Moral of the story: - Endpoint protection and patching are the two very useful protection that you can implement.
This is victim # 04
SNIPPETS from the Article:-
- Cleanup costs following the discovery of the breach cost the military $10 million and led to the Navy reviewing its security efforts
- The HP contract with the military did not include securing a set of Navy Department databases that were later hacked
- "If you write a contract, you have to make it idiot proof, because the other side will follow it exactly to the letter and not more."
- "Organizations looking to avoid a similar fate should ensure that the responsibility for securing systems is clearly specified in the contract," he said.
The links below has more details:
http://www.csoonline.com/article/749450/navy-network-hack-has-valuable-lessons-for-companies?source=rss_data_privacy
Previous Victims: (Count started in March 2014)
1. Sally Beauty
http://martin-news-bytes.blogspot.com/2014/03/beauty-chain-sally-beauty-turns-ugly.html
2. Comixology
http://martin-news-bytes.blogspot.com/2014/03/another-day-another-data-breach-current.html
3. Korea Telecom
http://martin-news-bytes.blogspot.com/2014/03/12-million-customer-records-stolen-korea.html
1. Sally Beauty
http://martin-news-bytes.blogspot.com/2014/03/beauty-chain-sally-beauty-turns-ugly.html
2. Comixology
http://martin-news-bytes.blogspot.com/2014/03/another-day-another-data-breach-current.html
3. Korea Telecom
http://martin-news-bytes.blogspot.com/2014/03/12-million-customer-records-stolen-korea.html
No comments:
Post a Comment