Send an internal memo. Warn them about highly targeted phishing emails referencing their past PDL searches. Tell them: "If you get an email offering you a lead list you previously searched for, do not click it. Verify via Slack or Teams first."

Stay safe, and audit your vendors before they audit you.

Too often, we vet vendors for price and features, but not for their internal security hygiene. PDL aggregates sensitive professional data, yet their customer portal appears to have been left vulnerable. This is a classic case of focusing on securing the product (the data they sell) while ignoring the back office (the customer login portal). If your team has ever used People Data Labs (or similar enrichment tools like Apollo, Lusha, or ZoomInfo), treat this as an active threat.

Recently, reports surfaced regarding a significant data incident involving PDL’s customer infrastructure. While the headlines focused on the volume of records, the real story is what this breach means for you, your business, and your sales team.

Here is what we know, and what you need to do right now. In early [Current Year], security researchers flagged that a misconfigured database or an exposed API key led to unauthorized access to PDL’s customer management system . Unlike previous breaches that leaked the "source" data (public LinkedIn profiles), this breach targeted the customers of PDL.

Change your PDL password. If you use that password anywhere else (especially your primary work email or CRM), change those too. Enable Multi-Factor Authentication (MFA) everywhere you can.