G4S Africa supports small business development thr... » The latest product in the G4S Deposita range is a smart safe system called mini-pay that holds up to... Commissioner's statement following incident in Man... » This is an utterly appalling attack. My thoughts are with the people of Manchester as they try to co... UPDATE: Policing events in the Capital » Following the horrific terrorist attack in Manchester last night, in which 22 people were killed and... Statement from Assistant Commissioner » Statement from Assistant Commissioner Mark Rowley, Head of National Counter Terrorism Policing: The... Met intensifies policing activities in London fol... » The Metropolitan Police Service (MPS) has increased police numbers and operations across the Capital... OF FOOLS OF THE MIDDLE BELT, ONE NORTH AND PASTORA... » Please visit also: www.scorpionnewscorp.com SERIES: BUHARISM AND THE FIERCE URGENCY OF NOW A treat... Home Secretary’s statement on the Manchester attac... » I know that some people will only just be waking up to the news of the horrific attacks in Mancheste... Checkpoint Systems unveils Bug Tag 2 loss preventi... » Checkpoint Systems has announced the launch of Bug Tag 2 – an innovative loss prevention solution th... Edesix launches new head and torso mounted body wo... » Edesix has announced the launch of new head and torso mounted cameras. The X-100 is a side-mounta... Banknote Watch offers essential advice as old £5 i... » As of Friday 5th May 2017, the paper £5 note was officially withdrawn from circulation and no lo...

CLICK HERE TO

SOCIAL BOOKMARK

Talking Point Banner

It's widely reported by Variety and other outlets that a third-party to Netflix and major entertainment networks was hacked late last year, and the hacker is threatening to release episodes of unreleased shows, having released some episodes of Orange is The New Black. In response:

 

Jonathan Dambrot, CEO / Co-Founder of third-party cyber risk specialists Prevalent, Inc, says: "This hack continues to show the need to ensure that sensitive data is properly protected throughout the data supply chain. The boundary for protection must include every partner with access to sensitive data and systems.

"For Netflix, this must include anyone who touches its most valuable programming. Netflix builds awareness and subscription demand based on its fantastic programming, but no business can own every part of its production process. It must depend on strong, secure partners, which must be assessed as part of the contract process and monitored regularly throughout the life of the relationship."

David Vergara, Head of Global Product Marketing, VASCO Data Security:

On the many possible root causes of the breach -

1. Weak and Stolen Credentials, a.k.a. Passwords

Hacking attacks may well be the most common cause of a data breach but it is often a weak or lost password that is the vulnerability that is being exploited by the opportunist hacker. The Simple Solution: Use complex passwords and strong authentication, and never share passwords.

2. Back Doors, Application Vulnerabilities

Why bother breaking the door down when the door is already open? Hackers love to exploit software applications which are poorly written or network systems which are poorly designed or implemented, they leave holes that they can crawl straight through to get directly at your data. The

Simple Solution: Keep all software and hardware solutions fully patched and up to date.

3. Malware

The use of both direct and in-direct Malware is on the rise. Malware is by definition malicious software; software loaded without intention that opens up access for a hacker to exploit a system and potentially other connected systems. The Simple Solution: Be wary of accessing web sites which are not what they seem, and of opening emails where you are suspicious of their origin, both of which are popular methods of spreading malware!

4. Social Engineering

As a hacker, why go to the hassle of creating your own access point to exploit when you can persuade others with a more legitimate claim to the much sought after data to create it for you? The Simple Solution: If it looks too good to be true, then it probably is too good to be true. If you were going to bequeath $10 Million US Dollars to someone you had never met, would you send them an email?

5. Too Many Permissions

Overly complex access permissions are a gift to a hacker. Businesses that don’t keep a tight rein on who has access to what within their organisation are likely to have either given the wrong permissions to the wrong people, or have left out of date permissions around for a smiling hacker to exploit! The Simple Solution: Keep it Simple.

6. Insider Threats

The phrase “Keep your friends close and your enemies closer” could not be any more relevant. The rouge employee, the disgruntled contractor or simply those not bright enough to know better have already been given permission to access your data, what’s stopping them copying, altering or stealing it? The Simple Solution: Know who you are dealing with, act swiftly when there is a hint of a problem and cover everything with process and procedure backed up with training.