<\/h2>\n\n\n\n<p>NPD is an online background check and fraud prevention service that gathers information from various sources, including public record databases, court records, and state and national repositories.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bloomberglaw.com\/public\/desktop\/document\/HofmannvJericoPicturesIncDocketNo024cv61383SDFlaAug012024CourtDoc?doc_id=X6S27DVM6H69DSQO6MTRAQRIVBS\" target=\"_blank\" rel=\"noreferrer noopener\">A complaint<\/a> filed in the U.S. District Court claims that NPD experienced a data breach around April 2024, alleging the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/compliance\/data-deletion-methods-for-sensitive-data\/\">Sensitive data<\/a>, such as full names, current and previous addresses (going back at least 30 years), Social Security numbers, and details about family members, including some who have been deceased for nearly two decades, were compromised.<\/li>\n\n\n\n<li>The company allegedly obtained this information from non-public sources without the consent of the person filing the complaint or the potentially billions of others affected by the data collection.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>NPD reportedly had a legal and ethical responsibility to protect and secure this information from unauthorized access and breaches, a duty it allegedly failed to uphold.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">The Scale of the Breach<\/h2>\n\n\n\n<p>The sheer magnitude of this data breach is almost incomprehensible. With an estimated 2.9 billion records compromised, it dwarfs previous data breaches in scale and scope. For perspective, the global population is 8.2 billion, meaning this breach potentially affects nearly half of the world&#8217;s population. The implications of such massive data exposure are far-reaching, potentially impacting individuals, businesses, and governments globally.<\/p>\n\n\n\n<p>The industries and sectors affected by this breach are equally vast. Given the nature of the stolen data, the financial sector will likely be a prime target for cybercriminals. However, the repercussions extend beyond finance, as this data can be used for various fraudulent activities, from identity theft to medical fraud.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">Who Is Behind the NPD Breach?<\/h2>\n\n\n\n<p>Typically, regulations require companies to promptly report data breaches, informing customers through emails, news reports, and sometimes notifications to state attorneys general. However, in this instance, no such notifications were sent to potential victims, and no records of filings with state attorneys general were found.<\/p>\n\n\n\n<p>The primary plaintiff uncovered the breach after receiving an alert from their identity theft protection service, which indicated that their personal information had been compromised in the \u201cnationalpublicdata.com\u201d breach. This highlights another way people might learn about a data breach before the company involved discloses it \u2014 through identity theft protection services.<\/p>\n\n\n\n<p>Moreover, in June, The Register reported that a hacker group called USDoD claimed responsibility for hacking the records of nearly <a href=\"https:\/\/www.theregister.com\/2024\/06\/03\/usdod_data_dump\/\" target=\"_blank\" rel=\"noreferrer noopener\">3 billion individuals<\/a>, putting them up for sale on the dark web for $3.5 million. The group asserted that these records included personal data from U.S., Canadian, and British citizens.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">How to Protect Yourself From Data Breaches?<\/h2>\n\n\n\n<p>There are many <a href=\"https:\/\/www.esecurityplanet.com\/networks\/tips-to-mitigate-data-breaches\/\">ways to prevent data breaches<\/a> and stay safe from them. Here are a few things that you can do to ensure your safety:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">1. Use Strong, Unique Passwords<\/h3>\n\n\n\n<p>Weak passwords are easy for hackers to guess or crack, especially if they\u2019re common or reused across multiple sites.<\/p>\n\n\n\n<p>When creating passwords, use at least 12 characters, combining uppercase and lowercase letters, numbers, and special symbols. Steer clear of using easily guessed details like your name or birthdate. Using a password manager can help you generate and store complex passwords without remembering each one.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">2. Enable Multi-Factor Authentication (MFA)<\/h3>\n\n\n\n<p>Even if your password is compromised, MFA adds an extra layer of security by requiring a second verification form, such as a code sent to your phone or generated by an authentication app.<\/p>\n\n\n\n<p>Activate <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\">multi-factor authentication<\/a> on all accounts where it&#8217;s available, especially on email, banking, and social media platforms. This can typically be done in the account settings under the security section. Choose a convenient but secure method, like an app-based authenticator rather than SMS, which can be vulnerable to SIM-swapping attacks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">3. Sign Up for Identity Theft Protection<\/h3>\n\n\n\n<p>Identity theft protection services monitor your personal information across the web, including the dark web, and alert you to any signs of misuse. They often include insurance and recovery assistance if your identity is compromised.<\/p>\n\n\n\n<p>Research and choose a reputable identity theft protection service that fits your needs. These services typically offer continuous monitoring, alerts for suspicious activity, and support for recovering from identity theft. Some even monitor your Social Security number, email addresses, and more.