Wednesday, June 7, 2023
  • About us
  • Соntасt us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
  • Home
  • News
    Different types of voice over artist

    Different types of voice over artist

    Crucial Things You Should Know About Research Chemicals

    Crucial Things You Should Know About Research Chemicals

    How counselors help people cope with the challenges of modern society

    How counselors help people cope with the challenges of modern society

    Training and Certification in Industrial Cleaning

    Training and Certification in Industrial Cleaning

    Everything You Need To Know About /moxn5ycafzg

    Everything You Need To Know About /moxn5ycafzg

    Empower Your Ambience: The Ultimate Guide to Inspirational Neon Signs for a Positive Atmosphere

    Empower Your Ambience: The Ultimate Guide to Inspirational Neon Signs for a Positive Atmosphere

    The LastPass Breach: Why Password Managers Can't Always Keep You Safe

    The LastPass Breach: Why Password Managers Can’t Always Keep You Safe

    The Truth About Getting a Free iPhone with Food Stamps

    The Truth About Getting a Free iPhone with Food Stamps

    Hankotrade: The Low-Cost, High-Performance Online Trading Platform

    Hankotrade: The Low-Cost, High-Performance Online Trading Platform

  • Lifestyle
    How to Safely Travel with Your Beloved Dog

    How to Safely Travel with Your Beloved Dog

    Residential Pressure Washer: The Perfect Cleaning Companion for Your Home

    Residential Pressure Washer: The Perfect Cleaning Companion for Your Home

    Jane Morales on the Importance of Appreciating a Blessing in All Aspects of Life

    Jane Morales on the Importance of Appreciating a Blessing in All Aspects of Life

    Taj Mahal Tour Packages for the Adventure-Seeker: Uncover the Secrets of Agra

    Taj Mahal Tour Packages for the Adventure-Seeker: Uncover the Secrets of Agra

    Onitsuka

    7 Super Trendy & Cool Ways To Style Men’s Onitsuka Tiger Shoes With Casual Outfits

    Summer

    A Complete Guide On Summer Sandals: Check Out These 8 Trendy Sandals for Men

  • Business
    World Stock Market Timings as per Indian Stock Market Timings:

    World Stock Market Timings as per Indian Stock Market Timings:

    Ultimate Guide to Lottery Sambad

    Ultimate Guide to Lottery Sambad

    asian-wedding-venues

    Planning Asian Wedding Venues: Tips for a Memorable Celebration

    business plan writing

    Elements of a Comprehensive Business Plan

    Online Ray Ban Sale

    Online Ray Ban Sale

    Why Window Replacement Is a Must for Windows Near Fireplaces

    Why Window Replacement Is a Must for Windows Near Fireplaces

  • Technology
    The TikTok Phenomenon: A Comprehensive Analysis of Downloading Videos

    The TikTok Phenomenon: A Comprehensive Analysis of Downloading Videos

    Use Cases for New Catalyst Technology

    Use Cases for New Catalyst Technology

    How to Remote Control PC from iPhone from Anywhere [Free]

    How to Remote Control PC from iPhone from Anywhere [Free]

    Z-Test

    Understanding the Difference between Z-Test and T-Test

    Three major cybersecurity breaches in the last six months and how they could have been prevented

    Three major cybersecurity breaches in the last six months and how they could have been prevented

    6 Effective Marketing Strategies for Your Clothing Brand

    Secure Your Internet: It’s Easy With iTop’s PC Free VPN

    Sony XM5 - The Ultimate Noise Cancelling Headphones for Audiophiles

    Sony XM5 – The Ultimate Noise Cancelling Headphones for Audiophiles

    Beats Fit Pro vs AirPods Pro: Which is the Ultimate Wireless Earbuds?

    Beats Fit Pro vs AirPods Pro: Which is the Ultimate Wireless Earbuds?

    Stop Wasting Time Searching for Your Keys – Get the Rinex Key Finder Today!

    Stop Wasting Time Searching for Your Keys – Get the Rinex Key Finder Today!

