Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Vblock™ Systems:
Advanced converged infrastructure
increases productivity & lowers costs.

www.vce.com
Network Security
Tame your scariest paperwork. Find Out How
Average Rating:
Rate this article:  
Massive Hack on Vodafone Germany Affects 2 Million Users
Massive Hack on Vodafone Germany Affects 2 Million Users

By Jennifer LeClaire
September 12, 2013 1:36PM

    Bookmark and Share
Vodafone should use this hack as an opportunity to revisit its data residency strategy, and determine if now is the time to transition its data strategy away from the technology model of 20-plus years ago. Cloud-based data storage can make this kind of data breach a thing of the past, said Kevin O'Brien, an enterprise solution architect at CloudLock.
 


(Page 2 of 2)

As O'Brien sees it, defense-in-depth strategies could have helped in the Vodafone breach. At no point in time should any single system weakness have yielded such important assets to a hacker, he said. And we can reasonably question why this kind of information was being stored on an insecure system in the first place.

Outdated Models

"Unfortunately, legacy information protection tends to rely upon an outdated model of perceiving data as being 'in motion' or 'at rest,' and applying security controls only at the network perimeters, such as when that information is being attached to an email or externalized via a copy operation onto a portable media device," he said.

Even under the best circumstances, O'Brien said when this information is encrypted on the disk and transmitted in a secure fashion, a single system compromise can result in the complete failure of the defense system. Coupled with reliance upon a likely overburdened IT team member, this type of hack is the result.

"Hopefully, Vodafone will use this as an opportunity to revisit their data residency strategy, and determine if now is the time to transition their data strategy away from the technology model of 20-plus years ago," O'Brien said. "Cloud-based data storage, especially with modern security platforms complementing the excellent level of physical and network maintenance provided by cloud service providers, can make this kind of data breach a thing of the past."

< Previous Page  |  1  |  2

 

Tell Us What You Think
Comment:

Name:

Charles:

Posted: 2013-09-17 @ 5:36am PT
Disappointing that you didn't do any fact checking on this article and allowed a vendor to take control of the article. Now the article is an advertisement for cloud storage - but that wasn't the issue on this compromise. It was an outsourced admin who did the damage. He would have had access to cloud storage too. Privileged users simply shouldn't have access to data. They don't need it to do their jobs. Even more so in the cloud. Cloud is great and has its place - just not relevant to this story.



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Network Security
1.   Lessons from Verizon's Threat Report
2.   Verizon Report Exposes Cyberthreats
3.   How Are Web Sites Post-Heartbleed?
4.   White House Updating Privacy Policy
5.   Target Hackers May Be Tough To Find
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Where Do Web Sites Stand, Post-Heartbleed?
A security firm says the vast majority of Web sites have patched themselves to protect against the Heartbleed bug, but now there are questions raised on the reliability of open-source programs.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | Small Business | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.