Connect with us

Canada

US data protection: Online habits and data breaches

Published

on

 

ProtonVPN’s survey reveals US online data protection habits and how common data breaches are.

As an organization building an internet where privacy is the default, Proton are always interested in how people protect themselves and their data online. They asked 1,000 randomly selected people over the age of 16 questions about their online habits to reveal what the average US citizen is doing to secure their online data.

The survey results indicate just how common data breaches are, which data people are most concerned about being exposed, as well as the level of protection individuals use to keep their information safe.

ProtonVPN have highlighted the key findings from the survey below.

Gmail is the most common email provider, but iCloud is popular among people under 25

The survey asked respondents which email provider and internet browsers they used most.

Gmail came out on top as the most popular email provider, with 73.71% of respondents using a Gmail account.

Apple’s email service, part of the iCloud suite, was the fourth most popular overall. However, the results showed a sharp increase in iCloud accounts within the 16 to 24-year-old age bracket (over 18% had an iCloud account compared to under 10% of those above this age range), signaling a conspicuous appeal to the younger generation.

When evaluating email service providers, it’s important to consider their track record as well as the protections they have in place. Some email providers, such as Yahoo and Outlook, have suffered major data breaches. Other email providers, such as Gmail, have a good security record but scan your emails, track your purchasing habits, and share access to your messages with third parties. And, unfortunately, none of these popular providers, including Apple’s email service, offer end-to-end encryption or zero-access encryption.

ProtonMail uses zero-access encryption on all emails so that we cannot read your messages, meaning no third parties can read them either. It also means that even if there were a data breach, your messages would remain secure.

Most providers do now offer two-factor authentication for their logins, and you should always use this security measure. However, 2FA by itself won’t always be enough to protect your account, depending on the type of breach. It also cannot prevent your provider from selling or sharing your data. For a more private email experience, you need to use an encrypted service, such as ProtonMail, that protects all messages.

For internet browsers, Google Chrome came out on top with 63.45% of people using Chrome as their day-to-day browser, while Safari came second with 26.29% of people using Apple’s chosen browser as their main search provider.

Many people use Big Tech services simply because they come preinstalled on their devices or offer name recognition and speed. Yet these services are built on a business model of exploiting your data for advertising purposes, which is at odds with privacy. This is especially true with browsers, which is why using alternative services that minimize data collection is the best way to find what you’re looking for while handing over the least amount of information.

72% of people admit to using public WiFi networks without adequate security measures, despite privacy warnings

Though many may feel they are as careful as possible with their online security, do we give this as much thought when we are on our phones or on the move?

Chances are, when you have been out grabbing dinner, on holiday, or working from a coffee shop, you’ve logged into a public WiFi network. Our survey revealed that over 72% of people use public WiFi networks, despite the risks they pose to your privacy.

These WiFi networks often will make you agree to terms and conditions that allow them to monitor your browsing and link to your email so that they can sell that data to advertisers.

Having a trustworthy VPN running on your device can help with this issue, as the VPN encrypts your data, preventing the network operator from monitoring your online browsing.

Over a quarter of people surveyed had their data exposed in a breach

As part of the survey, we additionally asked respondents to enter their main email address into a website called haveibeenpwnd.com. This website is free to use and checks whether an email address has been exposed in an online breach.

Our survey found that 25.8% of people have had their data exposed in a breach online at least once. Over 10% hadn’t even realized this was the case before checking for the survey.

The website also checks if your email address has been subject to a “paste”. “Pasting” is a type of data breach where hackers copy and paste personal information, such as email addresses, names, passwords, and so forth, on specific websites, like PasteBin. This makes it much easier for others to obtain and share a person’s data. 20% of people who took part in our survey found that their personal information had been subject to “pastes”.

We asked respondents to specify the type of information they found being exposed the most. Three kinds of data were especially common:

  1. Email Addresses (57.19%)
  2. Passwords (38.36%)
  3. Usernames (33.22%)

The survey also asked respondents to specify the type of companies that had been breached. The social media industry had the highest percentages of people affected by a data breach (42.12%), followed by gaming (25%) and tech-based websites (20.55%).

A larger breakdown can be seen below:

Social media 42.12%
Gaming 25.00%
Technology 20.55%
E-commerce 18.84%
Lifestyle 17.81%
Banking 17.12%
Creative 11.64%
Fitness 10.96%
Adult industry 8.56%

Unfortunately, there isn’t much anyone can do when an external company suffers a data breach. People trust that a company or website has as much security in place as possible to keep their online data safe. This is not always the case, and even companies with high security levels have suffered large data breaches.

