No credit card required
Browse credit cards from a variety of issuers to see if there's a better card for you.
AOD sent out individual letters to be delivered today to those individuals they believe may be impacted, but I included a link to an online article discussing the breach instead of trying to type a detailed synopsis.
In brief, there apparently was a compromise last August which was confirmed and validated last month where a least some account holders had at a minmum may have had their name+SSN+AODFCU account number(s) accessible. FBI was engaged and I'm sure both the FFIEC and at least one of the 3rd party cybersecurity companies vetted and authorized by the NCUA to provide related services to their member institutions are also involved.
If you got a letter you are also entitled to a free 24 months of Experian IdenityWorks Credit 3B. Details of how to enroll are included in the letter.
Woo, good thing AOD was "johnny on the spot".
Only took them 7.75 months from learning of the breech to identify people and inform them of said identity data breech. Way better than 8 months or even a year. Am I right or what(?)
Got the letter. It's only 12 months of monitoring, not 24. As these breaches almost always happen as a result of gross negligence (not staying on top of updates, stupid employees), I would dump them, but their 3% card is still worth it to me and my credit reports are frozen anyway.
Just received from AOD 🙁
Nothing better than to wait 8 months before informing your customers that their sensitive financial and personal data may have been stolen. Yikes!
FICO® 8: 806 (Eq) · 794 (Ex) · 812 (TU)
We got the letter too. I'm pretty much numb to them at this point because I get at least one every few months. Lots of medical providers have been breached recently...
This is why i refuse to send sensitive financial data to banks for "verification" purposes. These banks are incapable if protecting sensitive data and lie about the severity ofthe breaches. Amex last breach was massive, yet they lied to there clients and continue to request bank statements with account numbers and tax records without bring able to protect the data.
Don't even get me started on what they actually do with that data.
@Varsity_Lu wrote:Nothing better than to wait 8 months before informing your customers that their sensitive financial and personal data may have been stolen. Yikes!
Sure there is! Waiting 11 months, which is what my work did 🙄
The time that the data breach is discovered til the notifications are sent out is slow. There are reasons for for this. There are several questions that must be answered this not a complete list by any means. The job is not easy because the hacker is going to be stealth as possible to avoid detection.
Where and how did the hacker breach the system?
How many times and when was the system breached?
What did the hacker have access to?
Was and data pulled from the system and exported somewhere?
How to fix the known breach ?
Are there other potential breach points waiting to be exploited?
Whose information was compromised or was potentially compromised?
The fixes that prevent furthur hacks have to be in place ahead of any notifications.
All that said, there are companies that specialize in doing this type work after a company has had data breach. I have read where teams that are working on a data breach are working 24 7 due to the difficulty of the job they have to.
@AndySoCal wrote:The time that the data breach is discovered til the notifications are sent out is slow. There are reasons for for this. There are several questions that must be answered this not a complete list by any means. The job is not easy because the hacker is going to be stealth as possible to avoid detection.
Where and how did the hacker breach the system?
How many times and when was the system breached?
What did the hacker have access to?
Was and data pulled from the system and exported somewhere?How to fix the known breach ?
Are there other potential breach points waiting to be exploited?
Whose information was compromised or was potentially compromised?
The fixes that prevent furthur hacks have to be in place ahead of any notifications.
All that said, there are companies that specialize in doing this type work after a company has had data breach. I have read where teams that are working on a data breach are working 24 7 due to the difficulty of the job they have to.
There are other things to be addressed but this largely sums it up. A key point is that multiple government agencies are involved in the entire process and they help determine when it's the appropriate time for public disclosure.
A relevant point is that as an NCUA member institution AOD has regulatory requirements to adhere to a wide swath of best security-centric business practices and must regularly positively demonstrate via external audit their compliance with these best practices. 3rd party cybersecurity-related companies that AOD would have been eligible to engage are also validated (with the FFIEC) as having complied with the same requirements.