• Home
  • Services
    • Cybersecurity
      • Cybersecurity Awareness Month
        • Cybersecurity Q&A with CISO Avery Moore
        • The cybersecurity work no one talks about but everyone depends on
    • ICAM
    • System & Application Development
    • IT Support Services
    • Low-Code Development
      • Grants Management Solutions
    • Consulting & Advisory Services
  • About
    • About JSL
    • Contract Vehicles
    • Resources
    • JSL Companies
    • JSL Defense
    • Giving Back
  • Case Studies
    • Case Study: Securing Millions of Accounts with MFA
    • Case Study: Modernizing Labor’s Job Corps System
  • Clients
  • News
    • Press Releases
    • Cybersecurity Blog
    • Cybersecurity Awareness Month
  • Careers
  • Contact Us

Jazz Solutions, Inc. (JSL)  

  • solutions@jazzsol.com
Connect with JSL
  • Home
  • Services

      Cybersecurity

      JSL’s security team applies a comprehensive view of IT security, integrating assessment, audit, and compliance.

      Learn More

      ICAM

      JSL provides customers with  reliable, secure solutions across multiple ICAM technologies to protect systems and data.

      Learn More

      System & Application Development

      JSL’s Agile process emphasizes collaboration, hands-on demos of functionality, and usable software with each cycle.

      Learn More

      IT Support Services

      JSL’s IT support services allow our clients to focus on their core competencies, improve operational efficiency, and reduce costs.

      Learn More

      Low-Code Development

      JSL offers low-code, full-custom development, and hybrid solutions, focusing on immediate needs as well as long-term success.

      Learn More

      Consulting & Advisory Services

      JSL helps government agencies improve efficiency, streamline processes, and manage resources.

      Learn More

    • Cybersecurity
      • Cybersecurity Awareness Month
        • Cybersecurity Q&A with CISO Avery Moore
        • The cybersecurity work no one talks about but everyone depends on
    • ICAM
    • System & Application Development
    • IT Support Services
    • Low-Code Development
      • Grants Management Solutions
    • Consulting & Advisory Services
  • About
    • About JSL
    • Contract Vehicles
    • Resources
    • JSL Companies
    • JSL Defense
    • Giving Back
  • Case Studies
    • Case Study: Securing Millions of Accounts with MFA
    • Case Study: Modernizing Labor’s Job Corps System
  • Clients
  • News
    • Press Releases
    • Cybersecurity Blog
    • Cybersecurity Awareness Month
  • Careers
  • Contact Us
Linkedin
  • Home
  • Services

      Cybersecurity

      JSL’s security team applies a comprehensive view of IT security, integrating assessment, audit, and compliance.

      Learn More

      ICAM

      JSL provides customers with  reliable, secure solutions across multiple ICAM technologies to protect systems and data.

      Learn More

      System & Application Development

      JSL’s Agile process emphasizes collaboration, hands-on demos of functionality, and usable software with each cycle.

      Learn More

      IT Support Services

      JSL’s IT support services allow our clients to focus on their core competencies, improve operational efficiency, and reduce costs.

      Learn More

      Low-Code Development

      JSL offers low-code, full-custom development, and hybrid solutions, focusing on immediate needs as well as long-term success.

      Learn More

      Consulting & Advisory Services

      JSL helps government agencies improve efficiency, streamline processes, and manage resources.

      Learn More

    • Cybersecurity
      • Cybersecurity Awareness Month
        • Cybersecurity Q&A with CISO Avery Moore
        • The cybersecurity work no one talks about but everyone depends on
    • ICAM
    • System & Application Development
    • IT Support Services
    • Low-Code Development
      • Grants Management Solutions
    • Consulting & Advisory Services
  • About
    • About JSL
    • Contract Vehicles
    • Resources
    • JSL Companies
    • JSL Defense
    • Giving Back
  • Case Studies
    • Case Study: Securing Millions of Accounts with MFA
    • Case Study: Modernizing Labor’s Job Corps System
  • Clients
  • News
    • Press Releases
    • Cybersecurity Blog
    • Cybersecurity Awareness Month
  • Careers
  • Contact Us
Linkedin
Cyber in 60

‘Old news’ data breaches can still cost you

By JSL Staff 

Just the other morning, while catching the news over coffee, one of our team members almost changed the channel when a story came on about the National Public Data breach of 2024. After all, that breach happened months ago — old news, right?

It wasn’t.

The report revealed that this major data breach exposed the personally identifiable information (PII) of nearly 170 million people — about half of the U.S. population. That information, once stolen, didn’t just vanish. It continues to circulate on the dark web and, more worryingly, has surfaced on public sites accessible through a simple Google search.

The exposed data included:

  • Full names
  • Dates of birth
  • Addresses (current and historic)
  • Social Security numbers
  • Phone numbers
  • Names of relatives
  • Email addresses

That realization led to a sobering thought: what could someone do with that much personal information? A little research made it clear. PII from breaches like this is often used for:

  • Identity theft and new-account fraud – opening credit cards, loans, or bank accounts in someone else’s name.
  • Phishing and smishing – using detailed personal data to make fake messages more convincing.
  • Authentication bypass and account takeover – leveraging addresses or family names that people often use for passwords or security-question answers.

Curious — and concerned — our staffer searched their own name online and discovered their personal data posted on several sites. The assumption had always been that if a company was breached, affected individuals would be notified. But as this case shows, that’s not always true.

So, what can individuals do to protect themselves? Here are the steps JSL recommends:

  • Search your name to see what’s publicly available.
  • Request removal from Google search results. Click the three vertical dots next to a result, choose Remove result,and follow Google’s instructions.
  • Contact websites directly to request deletion of your data. Each site’s process differs — search for “how to remove my information from [site name].”
  • Run a privacy scan, such as the Experian Personal Privacy Scan.
  • Place a fraud alert with major credit bureaus if your data was exposed:
    • TransUnion fraud alerts
    • Equifax fraud alerts
    • Experian fraud alerts

Removing personal data can take time, but the effort is worthwhile. Consumer privacy-removal services can also assist if manual steps feel overwhelming.

What seemed like “old news” turned out to be a wake-up call. The National Public Data breach of 2024 isn’t just a headline from the past — it’s a continuing risk affecting millions of Americans today.

The reality is that personal information is more vulnerable than ever, and the responsibility for protecting it increasingly falls on individuals. Reclaiming privacy takes patience, but it’s one of the most important steps in safeguarding identity. Data breaches may never truly become “old news,” but awareness and proactive action can greatly reduce the damage they cause.


Scarier than Halloween: My Brush with Identity Theft
Previous Article
Your first pet's name is not a secret to hackers
Next Article