Toshiba is a leading manufacturer of information and communications equipment and systems, Internet-based solutions and services. A group or person called V0iD has reportedly leaked administrative and user e-mail addresses and passwords associated with the Japanese company. V0iD has disclosed 11 administrative and at least 784 user e-mail addresses and passwords on a third party code sharing site in two dumps. Toshiba has not yet confirmed the data breach incident. V0iD has indicated that it will dump more data related to the company.
Data breach incidents have continued despite arrests of an associate of Lulz Sec in Britain, and numerous arrests of members alleged to be associated with Anonymous group in Turkey and Spain. Security and data breach incidents have severe repercussions for businesses and individuals. Businesses not only suffer financial losses but also have to face legal complications. Organizations are required to comply with data breach notifications. If investigation finds non-compliance of the requisite measures to ensure confidentiality, integrity, security and availability of information, organizations may have to dole out penalties.
They may also face litigations from the affected customers, employees and stakeholders for failure to protect sensitive personal and financial information. According to the cost of cybercrime report released by United Kingdom (U.K) government earlier in the year, businesses in the country incur 21 billion GBP per year. Government suffers a cost of 2.2 billion GBP and individuals incur 3.1 billion GBP per year due to cybercrime. Prevalence of outdated policies and procedures, lack of proper assessment of information security risks, lack of compliance of legal requirements and lack of employee training are some of the factors responsible for frequent data and security breach incidents. Again, some organizations consider IT security as a mere compliance activity, which also exposes them to risks. Usually, the stipulated IT security requirements are the minimum standards that organizations must maintain to defend their network infrastructure. Organizations must constantly assess the security scenario and strengthen the IT infrastructure in accordance with the latest threats.
Professionals qualified in IT masters degree may help organizations to implement appropriate security controls and safeguard the network infrastructure from cyber intrusions. Organizations must also update their security policies and procedures, and improve standards for securing sensitive information. They must educate and train employees on data privacy and security policies through training sessions and e-learning programs. Employees may also benefit from online computer degree programs to improve information security practices.
Organizations must improve trust management systems to combat vibrant security threats. Professionals may take advantage of online technology degree programs to understand and implement latest encryption and monitoring mechanisms.
No comments:
Post a Comment