  • Education
    Education

    Improving Access and Retention in Education With The Use of Digitalization

    The Advantages of Pursuing Online Foundation Courses

    The Advantages of Pursuing Online Foundation Courses

    STEM System Of Education: An Inquisitive Mind’s New Best Friend?

    STEM System Of Education: An Inquisitive Mind’s New Best Friend?

    What Makes These Luxury Convertibles Stand Out from the Crowd?

    How Can The Safer Drivers Course Improve Your Driving Skills?

    OET Exam

    Top 10 Tips to Save Money on Your OET Exam Fees

    Finance skills that are important for success

    Finance skills that are important for success

    Five Effective Tips for Beginner Creative Writers

    Five Effective Tips for Beginner Creative Writers

    Dyslexia Symptoms to Look For When Testing at Different Stages

    Insider Tips to Jumpstart Your Career After College

    Insider Tips to Jumpstart Your Career After College

No Result
View All Result
  • Home
  • News
    Different types of voice over artist

    Different types of voice over artist

    Crucial Things You Should Know About Research Chemicals

    Crucial Things You Should Know About Research Chemicals

    How counselors help people cope with the challenges of modern society

    How counselors help people cope with the challenges of modern society

    Training and Certification in Industrial Cleaning

    Training and Certification in Industrial Cleaning

    Everything You Need To Know About /moxn5ycafzg

    Everything You Need To Know About /moxn5ycafzg

    Empower Your Ambience: The Ultimate Guide to Inspirational Neon Signs for a Positive Atmosphere

    Empower Your Ambience: The Ultimate Guide to Inspirational Neon Signs for a Positive Atmosphere

    The LastPass Breach: Why Password Managers Can't Always Keep You Safe

    The LastPass Breach: Why Password Managers Can’t Always Keep You Safe

    The Truth About Getting a Free iPhone with Food Stamps

    The Truth About Getting a Free iPhone with Food Stamps

    Hankotrade: The Low-Cost, High-Performance Online Trading Platform

    Hankotrade: The Low-Cost, High-Performance Online Trading Platform

  • Lifestyle
    How to Safely Travel with Your Beloved Dog

    How to Safely Travel with Your Beloved Dog

    Residential Pressure Washer: The Perfect Cleaning Companion for Your Home

    Residential Pressure Washer: The Perfect Cleaning Companion for Your Home

    Jane Morales on the Importance of Appreciating a Blessing in All Aspects of Life

    Jane Morales on the Importance of Appreciating a Blessing in All Aspects of Life

    Taj Mahal Tour Packages for the Adventure-Seeker: Uncover the Secrets of Agra

    Taj Mahal Tour Packages for the Adventure-Seeker: Uncover the Secrets of Agra

    Onitsuka

    7 Super Trendy & Cool Ways To Style Men’s Onitsuka Tiger Shoes With Casual Outfits

    Summer

    A Complete Guide On Summer Sandals: Check Out These 8 Trendy Sandals for Men

  • Business
    World Stock Market Timings as per Indian Stock Market Timings:

    World Stock Market Timings as per Indian Stock Market Timings:

    Ultimate Guide to Lottery Sambad

    Ultimate Guide to Lottery Sambad

    asian-wedding-venues

    Planning Asian Wedding Venues: Tips for a Memorable Celebration

    business plan writing

    Elements of a Comprehensive Business Plan

    Online Ray Ban Sale

    Online Ray Ban Sale

    Why Window Replacement Is a Must for Windows Near Fireplaces

    Why Window Replacement Is a Must for Windows Near Fireplaces

  • Technology
    The TikTok Phenomenon: A Comprehensive Analysis of Downloading Videos

    The TikTok Phenomenon: A Comprehensive Analysis of Downloading Videos

    Use Cases for New Catalyst Technology

    Use Cases for New Catalyst Technology

    How to Remote Control PC from iPhone from Anywhere [Free]

    How to Remote Control PC from iPhone from Anywhere [Free]

    Z-Test

    Understanding the Difference between Z-Test and T-Test

    Three major cybersecurity breaches in the last six months and how they could have been prevented

    Three major cybersecurity breaches in the last six months and how they could have been prevented

    6 Effective Marketing Strategies for Your Clothing Brand

    Secure Your Internet: It’s Easy With iTop’s PC Free VPN

    Sony XM5 - The Ultimate Noise Cancelling Headphones for Audiophiles

    Sony XM5 – The Ultimate Noise Cancelling Headphones for Audiophiles

    Beats Fit Pro vs AirPods Pro: Which is the Ultimate Wireless Earbuds?

    Beats Fit Pro vs AirPods Pro: Which is the Ultimate Wireless Earbuds?

    Stop Wasting Time Searching for Your Keys – Get the Rinex Key Finder Today!

    Stop Wasting Time Searching for Your Keys – Get the Rinex Key Finder Today!

  • Education
    Education

    Improving Access and Retention in Education With The Use of Digitalization

    The Advantages of Pursuing Online Foundation Courses

    The Advantages of Pursuing Online Foundation Courses

    STEM System Of Education: An Inquisitive Mind’s New Best Friend?

    STEM System Of Education: An Inquisitive Mind’s New Best Friend?

    What Makes These Luxury Convertibles Stand Out from the Crowd?

    How Can The Safer Drivers Course Improve Your Driving Skills?

    OET Exam

    Top 10 Tips to Save Money on Your OET Exam Fees

    Finance skills that are important for success

    Finance skills that are important for success

    Five Effective Tips for Beginner Creative Writers

    Five Effective Tips for Beginner Creative Writers

    Dyslexia Symptoms to Look For When Testing at Different Stages

    Insider Tips to Jumpstart Your Career After College

    Insider Tips to Jumpstart Your Career After College

No Result
View All Result
No Result
View All Result
Home Technology

Three major cybersecurity breaches in the last six months and how they could have been prevented

Anus KhatribyAnus Khatri
May 9, 2023
inTechnology
0
Three major cybersecurity breaches in the last six months and how they could have been prevented
587
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

For many CEOs, cybersecurity attacks are the stuff of nightmares. According to a 2019 C-Suite study, their biggest concern, even more than a recession, is a cyberattack. Another report by the ISC highlights it as the biggest risk of doing business in North America.

These studies show just how critical cybersecurity has become for businesses in the United States. CEOs feel they can cope with new competitors, a recession, and even terrorism, but data breaches are harder to work through.

You might also like

The TikTok Phenomenon: A Comprehensive Analysis of Downloading Videos

Use Cases for New Catalyst Technology

How to Remote Control PC from iPhone from Anywhere [Free]

It is no wonder that companies are spending tens of millions of dollars to protect systems and data. The average business spends about 10% of its IT budget protecting data and preventing breaches.

In June 2022, the government committed $15.6 billion to cybersecurity. Most of this money was allocated to the Department of Defense and the rest to the Cybersecurity and Infrastructure Security Agency (CISA).

In addition to paying for advanced technologies and software, the private sector and the US government are looking for the best talent in this field. People with the right qualifications will make excellent careers in this sector.

An online masters in cybersecurity, for example, is a highly marketable qualification. Such as the course available from St Bonaventure University, which covers enterprise security, cybersecurity forensics, and data mining for cybersecurity. Students also learn machine learning and how it applies to cyber threats as well as risk management and system protection.

All material is offered online, which makes the course ideal for working professionals. You don’t need a background in cybersecurity to qualify for this program. You can do a foundation course for the basics and then enroll in the masters program.

To buffer up the foundation course, it is important to know about cybersecurity threats and how they can be prevented.

Three biggest data breaches of the last six months

When looking at cybersecurity threats, it makes sense to consider the most recent ones. The technologies behind these threats evolve. Looking at the latest threats gives you an insight into the latest techniques hackers use.

As you will see below, even the most stable businesses can be crippled by an attack.

Chick-fil-A (March 2023)

On the 6th of March, the fast-food company reported that a data breach had potentially exposed customer details.

Although only about 2% of customers were affected, there was enough concern for the company to issue a statement assuring customers that they shouldn’t worry; its IT people were doing everything they needed to do to prevent further breaches.

The CEO acted fast, communicating with everyone affected to let them know they should be on the lookout.

