AT&T management staff data on stolen laptop

Share this article:
Updated on Wednesday, June 4 at 5:52 p.m. EST

An undisclosed number of management-level workers at AT&T have been notified that their personal information was stored unencrypted on a stolen laptop.

The laptop was stolen May 15 from the car of an employee, Walt Sharp, a spokesman for AT&T, told SCMagazineUS.com on Wednesday. The data on the computer was not encrypted -- a violation of company policy -- and included names, Social Security numbers and in some cases, salary and bonus information.

Sharp said the company would not disclose the number of affected individuals, but there is no reason to believe any of the data was being targeted when the machine was stolen.

"Usually these are property crimes in which the drive is wiped clean and resold for profit," he said.

The employee who was in possession of the laptop when it was stolen has been disciplined.

"There are a number of rules governing the handling of encrypted material and the mobile devices handling that material that employees must follow," Sharp said. "It is up to the employee to ensure that any sensitive material is encrypted."

AT&T used the breach as a reminder that employees must follow policies.

This is the second major recent breach to involve an unencrypted laptop. Two weeks ago, Connecticut state officials announced that a Bank of New York Mellon contractor lost a laptop containing the personal information of some 4.5 bank customers.

Andy Kicklighter, director of product marketing for GuardianEdge, provider of mobile data protection solutions, said businesses must prioritize the need for laptop encryption and search for solutions that allow for simple implementation and manageability.

"IT organizations are afraid that it will be a big project," he said, adding that companies who have never experienced a data-loss incident also have difficulty understanding the ramifications of a breach.

"It just hasn't reached their priority level," Kicklighter told SCMagazineUS.com.

AT&T on May 23 began notifying victims through email and standard mail and is offering them free credit monitoring.
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Adobe exploit used to spread Dyre credential stealer

Adobe exploit used to spread Dyre credential stealer

Users running vulnerable Adobe software could be in danger of having credentials for Bitcoin websites stolen.

Staples is investigating a potential issue involving credit card data

Staples is investigating a potential issue involving credit ...

The company said it is investigating a potential issue involving credit card data and that customers are not responsible for fraudulent activity on cards if an issue is discovered.

Skills set a priority over legacy prejudices, experts say

Skills set a priority over legacy prejudices, experts ...

Cybersecurity expert Winn Schwartau and Robert Clark, a cyber law attorney at the Army Cyber Institute, discussed issues around hiring in the information security industry.