[ad_1]
Algonquin College cautions against the personal data of some students, employees and alumni who were exposed during a cyberattack this spring.
Algonquin states that there is "no direct evidence" that data were consulted. During the incident.
On May 16, the college discovered unauthorized and illegal access to a server infected by malware by hackers. Infected Server Hosting Databases Containing Personal Information
In a press release, Algonquin states that it identified 4,568 students and alumni whose information may have been exposed, including the date of birth and the address of the person. home. These people received an email on Monday and will receive a letter from Canada Post.
Although Algonquin states that no case of identity theft or other misuse has been reported, students will be offered protection against theft according to the law. risk badysis of the college.
An additional 106,931 individuals, including students, alumni, and current and former employees, had non-sensitive information that may have been exposed on the server. The college says the information was rated as low risk of abuse if it was actually accessible. The College is contacting this second group by mail
Algonquin says that a detailed forensic investigation in progress has revealed no financial information was exposed, and the data included not social insurance numbers, banking or credit card information. Since the incident, Algonquin says it has put in place a number of additional security measures recommended by an external security consultant.
The Order has set up a toll-free number for anyone with questions or concerns (1-866-252-2644 during normal business hours). They can also send an email to [email protected] or visit our website (algonquincollege.com/cyber). [19659009](function(d, s, id) {
var js, fjs = d.getElementsByTagName (s) [0];
if (d.getElementById (id)) returns;
js = d.createElement (s); js.id = id;
js.src = "http://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v2.3&appId=152734284797770";
fjs.parentNode.insertBefore (js, fjs);
} (document, 'script', 'facebook-jssdk'));
[ad_2]
Source link