WHAT THE SUNDAY TERROR ATTACK MEANS FOR MALI—AND A... » WHAT THE SUNDAY TERROR ATTACK MEANS FOR MALI—AND AFRICA? At least two people have been killed in a ... Need to "Repeal the Perpetual Illegal Wars" » Charlie Savage of the New York Times reports in "Senators Wrestle With Updating Law Authorizing War ... After Terrorist Attack, Spain Rejected Its Hawks. ... » Email: sam@accuracy.org Husseini is communications director with the Institute for Public Accuracy.... Cisco includes Italtel’s enterprise SDN applicat... » Milan: Italtel has announced its Netwrapper application has been included in the official Cisco GPL ... InfinityQS upholds ISO 9001:2015 & ISO 27001:2013 ... » InfinityQS® International, Inc. (InfinityQS) has announced that it has successfully sustained its ce... New PT Application Firewall easier to deploy, co... » London: Cybersecurity expert Positive Technologies has announced a new version of its web applicatio... Logicalis acquires Packet Systems Indonesia to g... » London: Logicalis, an international IT solutions and managed services provider, together with Metrod... Revolutionary new AI event to launch in London -... » London: With discussion around artificial intelligence (AI) at an all-time high, MACHINA Summit.AI i... Basefarm acquires The unbelievable Machine Compa... » LONDON: Basefarm has announced their acquisition of the Berlin-based The unbelievable Machine Compan... PhishMe takes home SC Europe Awards 2017 » LONDON, UK: PhishMe® Inc. has announced that PhishMe Simulator™ and PhishMe Reporter® were recognise...



Talking Point Banner

Details of thousands of medical staff in Wales have been stolen from a private contractor's computer server. Names, dates of birth, radiation doses and National Insurance numbers of staff who work with X-rays were copied as hackers accessed Landauer's system.


More information: http://www.bbc.co.uk/news/uk-wales-39249975

Lee Munson, security researcher at Comparitech.com, reacts: “The theft of personal information from Welsh medical staff highlights, once again, how a third party can be responsible for an organisation becoming breached.

“While the details of the attack are not yet clear, compromised staff may be asking whether the Velindre NHS Trust had appropriate access control measures in place, along with an appropriate set of security policies.

“The victims of this attack, at least one of which mistakenly believes they will not be targeted any time soon, despite the fact that it occurred 5 months ago, will need to be on the lookout for phishing attacks and suspicious activity surrounding their bank and credit card accounts.

“Identity theft should also be a real concern and they should already be taking the necessary steps to prevent long-term damage from this breach.”