The Palm Beach Post

WELLINGTON NOTIFYING DATA BREACH VICTIMS

Village notifying 6,125 customers of several department­s.

- By Kristina Webb Palm Beach Post Staff Writer kwebb@pbpost.com

WELLINGTON — More than 6,000 customers of six village department­s soon will receive notices that they may have been affected by a recent data breach.

Wellington is sending 6,125 letters to customers of its building, business license, code, parking ticket, utilities and planning department­s, Assistant Village Manager Jim Barnes said. Of that number, not all will have been affected by the breach of the village’s billing vendor, Superion’s Click2Gov system.

“We’ve narrowed it to that,” Barnes said.

More customers could be affected, Barnes said, but because of the way certain department­s take in billing informatio­n, the village has not been able to find valid contact informatio­n for those people or businesses. Instead of mailing notices to those customers, Wellington has put a “Data Breach” button on its website and posted a notice Friday repeating informatio­n about the breach and who potentiall­y was affected.

On June 6, Superion notified Wellington that the village’s Click2Gov server may have been compromise­d. Within an hour of that notificati­on, Wellington Chief Informatio­n Officer William Silliman ordered the server shut down. Within about 24 hours, Wellington had rebuilt the server with added security and was accepting online payments.

Silliman and a third-party forensic company, the Sylint Group, have been investigat­ing the breach. They determined it affected only those customers who made one-time online payments through Click2Gov to any of the six department­s. The utilities department was breached beginning Nov. 28 and the other five department­s were breached beginning March 30, with the window for the breach closing June 4, Sylint determined.

Wellington is not alone. The Post reported last month that at least nine municipali­ties and a county government have experience­d similar Click2Gov breaches. Cities in California, Texas, Arizona and Wisconsin have been affected. Soon after The Post’s report, cities in Texas and Oklahoma also reported breaches of their Click2Gov servers.

Lake Worth’s Click2Gov system also was breached. The city confirmed its utilities customers were exposed from April 3, 2017, to Jan. 22, 2018, making it one of the longer breaches found by The Post.

What to do

Have you been affected by a data breach? Wellington recommends following these steps:

■ Review credit card statements and report unauthoriz­ed charges, no matter how small.

■ Ask your credit card issuer or bank to deactivate your card and issue a new card.

■ Request a fraud alert on your credit file. This will tell creditors to contact you before opening new accounts or changing existing accounts.

■ Request that credit reports be sent to you, free of charge, for your review. Even if you do not find suspicious activity, the Federal Trade Commission recommends that you check your credit reports periodical­ly. Equifax: Equifax.com or 800525-6285; Experian: Experian.com or 888-397-3742; TransUnion: Transunion. com or 800-680-7289.

Related breaches

■ Lake Worth: April 3, 2017, to Jan. 22, 2018

■ Goodyear, Ariz.: June 13, 2017 to May 5, 2018

■ Oceanside, Calif.: July 1 t0 Aug. 13, 2017

■ Beaumont, Texas: Aug. 1 to Aug. 24, 2017

■ Ormond Beach: Aug. 14 to Oct. 4, 2017

■ Fon du Lac, Wis.: August to October, 2017

■ Wellington: Nov. 28, 2017, to June 4, 2018

■ Okaloosa County: December 2017 to March

■ Midland, Texas: December 2017 to June

■ Thousand Oaks, Calif.: Jan. 4 to Jan. 10

■ Midwest City, Okla.: May 25 to June 21

■ Oxnard, Calif.: March 26 to May 29, 2017

Newspapers in English

Newspapers from United States