LASER Credit Access
Hero background
Fraud Intelligence7 min read

Major Data Breaches 2023–2025: Lessons for Lenders

By Michael Dunleavey
October 15, 2025Updated April 21, 2026
ftc safeguards rulethird-party vendor riskdata breach lender obligations

What the Breach Record of 2023–2025 Tells Lenders

The two-year period from 2023 through 2025 produced some of the most significant data security incidents in the history of the financial services and data industry. When examined through a compliance lens rather than a security one, the pattern that emerges is consistent: the breaches that did the most damage to financial institutions were not primarily failures of technology — they were failures of vendor oversight, compliance program design, and the kind of third-party risk management that GLBA and the FTC Safeguards Rule specifically address.

For lending institutions, the lessons are practical. The Gramm-Leach-Bliley Act and the FTC Safeguards Rule create specific obligations that apply when customer information is exposed — whether the breach originates inside the institution or at a vendor that handles that information on the institution's behalf. Understanding what those obligations require, and how recent breaches tested them, is the foundation of a compliance program that holds up under examination.

Institutions using LASER's COMPLY pillar embed these vendor oversight and incident response requirements directly into their Salesforce environment. Schedule a Compliance Discussion to assess your program against the Safeguards Rule's current requirements.

The Regulatory Framework: What GLBA and the FTC Safeguards Rule Require

Before examining specific incidents, it is worth establishing what the regulatory framework requires of lenders when customer data is exposed.

GLBA's Safeguards Rule (16 CFR Part 314) requires covered financial institutions to develop, implement, and maintain a comprehensive written information security program. The 2021 amendments — which took full effect in 2023 — significantly strengthened these requirements:
RequirementWhat It Mandates
Risk AssessmentIdentify and assess risks to customer information in each relevant area of operations
Access ControlsImplement controls to limit who can access customer information
EncryptionEncrypt customer information in transit and at rest
Multi-Factor AuthenticationRequire MFA for accessing customer information systems
Vendor OversightSelect and retain service providers that maintain appropriate safeguards; include contractual requirements
Incident Response PlanDevelop and maintain a written incident response plan
Board ReportingReport to the board of directors on the information security program annually
FTC NotificationNotify the FTC within 30 days of discovering a breach affecting 500 or more customers (effective May 2024)

The critical compliance principle that recent breaches repeatedly tested: GLBA compliance obligations do not transfer to vendors. When a third-party service provider is breached, the financial institution's compliance obligations — including vendor oversight, incident response, and notification — remain with the institution.

The National Public Data Breach: A Vendor Risk Case Study

The National Public Data breach — which exposed the personal information of potentially hundreds of millions of individuals, including Social Security numbers and addresses — became one of the most significant third-party data exposure events in history. For lenders, the incident was a direct test of their third-party vendor risk management provisions.

NPD operated as a background check and data aggregation service used by financial institutions, employers, and other organizations to verify identities and run background screenings. The breach did not originate inside any lending institution — but lending institutions that used NPD's services faced real questions about whether their information security programs had adequate vendor oversight provisions, whether their vendor contracts required NPD to maintain appropriate safeguards, and whether they had conducted adequate due diligence on NPD's security practices.

As detailed in our analysis of the National Public Data breach and its lessons for lenders, the FTC Safeguards Rule's vendor oversight provisions require financial institutions to go beyond selecting reputable vendors — they require ongoing oversight and contractual protections that create accountability throughout the data supply chain.

Third-Party Vendor Breaches: The Consistent Pattern

Across the major breach incidents of 2023–2025, a consistent pattern emerged for financial services firms:

  • A vendor or data aggregator handling customer information experiences a breach
  • The financial institution learns of the incident through the vendor's notification — often weeks after discovery
  • The institution must assess whether its own customers' information was affected
  • The institution must evaluate whether its vendor oversight provisions, contractual requirements, and incident response plan are adequate under the Safeguards Rule
  • If 500 or more customers are affected, the institution must notify the FTC within 30 days of discovery
  • The institutions that navigated these incidents most effectively were those whose information security programs included specific, documented vendor oversight provisions — contractual security requirements, periodic vendor security assessments, and incident notification obligations — rather than broad policy statements about vendor management.

