The DoorDash Hack
Food delivery service DoorDash announced late last month that their systems had been breached by hackers, affecting close to 5 million customers’, drivers’ and merchants’ data. The hack originally occurred in May of this year, compromising many types of private data, including email addresses, delivery addresses, order history, phone numbers, drives license info, credit card info, and passwords.
“Earlier this month, we became aware of unusual activity involving a third-party service provider. We immediately launched an investigation and outside security experts were engaged to assess what occurred,” according to DoorDash’s blog post on the breach.
What Does This Mean For DoorDash Users?
If you were a DoorDash user since before April 5, 2018, then your data may have been hacked. DoorDash claims to be reaching out directly to users that they know have been affected.
In hacks like this, companies in DoorDash’s position won’t disclose any more detail about the event then they have to. Out of caution, they will likely take all action possible to mitigate the effects, but the fact is that it will be difficult for them to exactly determine the extent of the breach and how it affects each user specifically.
Should You be Worried About Data Breaches?
Even if you’re not a DoorDash user, don’t think for a second that something like this can’t happen to you. Think about how many different services and apps you have an account with. Think about how many have your credit card information or your address. All it takes is for one of those to be breached and your data will have been compromised.
And make no mistake, the rate of data breached around the world is rising year after year. You hear about data breaches, identity theft and more on a seemingly daily basis.
Don’t make the mistake of assuming it’s all being exaggerated to get your attention. If anything, there are too many data breaches for the news to keep up with.
4IQ published a report this year that lists a number of alarming statistics about how cybercrime is becoming more and more common:
- There were 12,499 confirmed data breaches in 2018 – a 424% increase when compared to 2017.
- The average breach compromised 216,884 records.
- 14.9 billion stolen identity records were exchanged by cybercriminals online.
How Can You Protect Yourself?
- Update Your Passwords: Say a site you’ve signed up for and made purchases from, or planned to make purchases from, gets hacked. Whatever password you had used for it is no longer secure.
The good news is that there’s a simple way to protect against this – change your passwords on a regular basis. It doesn’t matter if a hacker has an old password from three years ago from that website you don’t use.
- Don’t Use Identical Passwords: If you’re not repeating passwords, then you won’t be vulnerable to further breaches when a hacker gets your info from a service like DoorDash.
But that’s easier said than done, right? As we explored above, you have a lot of different accounts – so how can you be expected not to repeat a memorable password here or there?
It may be nearly impossible to do on your own, which is why you should use a Password Manager. A password manager generates, keeps track of and retrieves complex and long passwords for you to protect your vital online information. It also remembers your PINS, credit card numbers and three-digit CVV codes if you choose this option. Plus, it provides answers to security questions for you. All of this is done with strong encryption that makes it difficult for hackers to decipher.
- Don’t Be So Trusting
Always be skeptical of any technology or new service you’re using. After all, it’s a product or service meant to be sold, and so, the top priority is often user experience, not user security.
If it’s asking for your credit card info, think about the ramifications that could carry. Consider how new the company/app/technology is, and whether they can be trusted to protect your data from hackers. Obviously, DoorDash couldn’t.
It’s your responsibility to seriously consider how much of your data you share, and with whom.
Like this article? Check out the following blogs to learn more: