{"id":721,"date":"2022-12-08T10:56:48","date_gmt":"2022-12-08T10:56:48","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=721"},"modified":"2022-12-08T11:00:44","modified_gmt":"2022-12-08T11:00:44","slug":"data-breaches-in-2022-a-lesson-for-monitoring-contractors","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/","title":{"rendered":"Data Breaches in 2022: A Lesson For Monitoring Contractors"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">There has been an unprecedented amount of data breaches this year, many resulting in the theft of source code. This is a timely reminder of the importance of monitoring contractors given that they make up a large amount of the software designers and programmers who are creating the code, often on their own devices and\u00a0 away from their employer\u2019s office. IT security risks are greater with contractors than with internal personnel. Accidental data exposure and the lack of understanding of IT security policies and procedures are the risks most closely associated with agency contractors and temporary personnel. Below we look at a few of the incidents from this year and how an organization can prevent these attacks happening.\u00a0<\/span><b><\/b><\/p>\n<p><b>1. Toyota<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Toyota admitted it put 296,019 email addresses and customer management numbers of folks who signed up for its T-Connect assistance website at risk of online theft. The automaker explained that an outsourced developer tasked with building T-Connect uploaded the source code for the site to a GitHub public repo in December 2017 and went unnoticed until September 15, 2022. Once Toyota looked at that source code, the manufacturing giant realized this public-facing code repository contained an access key to a server that stored customer data. That server was therefore also open to the world.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Toyota said it hasn\u2019t noticed any unauthorized use of data but warned customers to remain vigilant of spoofing or phishing scams. To mitigate the fallout of the breach, the company removed third-party access to the server, changed the access keys, and changed the GitHub repository to private.<\/span><\/p>\n<p><b><\/b><b>2. Red Cross<\/b><b><\/b><\/p>\n<p><span style=\"font-weight: 400;\">On Jan. 18, the International Committee of the Red Cross revealed that the organization had experienced a data breach. This attack resulted in a loss of personal data for more than a half a million people\u2014many in vulnerable positions\u2014including names, locations, and contact information. The hackers attacked a contractor in Switzerland that was storing this data. As a result, the Red Cross was temporarily forced to halt a program that helps reunite families torn apart by armed conflict, migration, natural disasters, and other tragedies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It said the hackers targeted an external company in Switzerland that the ICRC contracts to store data. There was no evidence so far that the compromised information had been leaked or put in the public domain.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The ICRC said its \u201cmost pressing concern\u201d was the \u201cpotential risks that come with this breach \u2013 including confidential information being shared publicly \u2013 for people that the Red Cross and Red Crescent network seeks to protect and assist, as well as their families\u201d.<\/span><br \/>\n<b><\/b><\/p>\n<p><b>3. Go To &amp; Last Pass<\/b><b><\/b><\/p>\n<p><span style=\"font-weight: 400;\">Remote access and collaboration company GoTo suffered a security breach where hackers gained access to their development environment and third-party cloud storage service.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The company says they first learned of the incident after detecting unusual activity in their development environment and third-party cloud storage service.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;Based on the investigation to date, we have detected unusual activity within our development environment and third-party cloud storage service. The third-party cloud storage service is currently shared by both GoTo and its affiliate, LastPass.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This incident also affected GoTo subsidiary LastPass where hackers accessed customer information through the same cloud storage breach. LastPass also revealed in September 2021 that hackers had access to their internal network for four days during an August cyberattack where threat actors stole source code.<\/span><b><\/b><\/p>\n<p><b>4. Dropbox<\/b><b><\/b><\/p>\n<p><span style=\"font-weight: 400;\">A threat actor gained access to some Dropbox source code which was contained within 130 GitHub code repositories. The Dropbox security team became aware of a phishing campaign apparently targeting staff. The phishing email purported to originate from the code integration and delivery platform, CircleCI; a company used by Dropbox for specific internal code deployments. &#8220;While our systems automatically quarantined some of these emails, others landed in Dropboxers\u2019 inboxes,&#8221; the report stated.