How did it happen? The company noticed unusual login activity on one account, and upon investigation, discovered an ongoing breach since December 2022. Hackers had accessed the website and the app using email addresses and passwords obtained from a third party.

They were able to download customer names and addresses, mobile payment details, and membership numbers. They also had QR codes and money saved on Chick-fil-A accounts. They also accessed credit and debit card numbers but could only see the last four digits. They could have used this information to make fake orders and redeem customer points for gifts and rewards.

ChatGPT (March 2023)

On the 20th of March, there was trouble in chatbot paradise. An outage exposed user payment details and personal information. However, the company was quick to point out that only 1.2% of its subscriber base was affected.

During the nine-hour window, some users could see others’ first and last names, emails, and payment details. They could also see payment addresses, the last four credit card numbers as well as the expiration date.

ChatGPT has taken the world by storm, and hackers have taken notice. Americans have been skeptical about ChatGPT and are cautious about AI in general, so this breach did not do the company any favors.

Granted, we have not heard reports about the hack slowing down subscriber numbers, but what we can infer from it is that the company needs to improve cybersecurity with particular attention to user information.

How did the breach happen? The company explained that they had found a bug in an open-source library that exposed details for users who were logged in at the same time.

T-Mobile (January 2023)

In early January, the company discovered that hackers had been in their systems since November and had harvested user information. They got the first and last names, email addresses, and birthdays of more than 37 million T-Mobile customers.

The malicious hackers gained access through an API. Fortunately, they didn’t get access to credit card information, social security numbers, or financial information.

The company announced that it took action as soon as it noticed the breach, launching an investigation to trace the source and find how many records were compromised.

T-Mobile has a history of cybersecurity breaches. In July 2022, the company paid out $350m to customers affected by a 2021 intrusion. After the settlement, the company promised to spend at least $150m to improve systems and secure customer data. T-Mobile was also breached in 2018 and 2019.

How often does the US government experience cyberattacks?

They are just as frequent as in the private sector and can sometimes bring vital government functions to a standstill.

So far this year, Alabama, Kansas, Utah, and California are just a few states that have had to deal with cybersecurity threats. These range from ransomware to crypto thefts.

Not very long ago, the government of Alaska was hit by a malware attack that affected the basic functions of government. It was apparent that an employee had opened an email attachment or link, and it released malicious code into the system.

In a short time, it infected more than 600 computers, government servers, and other devices. It affected phone systems as well as computers used to access tax, property, and finance files.

Staffers had to do math using calculators and issue handwritten receipts to those who needed government services. Some historical information was lost, but IT staffers worked long and hard to rectify the systems within a few days.

This is just one example of how serious cybersecurity attacks can be. They can paralyze some of the basic systems we take for granted.

The other thing to note about these attacks is how long it took for anyone to notice that their systems had been hacked. When you think about how much data hackers can gather in two or three months, you see how extensive and damaging cyberattacks can be.

What makes companies vulnerable?

Before we look at what the three companies we have discussed could have done differently, it is worthwhile to consider what made them vulnerable in the first place.

Some businesses seem vulnerable to cyber threats; they get attacked repeatedly, almost like hackers are lurking in the shadows, looking for the smallest opportunity to gain entrance.

Experts agree that there are three things that these businesses share:

  • They have existing vulnerabilities. Hackers are smart. Once they find a way to infiltrate a system, they leave it open for future attacks. When they want to come back a second or third time, all they have to do is find the “door” left open. They are particularly giddy when they discover companies that don’t actively seek out and repair vulnerabilities.
  • Human error is the second most common factor that these businesses share. In many cases, attacks happen because employees use weak passwords that can be cracked easily.Sometimes people forget to log out of systems, leaving them wide open for anyone with basic hacking skills to walk through. Public Wi-Fi systems also expose employees to malicious entities. Phishing attacks are mostly attributed to clicking on attachments or links from unknown senders.
  • Malware is another running theme in companies that suffer frequent cyber attacks. It can be a virus, ransomware, spyware, adware, trojan, and other malicious code that is cleverly inserted into company devices.
  • Inside actors are also a factor, although they are rare. A disgruntled can plant malicious code to get back at their employer.

