www.idtheftcenter.org Open in urlscan Pro
2606:4700::6812:87f  Public Scan

URL: https://www.idtheftcenter.org/publication/itrc-q1-data-breach-analysis/
Submission: On April 12 via api from TR — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://www.idtheftcenter.org

<form class="elementor-search-form" action="https://www.idtheftcenter.org" method="get">
  <div class="elementor-search-form__toggle" tabindex="0" role="button">
    <i aria-hidden="true" class="fas fa-search"></i> <span class="elementor-screen-only">Search</span>
  </div>
  <div class="elementor-search-form__container">
    <label class="elementor-screen-only" for="elementor-search-form-800ef8b">Search</label>
    <input id="elementor-search-form-800ef8b" placeholder="Search..." class="elementor-search-form__input" type="search" name="s" value="">
    <div class="dialog-lightbox-close-button dialog-close-button" role="button" tabindex="0">
      <i aria-hidden="true" class="eicon-close"></i> <span class="elementor-screen-only">Close this search box.</span>
    </div>
  </div>
</form>

POST https://webto.salesforce.com/servlet/servlet.WebToLead?encoding=UTF-8

<form action="https://webto.salesforce.com/servlet/servlet.WebToLead?encoding=UTF-8" method="POST"><input type="hidden" value="00D300000006Kp5" name="oid"> <input type="hidden" value="Q1 2024 Data Breach Analysis" name="lead_source"> <input
    type="hidden" value="https://www.idtheftcenter.org/thank-you-2/" name="retURL">
  <p></p>
  <div class="form-item"><label for="first_name">*First Name:</label> <input type="text" class="slds-input" id="first_name" required="true" name="first_name" size="20"></div>
  <div class="form-item"><label for="last_name">*Last Name:</label><input type="text" class="slds-input" id="last_name" required="true" name="last_name" size="20"></div>
  <div class="form-item"><label for="email">*Email:</label> <input type="email" class="slds-input" id="email" required="true" name="email" size="20"></div>
  <div class="form-item"><label for="title">Title:</label><input type="text" class="slds-input" id="title" name="title" size="20"></div>
  <div class="form-item"><label for="company">Company:</label><input type="text" class="slds-input" id="company" name="company" size="20"></div>
  <div class="form-item"><label for="zip">*Zip:</label><input type="text" class="slds-input" id="zip" required="true" name="zip" size="20"></div>
  <div class="form-actions"><input type="submit" value="Download" class="aftermath-submit" name="submit" onclick="downloadReport()"></div>
  <div>&nbsp;</div>
  <div>&nbsp;</div>
  <div><img decoding="async" class="alignnone size-full wp-image-49539" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%202560%201978'%3E%3C/svg%3E" alt="" width="2560" height="1978"
      data-lazy-srcset="https://www.idtheftcenter.org/wp-content/uploads/2024/04/ITRC_QuarterlyReport-Infographic_Q1_H-1-scaled.jpg.webp 2560w,https://www.idtheftcenter.org/wp-content/uploads/2024/04/ITRC_QuarterlyReport-Infographic_Q1_H-1-300x232.jpg.webp 300w,https://www.idtheftcenter.org/wp-content/uploads/2024/04/ITRC_QuarterlyReport-Infographic_Q1_H-1-1024x791.jpg.webp 1024w,https://www.idtheftcenter.org/wp-content/uploads/2024/04/ITRC_QuarterlyReport-Infographic_Q1_H-1-768x593.jpg.webp 768w,https://www.idtheftcenter.org/wp-content/uploads/2024/04/ITRC_QuarterlyReport-Infographic_Q1_H-1-1536x1187.jpg.webp 1536w,https://www.idtheftcenter.org/wp-content/uploads/2024/04/ITRC_QuarterlyReport-Infographic_Q1_H-1-2048x1583.jpg.webp 2048w"
      data-lazy-sizes="(max-width: 2560px) 100vw, 2560px" data-lazy-src="https://www.idtheftcenter.org/wp-content/uploads/2024/04/ITRC_QuarterlyReport-Infographic_Q1_H-1-scaled.jpg.webp"><noscript><img decoding="async"
        class="alignnone size-full wp-image-49539" src="https://www.idtheftcenter.org/wp-content/uploads/2024/04/ITRC_QuarterlyReport-Infographic_Q1_H-1-scaled.jpg.webp" alt="" width="2560" height="1978"
        srcset="https://www.idtheftcenter.org/wp-content/uploads/2024/04/ITRC_QuarterlyReport-Infographic_Q1_H-1-scaled.jpg.webp 2560w,https://www.idtheftcenter.org/wp-content/uploads/2024/04/ITRC_QuarterlyReport-Infographic_Q1_H-1-300x232.jpg.webp 300w,https://www.idtheftcenter.org/wp-content/uploads/2024/04/ITRC_QuarterlyReport-Infographic_Q1_H-1-1024x791.jpg.webp 1024w,https://www.idtheftcenter.org/wp-content/uploads/2024/04/ITRC_QuarterlyReport-Infographic_Q1_H-1-768x593.jpg.webp 768w,https://www.idtheftcenter.org/wp-content/uploads/2024/04/ITRC_QuarterlyReport-Infographic_Q1_H-1-1536x1187.jpg.webp 1536w,https://www.idtheftcenter.org/wp-content/uploads/2024/04/ITRC_QuarterlyReport-Infographic_Q1_H-1-2048x1583.jpg.webp 2048w"
        sizes="(max-width: 2560px) 100vw, 2560px"></noscript></div>
  <div>&nbsp;</div>
  <input type="hidden" id="apbct_visible_fields_1" name="apbct_visible_fields"
    value="eyIwIjp7InZpc2libGVfZmllbGRzIjoiZmlyc3RfbmFtZSBsYXN0X25hbWUgZW1haWwgdGl0bGUgY29tcGFueSB6aXAiLCJ2aXNpYmxlX2ZpZWxkc19jb3VudCI6NiwiaW52aXNpYmxlX2ZpZWxkcyI6Im9pZCBsZWFkX3NvdXJjZSByZXRVUkwiLCJpbnZpc2libGVfZmllbGRzX2NvdW50IjozfX0=">
</form>

