
In June 2025, the UK’s Information Commissioner’s Office (ICO) imposed a £2.31 million fine on 23andMe for failing to safeguard the personal information of UK users. This penalty stemmed from a significant data breach in 2023, where hackers exploited reused login credentials to access sensitive genetic data. The breach affected 155,592 UK residents, exposing details such as names, birth years, locations, profile images, race, ethnicity, family trees, and health reports. The ICO’s investigation revealed that 23andMe lacked essential security measures, including multi-factor authentication and secure password protocols, leaving users’ data vulnerable to exploitation. The company has since implemented mandatory multi-factor authentication and enhanced security protocols to prevent future breaches. This incident underscores the critical importance of robust cybersecurity practices, especially when handling sensitive genetic information. The ICO’s decision highlights the need for companies to prioritize data protection to maintain user trust and comply with data protection laws.
Protect your data without breaking the bankTrueNAS combines award-winning quality with cost efficiency.
Beyond mandatory MFA, what specific proactive threat hunting strategies could organizations employ to detect and mitigate credential stuffing attacks before they escalate into significant data breaches?
That’s a great point! In addition to MFA, implementing behavioral analysis to identify unusual login patterns could be a powerful proactive strategy. Real-time monitoring and alerting systems can help detect and respond to suspicious activity before a full breach occurs. What are your thoughts?
Editor: StorageTech.News
Thank you to our Sponsor Esdebe