5 Major Corporate Security Uh-Ohs of 2010

Posted By Software on Sunday, 17 July 2016 | 20:33

5 Major Corporate Security Uh-Ohs of 2010

Are you looking this product? Now you can get product in Kindle Format,just following step by step until finish you will be guided downloading this book for free, Enjoy it.

 5 Major Corporate Security Uh-Ohs of 2010

DOWNLOAD THIS BOOK FOR FREE

Please follow instruction step by step until finish to get this for free. Enjoy It !!


Corporate security made headlines throughout 2010 for all the wrong reasons. At a time when companies should be savvy enough to protect corporate information, disgruntled employees and hackers got their hands on too much data last year. This is why it isn't surprising that one of the key trends for 2011 is a focus on corporate security and data protection.


Here are the Top 5 corporate security and privacy blunders of 2010. Warning: the list probably won't shock you:


1. WikiLeaks

The largest data leak in history. A couple of weeks ago it was revealed just how easy it was for Bradley Manning to access and leak more than 250,000 state department cables, sent from, or to, US embassies around the world. The information contained in many of these cables is of the highest level of sensitivity. It's also suspected that Manning leaked daily war logs from the Iraq and Afghanistan operations. Sounds like it would be tough to access this information doesn't it? Surprisingly, it wasn't. In the Guardian article "How 250,000 US Embassy Cables Were Leaked," they described how the information was stolen:



"'I would come in with music on a CD-RW labelled with something like 'Lady Gaga' … erase the music … then write a compressed split file. No one suspected a thing ... [I] listened and lip-synched to Lady Gaga's Telephone while exfiltrating possibly the largest data spillage in American history.' He said that he 'had unprecedented access to classified networks 14 hours a day 7 days a week for 8+ months.'"



2. Ford

Ford's corporate security isn't "built Ford tough" like the company's slogan. In November, former Ford employee Mike Yu pleaded guilty to trade secret theft against Ford. It turns out the former employee copied roughly 4000 company documents onto an external hard drive that he took with him after completing his final shift at Ford. The documents stolen by Yu didn't pertain to his job at the company, but he still had access to them anyways. This single act of trade secret theft has been estimated to cost Ford more than $ 50 million in losses.


3. Google

Google had two major privacy snafus this year. The first case involved Google Buzz and the second involved "wi-fi sniffing". In the case of Buzz, a class-action suit was filed against Google because the private personal data belonging to Gmail users was made available to the public without permission- or knowledge, of its users. The wi-fi snooping case, the Computer World article "Google Stops Sniffing Wi-Fi Data After Privacy Gaffe," states:



"Google has decided to stop its Street View cars from sniffing wireless networking data after an embarrassing privacy gaffe. The company revealed that Street View vehicles had been sniffing the content of users' Internet communications on open wireless networks, despite the company's earlier statements to the contrary. Google has since discovered that it has been mistakenly collecting the content of communications from non-password-protected Wi-Fi networks."



4. Goldman Sachs

In February, a former Goldman Sachs employee, Sergey Aleynikov was indicted for trade secret theft. On his last day with the company, Aleynikov transferred computer code pertaining to the company's high-frequency trading platform to a computer server in another country. He was leaving to work for another company to help them develop a similar trading platform, so he must have thought that having the code from Goldman Sachs would make his job a bit easier. Aleynikov could wind up receiving a 25 year prison sentence for his actions.


5. UBS

Potatoes and frequent flyer miles- just a few of the terms used in an attempt to mask information being leaked from now former UBS employee Igor Poteroba. The Reuters article, "UBS Banker Used Coded Email for Insider Trades-US,"



"The leaked information related to forthcoming announcements about mergers or acquisitions involving six publicly traded healthcare companies."



That's not the only email case that caused problems at UBS this year. In November, GM parted ways with UBS because of an email that was sent to more than 100 people it was not intended for. The email contained information about an upcoming share issue by GM, causing UBS to lose approximately $ 10 million. Lesson learned: check who you are sending your emails to!



Blog, Updated at: 20:33

0 comments:

Post a Comment