Doordash Breach (4.9 Million Customers Affected)

Doordash Breach (4.9 Million Customers Affected)

End of september, Doordash confirmed a data breach which affected 4.9 million customers, workers, merchants. Doordash is a popular food delivery company and their data was stolen by a group of hackers. They also informed, customers who affected after 5 April 2018 were not affected. The breach from data is known to have happened inRead more about Doordash Breach (4.9 Million Customers Affected)[…]

Yves Rocher Breach (2.5 Million Canadian Customers Affected)

Yves Rocher Breach (2.5 Million Canadian Customers Affected)

In early september, Yves Rocher warned about a data leak of millions of its customers. An exposed database left by a third party vendor was the cause of the breach. A server owned by Aliznet (serves IBM, Salesforce, Sephora, Louboutin) had an exposed database of Yves Rocher with millions of customer and their PII exposed.Read more about Yves Rocher Breach (2.5 Million Canadian Customers Affected)[…]

Click2Gov Breach (8 American Cities Affected)

Click2Gov Breach (8 American Cities Affected)

8 American Cities were affected by this breach. Click2Gov is a popular software solution used by local governments for receiving parking tickets or taxes. The software was developed by Superion. It’s a popular municipality payment software. Gemini said it had found at least 46 compromised U.S. locations and one in Canada, some of those compromisesRead more about Click2Gov Breach (8 American Cities Affected)[…]

(Panel Discussion) Shadow IT: You Cannot Protect What You Can’t See

(Panel Discussion) Shadow IT: You Cannot Protect What You Can’t See

This is a summary of the panel discussion at Security Symposium & Cyber Sentinel Award by Infocon global. The panel discussion was moderated by Jitendra Chauhan (Head of Engineering at FireCompass) along with Balaram (CISO, Manthan), Anath Kumar Ms (Head-IT Assurance & Security, Janalaxmi Financial Services), Sumanth Naropanth and Ramakrishna Roy. Points Covered were: WhatRead more about (Panel Discussion) Shadow IT: You Cannot Protect What You Can’t See[…]

Security Breach Impacts and Top 10 Mitigation Techniques

Security Breach Impacts and Top 10 Mitigation Techniques

News stories about Security breaches are increasing day by day. Security breach instances are growing at an alarming rate; while becoming faster and larger in scope.  Approximately 1500 companies are breached annually and the total records compromised nearly double each year. An organization must work quickly and accurately to navigate the terrain. The impact forRead more about Security Breach Impacts and Top 10 Mitigation Techniques[…]

Top 3 insights To The Impacts Of Shadow IT

Top 3 insights To The Impacts Of Shadow IT

Digital Security is a challenging practice of protecting your organization’s information and to understand the Impact of Shadow IT. In most organizations, it would be hard just to make sure that they are not compromised through your networks, communication systems, and storage systems. Having to worry about information that is outside your control, and thatRead more about Top 3 insights To The Impacts Of Shadow IT[…]

Shadow IT in Healthcare Organizations

Shadow IT in Healthcare Organizations

Healthcare organizations and pharmaceutical companies rest on a foundation of sensitive patient data and intellectual property. Healthcare entities in the private sector – especially those affiliated with academic medical centers and university research facilities – also commonly face challenges of identifying and reining in shadow IT and mitigating the security risks posed by technology deployments that aren’tRead more about Shadow IT in Healthcare Organizations[…]

Risks of Shadow IT in Financial Services Firms

Risks of Shadow IT in Financial Services Firms

Organizations across all Financial Services firms are dealing with the effects of shadow IT, whether they realize it or not. Shadow IT is technology that is adopted and deployed by business units without the knowledge or consent of corporate IT teams. The motivations behind the adoption of shadow IT are typically well-intentioned. For financial services firms,Read more about Risks of Shadow IT in Financial Services Firms[…]