BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for January, 2012

irene2

Top 5 Data Breach Excuses Of 2011 (And What They Really Mean): Part 3

BLAME IT ON A THIRD PARTY/MALWARE/THE WEATHER – Frequently throughout the year…. With so much out-soucing today, it’s easy to divert attention away from your role in allowing data to be breached, by focusing on slopping practices of third party suppliers and contractors (while not saying of course that it was you who hired them…

Post by Peter McCalister January 5, 2012
annie

Top 5 Data Breach Excuses Of 2011 (And What They Really Mean): Part 2

SHUT THE DOOR AFTER THE HORSE HAS BOLTED. High Point Regional Health System, USA, September 2011 This excuse allows the breached organization to sound authoritative by providing an answer to how the breach could have been prevented to the media and public, even if it is a solution they haven’t put into practice yet. Unfortunately,…

Post by Peter McCalister January 4, 2012
dave2

Top 5 Data Breach Excuses Of 2011 (And What They Really Mean): Part 1

SADLY, IT’S NOT POSSIBLE TO TRUST ALL PEOPLE ALL OF THE TIME – Gwent Police, Wales, UK, May 2011 This is one of the more favored excuses used by organizations who prefer to show some attrition for taking their eye off the ball for a few days, months, years,… (fill in the blank) later. In…

Post by Peter McCalister January 3, 2012