Data & Intelligence

Cyber Security Awareness Month brings plenty of awareness

DataSecOctober 1st marked the beginning of the United States’ National Cyber Security Awareness month.  Three days into the month, awareness is exactly what we have.

Last week, Experian and T-Mobile announced a significant data breach.  What’s worse is that the hackers were able to maintain the breach for over two years.  T-Mobile CEO John Legere, never a person known to mince words, came out with a statement saying he is “incredibly angry” about the breach of 15 million customer records and will complete a thorough review of their relationship with Experian.

Data Intelligence - The Future of Big Data
The Future of Big Data

With some guidance, you can craft a data platform that is right for your organization’s needs and gets the most return from your data capital.

Get the Guide

While it is difficult to learn that the breach occurred, what’s worse is it happened over two years.  What breaches are still on going in the world that we don’t know about?

The very next day, Scottrade disclosed they were the casualty of a data breach exposing customer data for over 4 million customers during late 2013 and early 2014.  Interestingly enough in this case, Scottrade didn’t even know the breach was occurring.  The FBI came in to tell them.

When hackers look to steal this data, they are not interested in the easy stuff.  They are going after encrypted social security numbers and other personal information, and based on the Experian report, they got what they were after.

Based on recent events, we can simply confirm that Information Systems are not prepared for what is happening in this day and age.  What is your company doing about security and threat detection?

Our certified team of Splunk experts are actively working with some of the world’s largest companies to implement Splunk’s Enterprise Security application.  This application coupled with the Splunk platform was recently named a leader in Gartner’s Magic Quadrant.  If you have not considered the Splunk application for Enterprise Security, but are ready to do so, please contact us.

About the Author

More from this Author

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Subscribe to the Weekly Blog Digest:

Sign Up