What can businesses do to prevent future attacks?

Below are the things CEOs should be doing to secure their systems and minimize exposure.

Limit access to sensitive information

One of the things you will learn in the online cyber masters program is that data should not be compartmentalized, but it also should not be open to all either. It doesn’t make sense for the mailroom employee or the receptionist to have access to customer details.

Limiting access allows you to trace breaches as soon as they happen. You know who has permission for different areas, so if there is a breach, you have a narrow pool of suspects.

It helps track down and correct problems before they become a crisis.

Know your third-party vendors

The guy who delivers printer paper to your office just got out of prison on a fraud or robbery charge. Or the guy who services your printers has a record. Do you want to let these people anywhere near your data?

Not only do you leave yourself open to data breaches, but you also open yourself up to lawsuits. If an attack occurs and customers realize that their details ended up in the wrong hands because you didn’t carry out due diligence on third-party vendors, you may be forced to pay millions.

Do not work with third-party vendors you cannot vouch for, especially if they are allowed access to important data. Hold your vendors accountable. Make sure they provide proof that they are complying with privacy requirements.

Train your employees on system security

It is not uncommon for a CEO to hire an IT manager or director and then sit back and assume that all will be well. The IT department cannot nail down security if others within the organization don’t cooperate.

Every employee needs to understand data breaches, how they happen, and what they can cost the company. Smart CEOs organize company-wide training sessions and refreshers to make sure that every employee is up to date.

Training can be conducted by an outside entity in conjunction with the IT department. They are likely to be objective, and will point out problems wherever they find them.

Do regular software updates

Software updates include security patches. If you regularly update business software, you have the latest patches, and although this may not stop hackers, it will slow them down.

Whenever possible, use SaaS software. It is cloud-based, and the creator is responsible for security and maintenance. These systems are harder to hack because they have fewer vulnerabilities.

Remind your employees to keep their devices updated. Whenever they receive a notification about a software update for their laptop, phone, or tablet they should install it right away.

Encourage everyone to have passwords that are difficult to crack

Almost 10 or 20 years ago, CEOs did not care about employee passwords. They were considered a private affair. The attitude has changed, and today’s managers ensure that employees use passwords that are difficult to decipher.

Some companies insist on employees using automatically generated passwords. Others use double authentication.

Whatever you choose, the important thing is to make sure that a breach is not easy.

Have a response plan in place

Looking at hacking statistics, you can’t help but feel that it is only a matter of time before you become a victim. You may not be breached yet, but in a few months or maybe years, you will have to deal with a malicious entity in your system. How will you go about it?

It is one area that companies don’t pay attention to. The general assumption is that if there is an attack, the IT team will deal with it.

That is not an adequate response. You should have a comprehensive plan that outlines exactly what happens and who is responsible for what.

Do you, for example, shut down all systems? If yes, who should do it? How will the attack be communicated to the rest of the employees? How will normal operations continue when systems are down?

Most importantly, how will you inform your customers there has been a breach, and what will you offer as mitigation? If there are financial settlements, how will they be handled?

A cyberattack response plan is a comprehensive document that should be developed with the cooperation of all stakeholders. It must be communicated to the rest of the company so that each person knows what to do when the time comes.

Reassure all customers

It is the hardest part for CEOs. Letting customers know that they have been breached may feel like a betrayal to them. They trusted you with their data, but you were not careful enough, and now it is in the wrong hands.

Unfortunately, it has to be done, and the sooner the better. Reach out to each affected customer and let them know what details are out there. Advise them to look for suspicious activity in their bank accounts and online transactions.

You should also talk to those who are not directly affected and reassure them that you have stopped the breach and they need not worry about their data.

Reassuring customers could make a difference to your bottom line. Consumer surveys across America have shown that more than 50% of respondents cut back on online purchases if they feel their data could end up in the wrong hands.

Businesses may need a good PR campaign to help them recover. However, they should not let the spin masters be the face of the company. Smart CEOs engage with the public. It becomes easier to buy back trust.

What can we learn from past cyber attacks?

