Credit card
information of tens of millions of Target customers were compromised over the
2013 holidays in a data breach that began with a malware-laced e-mail phishing
attack sent to employees at Fazio Mechanical Services, Inc. (FSM), an HVAC firm
that was contracted for electronic billing, contract submission, and project
management with the nationwide retailer.
The Wall Street
Journal reported that financial institutions in the case of the Target breach
alone have spent more than $200 million alone to ease consumer concern,
spending $172 million just to replace cards that have been compromised.
Obviously, clean-up costs of a security breach are staggering.
On average, data
breaches and subsequent fines and litigation cost a U.S. business $534 million
every year, the highest in the world according to the Ponemon Institute. The
direct monetary costs paired with the dramatic expenses of wounded consumer
relations and potential non-compliance with payment card industry (PCI)
security standards can be crippling to an organization of any size.
As a follow-up to
the holiday shopping Target attack, Forbes recently published an article posing
three critical questions for information technology (IT) security
organizations: “Did FSM really need electronic connectivity to Target’s
networks?; Did Target investigate and test FSM’s security before connecting
them to the network (and vice versa)?; How did an attacker get from the part of
Target’s network that FSM was connected to over to Target’s payment network
(and not get noticed!)?”
Questions of the
sort are unquestionably warranted in this case, though the reason for such
questions reverts back to answer one simple, yet powerful question: “HOW do you
prevent a security breach?”
FSM’s strategy to
avoid malicious cyber-attacks (such as the one to which it fell victim) was to
use a free version of Malwarebytes Anti-Malware (MBAM), which is effective in
its purpose of identifying and eliminating threats from host machines. However,
the free version of MBAM does not offer real-time protection against threats
and is made solely for individual users – it’s license actually prohibits
corporate use.
Corporations obtain
overwhelming amounts of financial and personal data through consumer
transaction, internal communication, external communication, and more. Having a
powerful, real-time and comprehensive security strategy is integral to
mitigating security breaches while protecting this valuable information.
Perpetrators of malicious cybercrimes don’t rely on dated cyber schemes – they
are constantly evolving, constantly on the move, always advancing their
technology and techniques in an effort to stay ahead of the game.
Efficient and
innovative security solutions providers are well aware of this fact. Ecrypt
Technologies, a publicly traded emerging provider of powerful (we’re talking
military-strength) data security solutions, is constantly advancing its
solutions to address information security challenges of the 21st Century. The
company enables organizations of all size to fearlessly communicate and
collaborate (as in the case of Target with FSM) without the risk of liability,
reputation damage, competitive threat, security breach, or other adverse
outcomes.
Ecrypt’s flagship
solution is an integrated e-mail and encryption server that can be quickly
deployed to fortify the security of corporate communication, including
attachments and mobile devices, against data breaches while eliminating
phishing threats, malware infections, and spam.
From security
consulting to full implementation, Ecrypt specializes in five key markets:
healthcare, government and military, law enforcement, legal services, and
financial services. In these highly sensitive arenas, Ecrypt removes human
vulnerabilities to optimize enterprise security; fortifies against data leaks,
device theft and e-mail-borne threats; provides granular role-based access
controls for system administrators; and secures communications with third
parties, like vendors and clients.
Target’s security
breach was only one of countless cyber-attacks fired at global organizations
every single day. The FBI in January issued a warning that intrusions into
point-of-sale (POS) systems are on the rise, despite heightened action by law
enforcement and security firms to mitigate the attacks.
By using Ecrypt’s
paradigm-shifting technology, companies alleviate the need for separate
encryption servers with their associated bloated administration and multiple
points of weakness, demonstrating that the success of cyber-attacks doesn’t
necessarily have to rise in proportion to increasing numbers of actual attacks.
With adequate security solutions in place, an organization has the power to
successfully defend itself from attacks even on a daily basis.
For more information
visit www.ecrypt.com
About QualityStocks
QualityStocks is committed to connecting subscribers with companies that have huge potential to succeed in the short and long-term future. We offer several ways for investors to find, evaluate, and learn more about investing in these companies.
QualityStocks is committed to connecting subscribers with companies that have huge potential to succeed in the short and long-term future. We offer several ways for investors to find, evaluate, and learn more about investing in these companies.
Sign up for “The QualityStocks Daily Newsletter” at www.QualityStocks.net
The Quality Stocks Daily Blog http://blog.qualitystocks.net
The Quality Stocks Daily Videos http://videocharts.qualitystocks.net
The Quality Stocks “Ones to Watch” http://gotstocks.qualitystocks.net
Please see disclaimer on the QualityStocks website: http://disclaimer.qualitystocks.net
No comments:
Post a Comment