Holes in your enterprise’s security may be an ample opportunity for malicious hackers to steal sensitive data and capitalize on the newfound information. Some hackers, however, choose to just disrupt the daily functions of a website in order to be an annoyance. Whatever a hacker’s intention, a look at three recent security breaches is a cautionary tale for security teams to continuously look for and improve any weaknesses in their network defenses.
- More than 8,000 Tumblr user accounts have been disrupted by the spread of an offensive post created by a hacker group. The worm that continuously reposted itself on victims’ pages consisted of an angry rant against Tumblr users, calling them “self-indulgent.” Tumblr has since fixed the issue and confirmed that the hackers were unable to compromise user accounts.
Personal Information of 1 Million People Compromised in Nationwide Insurance Breach
- Hackers recently retrieved the personal information of one million people associated with Nationwide Insurance. Sensitive information such as full names, and social security numbers were stolen in the breach, although hackers did not reach highly-sensitive credit card information. Although Nationwide is unsure of how their databases and computer systems were compromised, they are notifying victims and compensating them with free credit monitoring and identity theft protection services for one year.
Australia’s Largest Cyber Threat
- A Romanian hacker group installed remote desktop software on Point of Sale systems of an Australian small business to record the credit card information that was entered into the systems. With this stolen data, they were able to counterfeit transactions totaling more than $30 million. Australian banks reimbursed cardholders’ losses resulting from the fraudulent transactions.
Although they have since been resolved, these incidents exemplify how vulnerable networks may be and the importance of proper security measures. Expanding security policies with products that feature secure remote access, strong encryption and reliable authentication methods for example, prevent the opportunity for hackers to seize sensitive data or disrupt your business.
You must be registered in order to write comments. To register as a new user click here.
If you're already registered, please leave a comment here