    What These Breaches Mean for Your GLBA Program

    The breach record of 2023–2025 reveals five specific areas where lenders' GLBA compliance programs were most frequently tested:

    Vendor contract language. Institutions with specific, contractual security requirements in their vendor agreements were better positioned to hold vendors accountable and to demonstrate adequate oversight to regulators. Vague "industry-standard security" language does not satisfy the Safeguards Rule's vendor oversight provisions. Encryption scope. Several major breaches involved data that was technically encrypted but where the encryption keys were also compromised — or data that was unencrypted in transit between systems. The Safeguards Rule requires encryption of customer information at rest and in transit; the breach record shows that partial encryption programs leave material exposure. Incident response plan currency. Institutions whose incident response plans had not been updated to reflect the Safeguards Rule's 30-day FTC notification requirement (effective May 2024) faced gaps in their response procedures. Incident response plans require regular review and updating as regulatory requirements evolve. Board reporting. The Safeguards Rule requires annual reporting to the board of directors on the status of the information security program. Institutions where breach incidents surfaced gaps in board-level visibility into third-party risk were often those where the annual reporting requirement had not been treated as a substantive review. Third-party risk inventory. Institutions with a clear, current inventory of all vendors handling customer information — including subprocessors and data aggregators — were able to assess breach impact more quickly and accurately than those without systematic vendor tracking.

    Building a Safeguards-Ready Compliance Program

    The FTC Safeguards Rule is not primarily a technology requirement — it is a program requirement. The institutions that demonstrate the most effective compliance programs under examination are those that have embedded the Rule's requirements into their operational workflows rather than their policy binders.

    For lenders on Salesforce, this means:

    • Vendor oversight provisions that are contractual, specific, and documented within the platform
    • Encryption standards verified and documented for all customer data in transit and at rest
    • Incident response plans that reflect current notification requirements and are reviewed annually
    • Board reporting workflows that generate and document the required annual information security update

    As detailed in our analysis of what lenders need to know about third-party risk, FCRA compliance and GLBA compliance obligations do not transfer to vendors — they remain with the institution regardless of where in the ecosystem a failure occurs.

    What This Means for Your Institution

    The major breaches of 2023–2025 were not anomalies. The threat landscape for financial services data has become more sophisticated, and the vendor ecosystem that lenders rely on has become a primary attack surface. The FTC Safeguards Rule's vendor oversight and notification requirements exist precisely because regulators recognized this pattern.

    Institutions that treat these breaches as case studies — and use them to evaluate the specific provisions of their own information security programs — are building the compliance posture that both examiners and the current threat environment require. The question is not whether your institution will encounter a third-party security incident. The question is whether your information security program is designed to respond to it effectively when it happens.


    Schedule a Compliance Discussion to assess your institution's GLBA Safeguards Rule compliance program against the requirements that recent major breaches most frequently tested.

    Frequently Asked Questions

    What does the FTC Safeguards Rule require when a lender's vendor is breached?

    The FTC Safeguards Rule requires covered financial institutions to maintain a written information security program that includes vendor oversight provisions. When a vendor experiences a breach affecting customer information, the institution must assess the impact, notify the FTC if 500 or more customers are affected (effective May 2024), and evaluate whether the vendor oversight provisions of its program were adequate. Vendor breaches do not transfer GLBA compliance obligations — they remain with the institution.

    How does GLBA's Safeguards Rule define a reportable security event?

    The FTC Safeguards Rule (as amended in 2021) defines a 'notification event' as unauthorized acquisition of unencrypted customer information — or encrypted information where the encryption key was also acquired — affecting 500 or more customers. Notification to the FTC must occur as soon as possible and no later than 30 days after discovery.

    Are lenders responsible for breaches at their third-party vendors?

    Lenders are responsible for ensuring their vendors maintain appropriate safeguards for customer information — and for having written vendor oversight provisions in their information security programs. GLBA compliance obligations do not transfer to vendors; the institution remains responsible regardless of where in the ecosystem a failure occurs. The FTC has taken enforcement action against institutions for inadequate vendor oversight.

    What should lenders review in their GLBA compliance programs after a major industry breach?

    After a significant industry breach, lenders should review their vendor risk management provisions, confirm encryption standards for data at rest and in transit, verify incident response plan currency, assess whether affected data categories are part of their own vendor relationships, and ensure board-level reporting on information security program status has occurred. The FTC Safeguards Rule requires annual board reporting.

    Michael Dunleavey

    Founder — LASER Credit Access

    Michael Dunleavey brings over 15 years of experience in credit infrastructure and lending compliance, helping financial institutions streamline operations on Salesforce.

    Ready to Transform Your Credit Operations?

    Discover how LASER Credit Access streamlines compliance and decisioning natively inside Salesforce — unified in a single app, ready from day one.