G4S Africa supports small business development thr... » The latest product in the G4S Deposita range is a smart safe system called mini-pay that holds up to... Commissioner's statement following incident in Man... » This is an utterly appalling attack. My thoughts are with the people of Manchester as they try to co... UPDATE: Policing events in the Capital » Following the horrific terrorist attack in Manchester last night, in which 22 people were killed and... Statement from Assistant Commissioner » Statement from Assistant Commissioner Mark Rowley, Head of National Counter Terrorism Policing: The... Met intensifies policing activities in London fol... » The Metropolitan Police Service (MPS) has increased police numbers and operations across the Capital... OF FOOLS OF THE MIDDLE BELT, ONE NORTH AND PASTORA... » Please visit also: www.scorpionnewscorp.com SERIES: BUHARISM AND THE FIERCE URGENCY OF NOW A treat... Home Secretary’s statement on the Manchester attac... » I know that some people will only just be waking up to the news of the horrific attacks in Mancheste... Checkpoint Systems unveils Bug Tag 2 loss preventi... » Checkpoint Systems has announced the launch of Bug Tag 2 – an innovative loss prevention solution th... Edesix launches new head and torso mounted body wo... » Edesix has announced the launch of new head and torso mounted cameras. The X-100 is a side-mounta... Banknote Watch offers essential advice as old £5 i... » As of Friday 5th May 2017, the paper £5 note was officially withdrawn from circulation and no lo...

CLICK HERE TO

SOCIAL BOOKMARK

Talking Point Banner

Details of thousands of medical staff in Wales have been stolen from a private contractor's computer server. Names, dates of birth, radiation doses and National Insurance numbers of staff who work with X-rays were copied as hackers accessed Landauer's system.

 

More information: http://www.bbc.co.uk/news/uk-wales-39249975

Lee Munson, security researcher at Comparitech.com, reacts: “The theft of personal information from Welsh medical staff highlights, once again, how a third party can be responsible for an organisation becoming breached.

“While the details of the attack are not yet clear, compromised staff may be asking whether the Velindre NHS Trust had appropriate access control measures in place, along with an appropriate set of security policies.

“The victims of this attack, at least one of which mistakenly believes they will not be targeted any time soon, despite the fact that it occurred 5 months ago, will need to be on the lookout for phishing attacks and suspicious activity surrounding their bank and credit card accounts.

“Identity theft should also be a real concern and they should already be taking the necessary steps to prevent long-term damage from this breach.”