Name: mc-embedded-subscribe-formPOST https://idtheftcenter.us19.list-manage.com/subscribe/post?u=fba66e1a225eda5e30bd00da9&id=f8e1674302

<form id="mc-embedded-subscribe-form" class="validate" action="https://idtheftcenter.us19.list-manage.com/subscribe/post?u=fba66e1a225eda5e30bd00da9&amp;id=f8e1674302" method="post" name="mc-embedded-subscribe-form" novalidate="" target="_blank">
  <div id="mc_embed_signup_scroll">
    <div class="form-group signup-choices-top">
      <div class="mc-field-group input-group">
        <ul>
          <li><input id="mce-group[7680]-7680-0" checked="checked" name="group[7680][16]" type="checkbox" value="16">
            <label for="mce-group[7680]-7680-0">In the Loop</label>
          </li>
        </ul>
      </div>
      <div class="mc-field-group input-group">
        <ul>
          <li><input id="mce-group[7042]-7042-2" checked="checked" name="group[7042][8]" type="checkbox" value="8">
            <label for="mce-group[7042]-7042-2">Data Breach Newsletter</label>
          </li>
        </ul>
      </div>
    </div>
    <div class="form-group signup-choices-bottom">
      <div class="mc-field-group"><input id="mce-EMAIL" class="required email" name="EMAIL" type="email" value="" placeholder="*Email Address"></div>
    </div>
    <div class="form-actions">
      <div id="mce-responses" class="clear">
        <div id="mce-error-response" class="response" style="display: none;"> </div>
        <div id="mce-success-response" class="response" style="display: none;"> </div>
      </div>
      <div style="position: absolute; left: -5000px;" aria-hidden="true"><input tabindex="-1" name="b_fba66e1a225eda5e30bd00da9_f8e1674302" type="text" value=""></div>
      <div class="clear"><input id="mc-embedded-subscribe" class="button" name="subscribe" type="submit" value="Subscribe"></div>
    </div>
  </div>
  <input type="hidden" id="apbct_visible_fields_2" name="apbct_visible_fields"
    value="eyIwIjp7InZpc2libGVfZmllbGRzIjoiIiwidmlzaWJsZV9maWVsZHNfY291bnQiOjAsImludmlzaWJsZV9maWVsZHMiOiJFTUFJTCBiX2ZiYTY2ZTFhMjI1ZWRhNWUzMGJkMDBkYTlfZjhlMTY3NDMwMiIsImludmlzaWJsZV9maWVsZHNfY291bnQiOjJ9fQ==">
</form>

Text Content

Skip to content
close
NEW BREACH ALERTS:
ECU Medical Center (third-party ESO Solutions, Inc.) 04.10.24
Hitachi Energy USA Inc. 04.10.24
Bayfront Health St. Petersburg (third-party ESO Solutions, Inc.) 04.10.24
Englewood Community Hospital (third-party ESO Solutions, Inc.) 04.10.24
Atrium Health Carolinas Medical Center (third-party ESO Solutions, Inc.)
04.10.24
Landmark Admin, LLC 04.10.24
Fawcett Memorial Hospital (third-party ESO Solutions, Inc.) 04.10.24
Atrium Health Wake Forest Baptist (third-party ESO Solutions, Inc.) 04.10.24

Call Now 888.400.5530

 * Consumer Aftermath Report
   
   Get Notified
   
   The ITRC’s Convenient, Comprehensive Source for Data Breach Information
   
   Learn More

 * About Us
 * Contact Us
 * Publications
 * Help Center
 * Events
 * Notified
 * Prevent Identity Theft
 * Recover My Identity
 * Protect My Business
 * Call Now 888.400.5530
 * Consumer Aftermath Report
   
   Get Notified
   
   The ITRC’s Convenient, Comprehensive Source for Data Breach Information
   
   Learn More

Search
Search
Close this search box.




ITRC Q1 DATA BREACH ANALYSIS

Home Publications ITRC Q1 Data Breach Analysis

PLEASE ADD YOUR INFORMATION BELOW TO DOWNLOAD A PDF COPY OF THE ANALYSIS

 



*First Name:
*Last Name:
*Email:
Title:
Company:
*Zip:

 
 

 

METHODOLOGY

For purposes of quarterly and annual reporting, the ITRC aggregates data events
based on the date the breach, exposure, or leak was entered into the database
rather than the date the event occurred. This avoids the confusion and data
conflicts associated with the need to routinely update previous reports and
compromise totals. The date of the original compromise, if known, and the date
of the event report are noted in the ITRC’s notified data compromise tracking
database. The number of victims linked to individual compromises are updated as
needed and can be accessed in the ITRC’s notified breach tracking solution. The
ITRC reports Third-Party/Supply Chain Attacks as a single attack against the
company that lost control of the information. The total number of individuals
impacted by third-party incidents is based on notices sent by the multiple
organizations impacted by the single data compromise.


GET ID THEFT NEWS

Stay informed with alerts, newsletters, and notifications from the Identity
Theft Resource Center

 * In the Loop

 * Data Breach Newsletter



Facebook-f Linkedin-in Youtube Instagram
 * Our Mission
 * Contact Us
 * Privacy Policy
 * Live Chat Privacy Policy
 * Accessibility
 * Media Resources
 * FAQ

 * Our Mission
 * Contact Us
 * Privacy Policy
 * Live Chat Privacy Policy
 * Accessibility
 * Media Resources
 * FAQ

© Copyright 2024- Identity Theft Resource Center

This product was produced by the ITRC under 2018-V3-GX-K007, awarded by the
Office for Victims of Crime, Office of Justice Programs, U.S. Department of
Justice. The opinions, findings, and conclusions or recommendations expressed in
product are those of the contributors and do not necessarily represent the
official position or policies of the U.S. Department of Justice. View more about
our copyright info here.



Share
Tweet
Email
Share
Share