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The phishing emails used realistic-looking templates directing the recipients to a website that appeared to be a CircleCI login page where they were directed to enter GitHub account credentials. Although protected by a second authentication challenge (in this case, a hardware authentication system to generate a one-time password) the threat actor was able to eventually succeed in using both to access &#8220;one of our GitHub organizations where they proceeded to copy 130 of our code repositories,&#8221; the security team confirms. However, at\u00a0 no time did the threat actor have access to anyone\u2019s Dropbox account, passwords or payment information.<\/span><\/p>\n<p><b>5. Cash App<\/b><b><\/b><\/p>\n<p><span style=\"font-weight: 400;\">Cash App went public with a data breach on April 4. Losses included names and account numbers for more than 8 million users. A former Cash App employee downloaded reports that contained American users&#8217; personal information\u2014specifically, users of Cash App Investing were affected. To address the issue, Cash App contacted all former and current users of the feature so they could answer users&#8217; questions and provide resources and information. They also notified law enforcement about the breach, and advised all users of Cash App to change their passwords and utilize two-factor authentication.<\/span><\/p>\n<p><b>Monitoring Contractors\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Third-party and contract monitoring is a way to ensure external vendors stay within their scope and are only performing their assigned tasks. This allows for more flexible access without sacrificing security. Having monitoring software eliminates \u201cwho did what?\u201d doubts, confirms SLA agreements and eases vendor billing verification. In addition, it can also provide monitoring\u00a0<\/span><span style=\"font-weight: 400;\">and auditing as part of the overall risk management and regulatory compliance.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">TSFactory\u2019s RecordTS v6 will record Windows remote sessions reliably and securely for RDS, Citrix and VMware systems. Scalable from small offices with one server to enterprise networks with tens of thousands of desktops and servers, RecordTS integrates seamlessly with the native environment.<\/span><\/p>\n<p><a href=\"https:\/\/www.tsfactory.com\/\"><span style=\"font-weight: 400;\">Click here<\/span><\/a><span style=\"font-weight: 400;\"> to learn more about secure remote session recording.<\/span><\/p>\n<p><b>Sources<\/b><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/goto-says-hackers-breached-its-dev-environment-cloud-storage\/\"><span style=\"font-weight: 400;\">https:\/\/www.bleepingcomputer.com\/news\/security\/goto-says-hackers-breached-its-dev-environment-cloud-storage\/<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/dropbox-discloses-breach-after-hacker-stole-130-github-repositories\/\"><span style=\"font-weight: 400;\">https:\/\/www.bleepingcomputer.com\/news\/security\/dropbox-discloses-breach-after-hacker-stole-130-github-repositories\/<\/span><\/a><\/p>\n<p><a href=\"https:\/\/venturebeat.com\/security\/twitter-breach-api-attack\/\"><span style=\"font-weight: 400;\">https:\/\/venturebeat.com\/security\/twitter-breach-api-attack\/<\/span><\/a><\/p>\n<p><a href=\"https:\/\/greensboro.com\/business\/investment\/personal-finance\/10-organizations-that-suffered-massive-data-breaches-in-2022\/collection_f55f557d-2492-52fd-9499-e861c975b67f.html#2\"><span style=\"font-weight: 400;\">https:\/\/greensboro.com\/business\/investment\/personal-finance\/10-organizations-that-suffered-massive-data-breaches-in-2022\/collection_f55f557d-2492-52fd-9499-e861c975b67f.html#2<\/span><\/a><\/p>\n<p><a href=\"https:\/\/tech.co\/news\/data-breaches-2022-so-far\"><span style=\"font-weight: 400;\">https:\/\/tech.co\/news\/data-breaches-2022-so-far<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.digitaljournal.com\/business\/toyota-data-breach-involving-source-code-hosted-on-github\/article\"><span style=\"font-weight: 400;\">https:\/\/www.digitaljournal.com\/business\/toyota-data-breach-involving-source-code-hosted-on-github\/article<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.theregister.com\/2022\/10\/11\/toyota_source_code_email_leak\/\"><span style=\"font-weight: 400;\">https:\/\/www.theregister.com\/2022\/10\/11\/toyota_source_code_email_leak\/<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2022\/11\/02\/no-dropbox-hacker-hasnt-stolen-passwords-or-data-of-700-million-users\/?sh=424fd3d029b3\"><span style=\"font-weight: 400;\">https:\/\/www.forbes.com\/sites\/daveywinder\/2022\/11\/02\/no-dropbox-hacker-hasnt-stolen-passwords-or-data-of-700-million-users\/?sh=424fd3d029b3<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/dropbox-discloses-breach-after-hacker-stole-130-github-repositories\/\"><span style=\"font-weight: 400;\">https:\/\/www.bleepingcomputer.com\/news\/security\/dropbox-discloses-breach-after-hacker-stole-130-github-repositories\/<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.theguardian.com\/world\/2022\/jan\/20\/hacking-attack-on-red-cross-exposes-data-of-515000-vulnerable-people\"><span style=\"font-weight: 400;\">https:\/\/www.theguardian.com\/world\/2022\/jan\/20\/hacking-attack-on-red-cross-exposes-data-of-515000-vulnerable-people<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.spiceworks.com\/it-security\/data-security\/news\/toyota-data-breach\/\"><span