7 Real Reasons Big Brands Suffered a Massive Data Breach

Untitled_design_7_1.jpg

In any given month, thousands of organizations worldwide may suffer a data breach.

A study sponsored by the UK government estimates 65% of large organizations are affected in any given year and 25% of large businesses are targeted at least once per month. Not every data breach hits the news, but the organizations who gather media attention following an incident can offer invaluable lessons for the rest of us.

There's no question that data breaches are the epitome of a public relations disaster. Research conducted by OnePoll and Semafone in 2014 indicate 86% of consumers are hesitant to make purchases from companies who've been breached. While a security incident isn't always a one-way ticket to bankruptcy, it can often spell financial troubles and a lack of customer trust for months, if not years, following the incident.

To help you avoid being the subject of media interest and customer panic, we've curated a list of seven high-profile security incidents and what they can teach the rest of us.

1. Target

Target was not without security at the time of the well-known breach. There have been many theories suggesting malware. It was reported the malware was installed on POS machines prior to discovery with multiple antivirus tools not detecting the malware.

Many intrusion detection or file integrity monitoring solutions offer poor built-in intelligence, which can make it difficult to tell the difference between normal file changes and a security incident. In other cases, constant meaningless notifications can lead to alert fatigue. A FIM solution that differentiates between alerts can provide 'smart' notifications and facilitate real-time action to stop a threat in its tracks.

2. Cogent Health Care

Cogent Healthcare suffered a data breach in 2013 that lead to the disclosure of 32,000 patients' electronic personal health information (ePHI). In 2013, HIPAA Journal wrote that a third-party contractor stored patient data on a website with an inactive firewall, which made the information accessible to the general public via indexing in Google search results.

3. OPM

The U.S. Office of Personnel Management's (OPM) 2015 data breach affected an estimated 20 million people, including federal employees, family members, contractors, and job applicants. NPR noted that the exact method of entry is unknown, although a third-party contractor's website is a possibility. Since the breach, OPM has significantly revised their security methodologies with the help of the Department of Defense.

4. Ashley Madison

In July 2015, extramarital affairs network Ashley Madison was subject to a very public data breach which lead to the personal information disclosure of 32 million users. While the initial means of gaining entry to Ashley Madison's network is not disclosed, Forbes' attributed the intent of the attack to "hacktivism," or ethically-motivated criminal activity in 2015. Similarly controversial or politically-based organizations may be at increased risk for hacktivist targeting.

5. Jimmy John's

Point-of-sale systems (POS) can represent a major point of vulnerability for organizations in retail, hospitality, and food services. Fast-and-casual sandwich chain Jimmy John's choose to outsource POS management to a third-party vendor and subsequently suffered the theft of card data from hundreds of their restaurant locations for a period of about 3 months.

In 2014, KrebsOnSecurity wrote this was caused by brute-force attack of a third-party POS vendor employee's credentials, which allowed cybercriminals to push card skimming malware out to hundreds of locations en masse.

6. Anthem

Anthem, the second-largest provider of insurance in the U.S., suffered a security incident with data loss for two months before the attack was finally detected. Initial entry to Anthem's system was likely gained via a watering hole attack, which is defined as the infection of malware on a website that is frequented by a firm's employees. This form of attack is used to gain entry via contractors, entry-level employees, or other individuals who may be vulnerable to security threats.

The breach was finally discovered by one of the organization's database administrators (DBA), not a member of their information security team. CSO Online stated in 2015 that a DBA detected unusual activity originating from their account.

7. Hacking Team

In one of the most ironic security incidents in recent history, an Italian cybercrime group known as "Hacking Team" was breached. It's hard to muster much sympathy for this organization, especially considering they were in the business of selling advanced persistent threats to governments with what Network World calls "sketchy human rights records."

It was determined the downfall was caused by terrible credential management. One of their engineers had the network password of "Passw0rd," which allowed for very easy brute-force access. Data gleaned from this breach revealed the extent of the organization's crime and PII theft.

How to Avoid the Embarrassment of a High-Profile Data Breach

Is there any single takeaway from the most infamous data breaches in recent years? Even big brands with highly sophisticated security personnel can make mistakes. Security is hard, but this doesn't mean you should throw up your hands and resign yourself to a data breach. It means adopting the technical safeguards needed to make your job easier, so you can focus on comprehensive policy and vendor management.

CimTrak is an easy-to-use tool for comprehensive IT security in the modern age. An attack vector independent tool for real-time security incident detection and remediation, it can fill in where your other technical and human safeguards fail and provide intrusion detection, vulnerability assessments, patch management, access control, and antivirus and anti-spam mechanisms.

To learn more about how learn more about how Cimcor's full suite of security products have the strength to prevent data breaches, click here to request a complimentary demo, or download our technical summary today.

Learn how to secure your IT infrastructure now with a free CimTrak technical summary.

 

Topics

Jacqueline von Ogden

Since 1999, Jacqueline has written for corporate communications, MarCom agencies, higher education, and worked within the pharmacy, steel and retail industries. Since joining the tech industry, she has found her "home".