Most large social media platforms have suffered data breaches, including Facebook in 2019 and TikTok, Instagram, and Youtube, where the information of millions of users has been exposed. In this case, there is nothing more these individuals could have done to protect their data.

If people are worried about their information being exposed from websites such as social media, sharing as little personal data as possible on these accounts will reduce the amount of data at risk in any potential breach.

82% of people are concerned about having their personal data exposed in a breach, but less than 21% would change their online habits

The team at ProtonVPN wanted to find out not just what information has been exposed online, but ultimately what information people are most concerned about being exposed.

The survey revealed that the three types of information people are most concerned about being exposed in a breach are:

  1. Bank details (54%)
  2. Passwords (43.53%)
  3. Physical addresses (18.13%)

Overall, 82% of people admitted to being worried about having their information exposed in online data breaches.

However, when we asked the same survey respondents about the precautions they take to protect themselves and their data online, their responses did not match this level of concern:

  • Less than 23% of people said they read privacy policies to ensure their data will not be sold to third parties.
  • Less than 20% of people said they have two-factor authentication (2FA) set up on all accounts, which keeps your accounts safe if your password is stolen or exposed.
  • Moreover, when asked after taking the survey whether they plan to do anything more to keep themselves protected online, only 20.82% said they plan to do so.

But for those who want to take extra precautions, what more can you do to make sure they keep their data and online usage as private and secure as possible?

Steps you can take to protect yourself

Though a company data breach is not something an individual can protect themselves from, there are several precautions you can take to keep your data and online usage as secure as possible.

The security experts at ProtonVPN have given their tips on what to do if you are worried about your data being exposed online:

  • Where possible, set up 2FA and extra steps to sign in to ensure your accounts are as safe as possible. With 2FA, even if someone obtains your login details, they will not be able to access your account without also having access to your second authentication pass.
  • Don’t sign up for or share personal information with a website or service unless it is strictly necessary. We know that this is not easy with social media. However, we recommend sharing as little personal information as possible.
  • When checking out, always untick any boxes that ask if they can keep your payment information for the next time you shop.
  • Make sure all your passwords are different for each of your accounts, which is made easier by using a password manager. This means that if your data is obtained on one website’s data breach, hackers will not have access to your other accounts.

Sources and Methodology

Based on a survey of 1,000 US citizens aged 16 and over and picked at random from across the US, which took place in November 2021.

Censuswide conducted this survey on behalf of ProtonVPN.

Continue Reading
Advertisement

AGLC

Casino ATM Scam in Edmonton Reveals Money Laundering and Drug Links

Published

on

casino-atm-scam-in-edmonton-reveals-money-laundering-and-drug-links

 

Law enforcement in Alberta continues to search for the last suspect in a sophisticated fraud operation that targeted ATMs in Edmonton-area casinos and resulted in over CAD 1 million ($720,487) in losses throughout Western Canada.

The Royal Canadian Mounted Police (RCMP) has confirmed that Hisham Ismaeel, 28, remains at large with a province-wide warrant for his arrest. He faces charges of fraud exceeding $5000 and possessing proceeds of crime. Police have already arrested four other men linked to the scheme. Investigators describe the operation as a well-planned effort to exploit financial systems and clean dirty money.

The accused, Elliot Miao, 42, Van Bau Ta, 39, Hassan Jaafar Haydar Ahmad, 37, and Dennis Jones, 42, showed up in the Alberta Court of Justice last week. They face charges from fraud and money laundering to owning criminal property. Miao also has a narcotics trafficking charge after police found cocaine when they searched with warrants.

Investigators claim the group made coordinated withdrawals at several casino ATMs, timing their transactions to avoid getting caught. This action messed up ATM networks in the area and showed flaws in the systems that banks and casinos use to stop misuse.

The RCMP Federal Policing Northwest Region led an investigation that involved six search warrants in Edmonton. The Edmonton Police Service, the Financial Transactions and Reports Analysis Centre of Canada (FINTRAC), Alberta Gaming, Liquor and Cannabis (AGLC), and several banks supported this effort. Officials said the case shows how teamwork between public agencies and the private sector plays a key role in combating modern financial crime.

AGLC representatives pointed out that casino operators in the province must follow strict reporting and surveillance rules under Canada’s anti-money laundering laws. The specific casinos affected remain unnamed, but the Edmonton region has seven licensed facilities. AGLC said its policies helped spot problems and backed the RCMP’s investigation.

Compliance experts say this fraud shows how criminals change their methods to take advantage of weak spots in reporting limits and transaction checks. They claim that casinos, which deal with lots of cash, are still easy targets unless they keep improving their detection systems and teach their front-line workers to notice coordinated actions like several big withdrawals happening one after another.

