It was a busy week in the cybersecurity space, with several major headlines about data breaches.
First and foremost, two cyberattacks were reported at Equifax and Hyatt Corp. — two companies who have already been breached.
Equifax, which is still recovering from the recent breach that exposed the personal information of 145.5 million Americans — was forced to take down one of its web pages after a report surfaced that its website had again been infiltrated.
Meanwhile, Hyatt announced its second credit card breach in just two years. Sources indicate that its cybersecurity team found signs that an unauthorized user gained access to payment card data from cards that were swiped or manually entered at certain front desk locations between March 18, 2017 and July 2, 2017. The hacker was unable to obtain cardholder names, verification codes, expiration dates and card numbers.
As both of these examples show, one hack often invites another. Oftentimes, hackers will wait several months or even years to attack again, when they think a business’s guard may be down. But once one weakness is exposed in a network, hackers are bound to look for more.
In other news, this week we learned that up to 15 million Bitly and Kickstarter accounts were hacked. According to Lifehacker, the information can be traced back to a 2014 data breach. Both organizations are now instructing their users to change their passwords.
As the icing on the cake, it was also announced that hackers — who are believed to be from North Korea — stole 235 gigabytes of military documents from the Defense Integrated Data Center in September last year. Some of this may have contained highly-sensitive war preparation plans from the U.S. and South Korea.
A new breed of hacktrepeneurs has awoken and they have little to fear and everything to gain by infecting as many companies as possible and extorting money from them. Apex Technology Services stands ready to protect your company regardless of whether it’s located in New York City; White Plains, New York; Connecticut; Australia; Europe; or anywhere else. Our full suite of cybersecurity and IT support services is at your disposal, enabling you to spend less time worrying about and more time growing your business.
To ensure your security, consider one of our most popular services — Auditing & Documentation — which pinpoints vulnerabilities in your infrastructure, process flow and internal security procedures.