style=\"font-weight: 400;\">https:\/\/www.spiceworks.com\/it-security\/data-security\/news\/toyota-data-breach\/<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There has been an unprecedented amount of data breaches this year, many resulting in the theft of source code. This is a timely reminder of the importance of monitoring contractors given that they make up a large amount of the software designers and programmers who are creating the code, often on their own devices and\u00a0 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":723,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-721","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Breaches in 2022: A Lesson For Monitoring Contractors - Blogs<\/title>\n<meta name=\"description\" content=\"These data breaches are a timely reminder of the importance of monitoring contractors given that they make up a large amount of the software designers and programmers who are creating the code, often on their own devices and\u00a0 away from their employer\u2019s office.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Breaches in 2022: A Lesson For Monitoring Contractors - Blogs\" \/>\n<meta property=\"og:description\" content=\"These data breaches are a timely reminder of the importance of monitoring contractors given that they make up a large amount of the software designers and programmers who are creating the code, often on their own devices and\u00a0 away from their employer\u2019s office.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-08T10:56:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-08T11:00:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/12\/charlesdeluvio-pjAH2Ax4uWk-unsplash-1-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/\",\"name\":\"Data Breaches in 2022: A Lesson For Monitoring Contractors - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/12\/charlesdeluvio-pjAH2Ax4uWk-unsplash-1-scaled.jpg\",\"datePublished\":\"2022-12-08T10:56:48+00:00\",\"dateModified\":\"2022-12-08T11:00:44+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"description\":\"These data breaches are a timely reminder of the importance of monitoring contractors given that they make up a large amount of the software designers and programmers who are creating the code, often on their own devices and\u00a0 away from their employer\u2019s office.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/12\/charlesdeluvio-pjAH2Ax4uWk-unsplash-1-scaled.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/12\/charlesdeluvio-pjAH2Ax4uWk-unsplash-1-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"databreach\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Breaches in 2022: A Lesson For Monitoring Contractors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Breaches in 2022: A Lesson For Monitoring Contractors - Blogs","description":"These data breaches are a timely reminder of the importance of monitoring contractors given that they make up a large amount of the software designers and programmers who are creating the code, often on their own devices and\u00a0 away from their employer\u2019s office.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/","og_locale":"en_US","og_type":"article","og_title":"Data Breaches in 2022: A Lesson For Monitoring Contractors - Blogs","og_description":"These data breaches are a timely reminder of the importance of monitoring contractors given that they make up a large amount of the software designers and programmers who are creating the code, often on their own devices and\u00a0 away from their employer\u2019s office.","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2022-12-08T10:56:48+00:00","article_modified_time":"2022-12-08T11:00:44+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/12\/charlesdeluvio-pjAH2Ax4uWk-unsplash-1-scaled.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/","name":"Data Breaches in 2022: A Lesson For Monitoring Contractors - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/12\/charlesdeluvio-pjAH2Ax4uWk-unsplash-1-scaled.jpg","datePublished":"2022-12-08T10:56:48+00:00","dateModified":"2022-12-08T11:00:44+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"description":"These data breaches are a timely reminder of the importance of monitoring contractors given that they make up a large amount of the software designers and programmers who are creating the code, often on their own devices and\u00a0 away from their employer\u2019s office.","breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/12\/charlesdeluvio-pjAH2Ax4uWk-unsplash-1-scaled.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/12\/charlesdeluvio-pjAH2Ax4uWk-unsplash-1-scaled.jpg","width":2560,"height":1707,"caption":"databreach"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/data-breaches-in-2022-a-lesson-for-monitoring-contractors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"Data Breaches in 2022: A Lesson For Monitoring Contractors"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=721"}],"version-history":[{"count":4,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/721\/revisions"}],"predecessor-version":[{"id":727,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/721\/revisions\/727"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/723"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}