For now, the case highlights both the money and crime aspects of casino-related fraud. Besides the million-dollar losses, finding drugs during the raids points to a bigger criminal operation where financial crimes and drug dealing overlap.

The post Casino ATM Scam in Edmonton Reveals Money Laundering and Drug Links appeared first on Gaming and Gambling Industry in the Americas.

Continue Reading

Bragg Gaming

Bragg Confirms Cyber Attack – Hackers Access Internal IT Systems

Published

on

bragg-confirms-cyber-attack-–-hackers-access-internal-it-systems

Bragg Gaming Group, a leading online gaming technology provider, has confirmed a major cybersecurity incident that compromised its internal IT infrastructure in the early hours of Saturday, August 16, 2025.

The company detected unauthorized intrusion attempts that successfully breached its internal network, triggering an immediate and comprehensive incident response.

Key Takeaways

  • Bragg Gaming Group experienced a cybersecurity breach involving access to internal IT systems.

  • No customer personal data or payment information appears to have been compromised.

  • The company has enacted full containment and investigation protocols.

Details of the Breach

According to a preliminary forensic analysis by Bragg’s internal security team, the attack was a targeted breach aimed at the company’s internal computer environment. While the exact method of intrusion is still under investigation, early indicators suggest a sophisticated exploit of internal network vulnerabilities.

Fortunately, the company’s customer-facing systems, including sensitive user data and financial information, appear to have been unaffected. Bragg’s existing encryption protocols and access control systems successfully prevented the attackers from accessing customer information.

Immediate Response Measures

In response to the breach, Bragg launched a multi-tiered containment strategy, including:

  • Network Segmentation to isolate affected systems

  • Enhanced Monitoring of data flows across its Remote Games Server (RGS) platform

  • Security Audits of critical infrastructure, including the Bragg Hub and PAM systems

  • Engagement of Independent Cybersecurity Experts to assist in incident analysis and system hardening

Bragg’s Security Operations Center has also elevated its alert level, initiating 24/7 monitoring across all server clusters and network endpoints. In addition, company-wide penetration testing is now underway to proactively identify any residual vulnerabilities.

Business Continuity Maintained

Despite the severity of the breach, Bragg reports that its operations remain unaffected. All gaming services, including iCasino and sportsbook offerings across regulated markets, continue to function without disruption.

“While this incident is deeply concerning, we are confident in the rapid and thorough response initiated by our team,” a company spokesperson stated. “We remain committed to protecting our infrastructure, our partners, and most importantly, our players.”

Looking Ahead

As part of its response, Bragg has also launched mandatory security awareness training for all employees to reinforce best practices and prevent future incidents.

Cybersecurity analysts will continue working with Bragg to determine the full scope of the attack, improve system resilience, and maintain the trust of its users and stakeholders.

Bragg’s handling of the incident highlights both the evolving nature of cybersecurity threats and the importance of robust, responsive defense systems in the digital gaming sector.

Source: cybersecuritynews.com

The post Bragg Confirms Cyber Attack – Hackers Access Internal IT Systems appeared first on Gaming and Gambling Industry in the Americas.

Continue Reading

AGCO

AGCO Removes Cap on Seller Commission for Charitable Lottery Products

Published

on

agco-removes-cap-on-seller-commission-for-charitable-lottery-products

 

The Alcohol and Gaming Commission of Ontario (AGCO) has updated several lottery policies to remove the cap on seller commission for Paper Raffles and Media Bingo, along with removing the prohibition on Catch the Ace paper lotteries, to align with other charitable lottery products.

Licensed charities may now negotiate commissions directly with sellers and determine commissions, provided they are reasonable and tied to the cost of service provided by the seller.

These updates further the AGCO’s commitment to adopt an outcomes-based regulatory approach and reduce burden for the charitable gaming sector. Local charitable organizations will have greater flexibility to make decisions that best serve their fundraising objectives.

Important Reminders

• Charities must still receive approval for other expenses incurred under their licence and retain receipts for seller commission paid.

• Licensing authorities will not require documentation to be submitted as part of the application process, however, charities are still subject to audit to determine compliance.

• Charities are reminded of their legal requirement to meet their obligations under the Criminal Code and with respect to conducting and managing a charitable gaming scheme.

• As with all licensed charitable lottery events, charities must take the necessary steps to ensure that they are conducting and managing the lottery event within Ontario.

For charitable gaming-related inquiries, email an AGCO Eligibility Officer at [email protected] or call AGCO Customer Service at 1-800-522-2876, Monday to Friday from 8:30 a.m. to 5 p.m.

The post AGCO Removes Cap on Seller Commission for Charitable Lottery Products appeared first on Gaming and Gambling Industry in the Americas.

Continue Reading

Trending