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">4. Use Encryption<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/networks\/encryption\/\">Encryption<\/a> ensures that your data is unreadable to anyone who doesn\u2019t have the decryption key. This is crucial for protecting sensitive information from being intercepted or accessed by unauthorized parties.<\/p>\n\n\n\n<p>Use encrypted messaging apps like Signal or WhatsApp for private communications. Enable full-disk encryption for files stored on your devices, often built into modern operating systems (e.g., BitLocker for Windows and FileVault for Mac). Additionally, consider using encrypted <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/most-secure-cloud-storage\/\">cloud storage services<\/a> to store sensitive documents.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">5. Keep Your Software Updated<\/h3>\n\n\n\n<p>Software updates often come with bug fixes for security vulnerabilities that attacks might exploit. Running outdated software increases the risk of being targeted by malware or other attacks.<\/p>\n\n\n\n<p>Enable automatic updates on your operating system, web browser, and apps whenever possible. Regularly check for updates to any software that doesn\u2019t automatically update, including antivirus programs, firewalls, and other security tools. Updating firmware on devices like routers and smart home gadgets is also important.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">6. Be Wary of Phishing Scams<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\">Phishing attacks<\/a> trick you into giving away personal information or installing <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware\/\">malware<\/a> by posing as legitimate contacts or companies. These scams can be highly convincing and are a common way for hackers to access your accounts.<\/p>\n\n\n\n<p>Always double-check the sender\u2019s email address, especially if you receive an unexpected message asking for personal information. Also, don\u2019t click on links or download attachments from suspicious sources.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">7. Freeze Your Credit<\/h3>\n\n\n\n<p>Freezing your credit prevents new accounts from being opened in your name, which can help stop identity thieves from using your personal information to take out loans or open credit cards.<\/p>\n\n\n\n<p>Contact each of the major credit bureaus (Equifax, Experian, and TransUnion) to place a freeze on your credit. This is usually free and can be done online or over the phone. If you need to apply for new credit, you can temporarily lift the freeze and reapply it afterward.<\/p>\n\n\n\n<p>Also, stay informed about the current data breaches and cybersecurity news to take immediate action and protect your information if necessary. Subscribe to cybersecurity news sources or set up Google Alerts for terms like &#8220;data breach&#8221; or &#8220;identity theft.&#8221; When you hear about a breach involving a service you use, consider changing your passwords immediately \u2014 and monitor your accounts closely.<\/p>\n\n\n\n<p><strong>Learn how to use <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\">password managers<\/a> to further strengthen your cybersecurity posture and stay safe from data breaches.<\/strong><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6df7e2c868-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6df7e2c868\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6df7e2c868\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6df7e2c868\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6df7e2c868\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6df7e2c868\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6df7e2c868\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>2.9 billion records exposed in the NPD breach, including Social Security numbers. Read about the impact and how to protect yourself.<\/p>\n","protected":false},"author":286,"featured_media":36804,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[16],"tags":[],"b2b_audience":[],"b2b_industry":[],"b2b_product":[],"class_list":["post-36803","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trends"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>2.9 Billion Records Exposed in NPD Breach: How to Stay Safe<\/title>\n<meta name=\"description\" content=\"2.9 billion records exposed in the NPD breach, including Social Security numbers. Read about the impact and how to protect yourself.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2.9 Billion Records Exposed in NPD Breach: How to Stay Safe\" \/>\n<meta property=\"og:description\" content=\"2.9 billion records exposed in the NPD breach, including Social Security numbers. Read about the impact and how to protect yourself.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-20T08:57:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-20T08:57:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-national-public-data-breach.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sunny Yadav\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sunny Yadav\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/\"},\"author\":{\"name\":\"Sunny Yadav\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e0a1187060905629a5334c30c87841df\"},\"headline\":\"2.9 Billion Records Exposed in NPD Breach: How to Stay Safe\",\"datePublished\":\"2024-08-20T08:57:52+00:00\",\"dateModified\":\"2024-08-20T08:57:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/\"},\"wordCount\":1173,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-national-public-data-breach.png\",\"articleSection\":[\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/\",\"name\":\"2.9 Billion Records Exposed in NPD Breach: How to Stay Safe\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-national-public-data-breach.png\",\"datePublished\":\"2024-08-20T08:57:52+00:00\",\"dateModified\":\"2024-08-20T08:57:53+00:00\",\"description\":\"2.9 billion records exposed in the NPD breach, including Social Security numbers. Read about the impact and how to protect yourself.