Feeds

Wells Fargo fesses up to data loss

Lightning strikes twice for HP man

Beginner's guide to SSL certificates

At least one poor Hewlett Packard employee compromised by Fidelity's March laptop loss has now been told Wells Fargo lost his personal data, too.

The staffer received a note this week from Wells Fargo, saying the financial institution had lost a computer packed full of sensitive data such as customers' names, addresses, Social Security numbers and Wells Fargo mortgage loan account numbers, according to a document sent to The Register. Wells Fargo has admitted the loss, telling us that it affected a "relatively small percentage of Wells Fargo customers." The company, however, has millions of customers, so it's pretty tough to tell what a "small percentage" means.

The company said that, "a computer - being transported for Wells Fargo Home Mortgage, a division of Wells Fargo Bank, N.A., by a global express shipping company between Wells Fargo facilities - has been reported as missing and may have been stolen. Wells Fargo said there is no indication that the information on the computer equipment has been accessed or misused. The computer has two layers of security, making it difficult to access the information."

To the company's credit, it confessed to the computer loss in short order. During a recent spate of laptop losses, Fidelity and Ernst & Young only admitted to losing data after being contacted by The Register. Fidelity lost data on 200,000 HP workers, and Ernst & Young's loss compromised Sun, IBM, BP, Cisco and Nokia employees.

Wells Fargo's statement, of course, does little to assuage the concerns of the staff who have seen financial services companies completely drop the ball where system security is concerned. In many cases, these are the same companies that advise clients on how to secure their products and how to be upfront about reporting breaches.

You can, for example, find an Ernst & Young executive here hyping up a USB security mechanism.

"The threat posed by USB devices is real and presents a major security challenge to companies everywhere," says one Mike Kelly, partner at Ernst and Young LLP.

Where does Kelly address the security threat that Ernst & Young poses?

Wells Fargo customers have received a one-year free subscription to a credit monitoring service. This has become the standard package offered by companies that have lost customer data. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.