<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

Tabush Group's Cloud & Managed IT Blog

If a Breach is Inevitable, Response is Key

There are only two types of companies: Those that have been hacked and those that will be hacked.”  --Robert Mueller, former Director of the FBI

If cyber breaches are an inevitable cost of doing business, how a company responds to a breach is of extreme importance. It has recently been revealed that 57 million Uber users and drivers had personal information exposed in late 2016 and that the hackers were paid $100,000 to keep it quiet.  If all stories are true, the biggest issue with the Uber breach may not be the breach itself, but the lack of engagement, management, and delivery of the response. 

Topics: Cybersecurity Cyber Attacks Breach

The Target Hack: How could it happen?

Unless you've been living in a bubble without access to the news or Internet for the past 3 months, you've heard about the massive security breach that Target suffered. Hackers were able to get into Target's computer system and download over 110 million credit and debit card numbers. While we don't know who these 110 million lucky winners are, you can rest assured that if you weren't in that group, someone very close to you was.

Last week, more details on how the attack occurred were released. Apparently, Fazio Mechanical, a HVAC contractor who does work for Target, had someone hack into one of their PC's through a targeted phishing attempt. Fazio's systems were set up with certain access to Target's system to communicate work orders, invoices, etc. The hackers used that connection to access Target's database containing credit card numbers, and somehow downloaded it all from there. This is shameful at best.

Topics: IT Security IT Insights Breach