123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Internet-Marketing >> View Article

Implement Adequate Internet Security Guidelines To Avoid Data Breach Lawsuit

Profile Picture
Total Articles: 68
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

It is mandatory for companies to sufficiently protect their customer or employee records in order to avoid lawsuit. One way is to provide proper ethical hacking training programs to IT staffs to avoid the time and costs associated with a prolonged legal battle. IT staffs who properly equipped with ethical hacking skills will be able to defend computer network from being hacked
The Briar Group, which operates several restaurants in the Boston area, had to pay $110,000 for failing to take reasonable steps to protect credit card data belonging to thousands of customers.
In April 2009 intruders broke into a Briar Group computer and installed malware designed to steal credit and debit card data. However, the malicious software wasn't removed in Dec. 2009.
The compromise stemmed from The Briar Group's failure to take adequate steps to protect card holder data. The state office noted that The Briar Group used default usernames and passwords on its point-of-sale systems and allowed multiple employees to use common usernames and passwords.
Under terms of the settlement, the Briar Group also agreed to implement ...
... a strong password management system at each of its restaurants and to comply with the Payment Card Industry Data Security Standard. The complaint also alleged that The Briar Group failed to properly secure its wireless network and remote access to its systems.
The Online Trust Alliance (OTA) released its 2011 Data Breach Incident Readiness Guide, earlier this year. The guide addresses emerging security and privacy threats, providing prescriptive guidance and questions every executive should ask to help businesses in breach prevention and incident management.
According to Craig Spiezle, Executive Director and President of the Online Trust Alliance, "In the past 5 years, over 525 million records containing sensitive personal information have been compromised, significantly undermining the foundation of consumer trust. With the onslaught of criminal and deceptive business activities, we are calling on business leaders to develop a readiness plan. Those failing to act may be faced with increased public scrutiny, regulatory pressures and a tarnished brand reputation."
Last year, over 400 incidents were reported impacting over 26 million records for a cost to U.S. businesses of over $5.3 billion dollars. Of these, 98% were a result of a server exploit.
OTA indicates a great majority of breaches continue to occur undetected or unreported and the data reported is just the tip of the iceberg.
In a separate incident, the personal information of 13,000 individuals who had filed compensation claims with BP after last year's disastrous oil spill may have been potentially compromised after a laptop containing the data was lost by a BP employee.
The information, which had been stored in an unencrypted fashion on the missing computer, included the names, Social Security numbers, addresses, phone numbers, and dates of birth of those who filed claims related to the Deepwater Horizon accident.
BP said in a statement that the personal information had been stored in a spreadsheet maintained by the company for the purposes of tracking claims arising from the accident. "The lost laptop was immediately reported to law enforcement authorities and BP security, but has not been located despite a thorough search," BP said on Tuesday.
BP has sent written notices to victims informing them about the potential compromise of their personal information and to offer them free credit monitoring services, the statement noted.
The BP compromise is only the latest in a very long list of similar breaches involving the loss of unencrypted personal data stored on laptops, and mobile storage devices.
Data breaches are very common these days, and many companies are keeping mum about it. One way to mitigate internet security risks is with technical security training . EC-Council’s brand new TakeDownCon information security conference series, offers training sessions of the world’s best ethical hacking training program, the Certified Ethical Hacker (CEH).

EC-Council is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous ethical hacking training , the Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigator (CHFI) program, License Penetration Tester (LPT) program and various other technical security training programs offered in over 60 countries around the globe. TakeDownCon Dallas 2011, is one of the conferences of EC-Council’s Take Down information security conference series. www.eccouncil.org

Total Views: 172Word Count: 727See All articles From Author

Add Comment

Internet Marketing Articles

1. Website Designing Services In Ahmedabad, India
Author: Deepanjali

2. Digital Marketing Course In Dinanagar: An Ultimate 2024 Guide For Beginners
Author: MKR Techsoft

3. A Comprehensive Guide To Email Marketing
Author: Pallavi

4. A Revolutionary Approach To Blockchain Scalability
Author: BlockDAG

5. Enjoy The Best Whatsapp Automation Service From Gosales.ai
Author: Ranjin

6. Structured Snippet Optimization: Your Ticket To Better Search Rankings
Author: steve jacob

7. Hubpages»business And Employment»marketing & Sales Discover Best Digital Marketing Agencies In Agra The Oldest City Of India
Author: Arin Sharma

8. Unveiling The Power Of Shopify Theme Customization And Custom Theme Development
Author: Mark Sheldon

9. Navigating The Maze Of Seo Packages Pricing: Finding Value In The Digital Marketplace
Author: Shaganasaral

10. Finding Value: Navigating Cheap Seo Packages
Author: Shaganasaral

11. Digital Marketing In Hyderabad
Author: My Digital Housing

12. Tailoring Web Designing Services To Unique Business Needs
Author: Smita

13. Unleashing The Power Of Sound: A Guide To Amplifiers And Speakers
Author: Unleashing the Power of Sound: A Guide to Amplifie

14. Which Are The Most Important Seo Ranking Factors In 2024?
Author: ValueHits

15. How To Become An Seo Expert And Its Advantages,
Author: Olivia Ellis

Login To Account
Login Email:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: