While phishing is still the initial attack vector of most identity theft related crimes, it is not occurring at a level that the average person needs to be concerned about. Data breaches have only become a noticed event over the last ten years due to required notification and disclosure of data breaches to victims happening at the federal level from The Identity Theft Red Flags Rule of 2007, an addition to Code of Federal Regulations at 16 C.F.R. §681.2 (Finklea, 2012). Prior to this, notification was left to the state regulatory level. Given the limited window of trend analysis and full disclosure information, the numbers regarding data breaches are still
While phishing is still the initial attack vector of most identity theft related crimes, it is not occurring at a level that the average person needs to be concerned about. Data breaches have only become a noticed event over the last ten years due to required notification and disclosure of data breaches to victims happening at the federal level from The Identity Theft Red Flags Rule of 2007, an addition to Code of Federal Regulations at 16 C.F.R. §681.2 (Finklea, 2012). Prior to this, notification was left to the state regulatory level. Given the limited window of trend analysis and full disclosure information, the numbers regarding data breaches are still