The most important lesson you can learn from past attacks is that every business, big or small, is vulnerable. They can have the best systems and all security measures in place, but hackers may still get through.

It is the job of the malicious actor to stay ahead of the curve, and they continually develop new technologies that can get around firewalls and passwords.

It is not to say that businesses should give up. On the contrary, companies must invest in cybersecurity if they hope to survive.

They must be alert at all times, conducting frequent audits of their systems to sniff out vulnerabilities.

As mentioned before, complacency is common in companies that are frequent victims of attacks. Smart CEOs do routine internal checks every month but also invite consultants to give systems a thorough audit once or twice a year.

Conclusion

Cyberattacks are the biggest threat that American businesses face today. They come in many forms, and have the potential to shut down otherwise healthy companies.

Senior management should invest in the latest technologies and have a response plan. That way, if they should become victims, they don’t waste valuable time.

SEE ALSO

Tags: cybersecurity breachesmajor cybersecurity breaches
Previous Post

Taj Mahal Tour Packages for the Adventure-Seeker: Uncover the Secrets of Agra

Next Post

Jane Morales on the Importance of Appreciating a Blessing in All Aspects of Life

Anus Khatri

Anus Khatri

Related Posts

The TikTok Phenomenon: A Comprehensive Analysis of Downloading Videos
Technology

The TikTok Phenomenon: A Comprehensive Analysis of Downloading Videos

by Daniel
June 6, 2023
Use Cases for New Catalyst Technology
Technology

Use Cases for New Catalyst Technology

by Daniel
June 6, 2023
How to Remote Control PC from iPhone from Anywhere [Free]
Technology

How to Remote Control PC from iPhone from Anywhere [Free]

by Anus Khatri
May 25, 2023
Z-Test
Technology

Understanding the Difference between Z-Test and T-Test

by Steve Smith
May 18, 2023
6 Effective Marketing Strategies for Your Clothing Brand
Technology

Secure Your Internet: It’s Easy With iTop’s PC Free VPN

by Steve Smith
April 27, 2023
Next Post
Jane Morales on the Importance of Appreciating a Blessing in All Aspects of Life

Jane Morales on the Importance of Appreciating a Blessing in All Aspects of Life

Recommended

Media box Image

Unlimited Movies and TV Shows with Amazing Features on Media box HD

November 8, 2022
Why Are All The Roof Replacement Estimates Priced So Diversely?

Why Are All The Roof Replacement Estimates Priced So Diversely?

November 17, 2022

Categories

  • Biography
  • Business
  • Celebrity
  • Crypto
  • Digital Marketing
  • Education
  • Entertainment
  • Fashion
  • Finance
  • Food
  • Games
  • Health
  • Lifestyle
  • Music
  • News
  • Product
  • Review
  • Sports
  • Technology
  • Tools
  • Travel
  • Uncategorized

Don't miss it

Combining Radiofrequency Energy and Microneedling for Skin Tightening
Health

Combining Radiofrequency Energy and Microneedling for Skin Tightening

June 6, 2023
The TikTok Phenomenon: A Comprehensive Analysis of Downloading Videos
Technology

The TikTok Phenomenon: A Comprehensive Analysis of Downloading Videos

June 6, 2023
Use Cases for New Catalyst Technology
Technology

Use Cases for New Catalyst Technology

June 6, 2023
Brown Leather Jacket
Fashion

Brown Leather Jacket for Men: Effortlessly Cool and Masculine

June 5, 2023
Education
Education

Improving Access and Retention in Education With The Use of Digitalization

June 5, 2023
Uncategorized

Why Every Man Needs a Black Leather Jacket in His Wardrobe

June 5, 2023

OVERINSIDER

Overinsider is The Best News Magazine where you will find the top news, insights, trends and gossip in the Technology, Health, Business, Education, Biography, Lifestyle, Entertainment, Review, Fashion. It is an easy way to keep up to date with the latest trends.

Email us at: anuskseo@gmail.com

  • About us
  • Соntасt us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

© 2022 Overinsider - All Rights Reserved.

No Result
View All Result
  • Home
  • About us
  • Соntасt us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

© 2022 Overinsider - All Rights Reserved.