When tens of
millions of Target customers realized the information on their credit cards was
compromised last holiday season, they were unaware it began with a
malware-laced e-mail phishing attack sent to employees at Fazio Mechanical
Services, Inc., an HVAC firm that was contracted for electronic billing, contract
submission, and project management with the nationwide retailer.
As reported in The
Wall Street Journal, institutions in the financial sector in the case of the
Target breach have spent to date more than $200 million to calm consumer
concern while spending $172 million alone just to replace cards that have been
compromised. Post breach costs to rectify resulting, adverse issues associated
with it have been termed, “staggering.”
The Ponemon
Institute reports on average, data breaches and resulting fines and litigation
costs businesses in the U.S. $534 million annually, the highest worldwide. The
direct monetary costs in addition to the dramatic expenses of violated consumer
relations and potential non-compliance with payment card industry security
standards can cripple an organization of any size.
Following the
holiday shopping Target attack, Forbes Magazine published a story asking three
pertinent questions to information technology (IT) security organizations: “Did
Fazio Mechanical really need electronic connectivity to Target’s networks? “Did
Target investigate and test Fazio’s security before connecting them to the
network (and vice versa)?” “How did an attacker get from the part of Target’s
network that Fazio was connected to over to Target’s payment network and not
get noticed?” In summary, all questioning circles back to one overarching
question, that being, “How do you prevent a security breach?”
Ecrypt Technologies,
a publicly traded emerging provider of data security solutions, is focused on
solutions to address information security challenges of today. Through
deployment of its integrated e-mail and encryption server, Ecrypt helps
companies of all sizes to communicate and collaborate in environments similar
to Target’s without the risk of liability, reputation damage, competitive
threat, security breach, or other adverse outcomes.
From security
consulting to full implementation, Ecrypt specializes in five market verticals:
healthcare, government, law enforcement, legal, and financial services. In
these sectors, Ecrypt removes human vulnerabilities to optimize enterprise
security by guarding against data leaks, device theft, and e-mail-originated
threats. Further, it provides granular role-based access controls for system
administrators and secures communications with vendors and clients.
Security breaches
like Target’s represent one of many cyber-attacks directed at global
organizations every single day. Despite heightened action by law enforcement
and security firms to mitigate the attacks the FBI in January 2014 warned that
intrusions into point-of-sale (POS) systems are on the rise.
By using Ecrypt’s
technology, companies relieve the need for separate encryption servers with
their associated administration costs and vulnerabilities, demonstrating that
the success of cyber-attacks doesn’t necessarily have to rise in proportion to
increasing numbers of actual attacks.
For more information
visit www.ecryptinc.com
About QualityStocks
QualityStocks is committed to connecting subscribers with companies that have huge potential to succeed in the short and long-term future. We offer several ways for investors to find, evaluate, and learn more about investing in these companies.
QualityStocks is committed to connecting subscribers with companies that have huge potential to succeed in the short and long-term future. We offer several ways for investors to find, evaluate, and learn more about investing in these companies.
Sign up for “The QualityStocks Daily Newsletter” at www.QualityStocks.net
The Quality Stocks Daily Blog http://blog.qualitystocks.net
The Quality Stocks Daily Videos http://videocharts.qualitystocks.net
The Quality Stocks “Ones to Watch” http://gotstocks.qualitystocks.net
Please see disclaimer on the QualityStocks website: http://disclaimer.qualitystocks.net
No comments:
Post a Comment