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-national-public-data-breach.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-national-public-data-breach.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: Song_about_summer\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2.9 Billion Records Exposed in NPD Breach: How to Stay Safe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e0a1187060905629a5334c30c87841df\",\"name\":\"Sunny Yadav\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/06\/Sunny_Photo-150x150.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/06\/Sunny_Photo-150x150.jpeg\",\"caption\":\"Sunny Yadav\"},\"description\":\"Sunny is a contributing writer for eSecurity Planet with a bachelor's degree in technology and years of experience writing for reputed cybersecurity publications. He mostly writes about cyberattacks, cryptography, data protection, and threats and vulnerabilities. Sunny also covers security policies and governance along with endpoint and mobile security. When he's not burning the midnight oil, you can find Sunny cleaning his house, shopping for things he doesn't need, or harassing his friends to read The Wheel of Time.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/sunny-yadav\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2.9 Billion Records Exposed in NPD Breach: How to Stay Safe","description":"2.9 billion records exposed in the NPD breach, including Social Security numbers. Read about the impact and how to protect yourself.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/","og_locale":"en_US","og_type":"article","og_title":"2.9 Billion Records Exposed in NPD Breach: How to Stay Safe","og_description":"2.9 billion records exposed in the NPD breach, including Social Security numbers. Read about the impact and how to protect yourself.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/","og_site_name":"eSecurity Planet","article_published_time":"2024-08-20T08:57:52+00:00","article_modified_time":"2024-08-20T08:57:53+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-national-public-data-breach.png","type":"image\/png"}],"author":"Sunny Yadav","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sunny Yadav","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/"},"author":{"name":"Sunny Yadav","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e0a1187060905629a5334c30c87841df"},"headline":"2.9 Billion Records Exposed in NPD Breach: How to Stay Safe","datePublished":"2024-08-20T08:57:52+00:00","dateModified":"2024-08-20T08:57:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/"},"wordCount":1173,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-national-public-data-breach.png","articleSection":["Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/","url":"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/","name":"2.9 Billion Records Exposed in NPD Breach: How to Stay Safe","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-national-public-data-breach.png","datePublished":"2024-08-20T08:57:52+00:00","dateModified":"2024-08-20T08:57:53+00:00","description":"2.9 billion records exposed in the NPD breach, including Social Security numbers. Read about the impact and how to protect yourself.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-national-public-data-breach.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-national-public-data-breach.png","width":1400,"height":900,"caption":"Image: Song_about_summer\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/national-public-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"2.9 Billion Records Exposed in NPD Breach: How to Stay Safe"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e0a1187060905629a5334c30c87841df","name":"Sunny Yadav","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/06\/Sunny_Photo-150x150.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/06\/Sunny_Photo-150x150.jpeg","caption":"Sunny Yadav"},"description":"Sunny is a contributing writer for eSecurity Planet with a bachelor's degree in technology and years of experience writing for reputed cybersecurity publications. He mostly writes about cyberattacks, cryptography, data protection, and threats and vulnerabilities. Sunny also covers security policies and governance along with endpoint and mobile security. When he's not burning the midnight oil, you can find Sunny cleaning his house, shopping for things he doesn't need, or harassing his friends to read The Wheel of Time.","url":"https:\/\/www.esecurityplanet.com\/author\/sunny-yadav\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36803"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/286"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=36803"}],"version-history":[{"count":1,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36803\/revisions"}],"predecessor-version":[{"id":36805,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36803\/revisions\/36805"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/36804"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=36803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=36803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=36803"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=36803"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=36803"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=36803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}