SIGN IN YOUR ACCOUNT TO HAVE ACCESS TO DIFFERENT FEATURES

FORGOT YOUR PASSWORD?

FORGOT YOUR DETAILS?

AAH, WAIT, I REMEMBER NOW!

SME IT (UK) LTDSME IT (UK) LTD

Questions? Call: 01708 547000 or Email: hello@smeit.co.uk
  • LOGIN
  • HOME
  • MANAGED IT
  • CYBER SECURITY
  • COMMUNICATIONS
  • CLOUD
  • BLOG
  • SUPPORT
  • ABOUT US
Schedulea call

Investigating the Biggest Security Leaks and the Weaknesses They Exposed

Tuesday 24 January 2017 / Published in Security

Investigating the Biggest Security Leaks and the Weaknesses They Exposed

Every year, we hear about a major corporation being hacked. No matter the size of the business, weak links can always be identified in a network’s security. Let’s look at two of the biggest security leaks and how they could’ve been avoided.

The Victims: Sony Pictures and its Employees

In November of 2014, a hacker group calling themselves Guardians of Peace leaked personal information obtained from the computers of employees at Sony Pictures. As you may remember, this hack occurred because of the planned release of The Interview, a comedy starring Seth Rogen and James Franco. North Korean hackers carried out the attack because of the movie’s plot, which centered around the assassination of North Korea’s leader, Kim Jong-un.

The breach exposed private information and messages from Sony employees, destroyed company data, and even led to the cancellation of The Interview’s theatrical release. Ultimately, Sony agreed to pay as much as $8 million in settlement claims to its employees.

What was the Weak Link?

Stuart McClure, CEO of the computer security firm Cylance, reviewed a database of Sony emails and found a pattern of phishing attempts. McClure discovered that Sony executives, including the CEO of Sony Pictures, received fake Apple ID verification emails. When these executives clicked a link that redirected them to a page that looked similar to an Apple ID login one, they entered their account information into a fake form. From there, the hackers used the Apple ID information to access Linkedin accounts and Sony network login information. The problem was that these employees were using the same password for all of their accounts.

Not only is it important to be vigilant and look for misspellings, and weird looking URLs for login pages that you’ve been linked to from an email, but you should also encourage everyone you know to set up different passwords for every account. Passwords should be unique to every account that you have.

The Victims: JP Morgan Chase and its Customers

In that same year, 2014, JP Morgan Chase experienced the largest intrusion of an American bank. As with the cases of Target and Sony, the breach could have been easily prevented. Despite spending $250 million on computer security each year, JP Morgan Chase only needed to install a simple security fix to an overlooked server on its network.

In the spring of 2014, the login credentials for a JP Morgan employee were stolen by hackers, resulting in the account information of 83 million households being compromised. But even with those stolen login credentials, JP Morgan Chase still could have prevented this breach.

What was the Weak Link?

Most large banks use a double-authentication scheme, or two-factor authentication. This means that in addition to entering your password for an account, you are also required to enter a second, one-time password to successfully gain access to the system. JP Morgan Chase’s security team’s failed to upgrade the aforementioned, overlooked server with this dual password scheme, creating a weakness in the system.

The reason why this server was overlooked leads us to another issue with JP Morgan Chase’s network. Security experts who reviewed this breach noted how difficult it is for a bank of JP Morgan Chase’s size to secure its network. When JP Morgan Chase acquires a new company, they integrate that acquisition’s network in with their own. This might be an easy way for JP Morgan Chase to take on new businesses, but this network setup elicits images of a jungle gym.

We can see the results of a network that is patched together and how easy it is to neglect one of many servers. We can also understand how someone might have a lapse in judgement and click on a phishing scam. Weak links exist in every network’s security system, but often the simplest solutions can either limit the damage or prevent a breach entirely

What you can read next

What a Firewall Does and Doesn’t Do, and Why it Matters for Your Business
Calculating the GBP cost of risk with SME IT Security Liability Assessment
Over 75% of Organizations Are Vulnerable to Hackers, Study Finds

Sales & Marketing Manager

Our Team

Email: hello@smeit.co.uk
Call: 01708 547000

Company Brochure

Get our FREE brochure
Learn the difference between traditional IT support and modern Managed IT. Find out how your company can benefit from Managed IT Services today!

Most Popular Services

  • Managed IT
  • Cloud Services
  • Communications
  • Cyber Security
Could not authenticate you.

Latest Blog

  • Reporting

    Calculating the real GBP cost of risk for small business owners

    In my last article (Calculating the GBP cost of...
  • Calculating the GBP cost of risk with SME IT Security Liability Assessment

    Every vendor involved in security talks about r...
  • How do I Know if I need Managed IT?

    How do I Know if I need Managed IT? The majorit...

GET IN TOUCH

T: 01708 547000
E: hello@smeit.co.uk

SME IT (UK) LTD
Elms House, Church Road, Harold Wood, Essex, RM3 0JU

Open in Google Maps

  • Blog
  • Download Brochure
  • Support
  • Contact
  • About us
SME IT (UK) LTD

© 2017 All rights reserved. SME IT (UK) LTD.

TOP
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok