THE LIFE CYCLE OF A BREACHED DATABASE

On 29 July, the Krebs on Security carried a post saying that every time there is another data breach, we are asked to change our password at the breached entity. But the reality is that in most cases by the time the victim organisation discloses an incident publicly the information has already been harvested many times over by profit-seeking cybercriminals.  The post provides a closer look at what typically transpires in the weeks or months before an organisation notifies its users about a breached database.  It also provides some tips to help avoid falling prey to incessant data breaches and increasingly sophisticated phishing schemes.

https://krebsonsecurity.com/2021/07/the-life-cycle-of-a-breached-database/

Any modest contributions for my time and ongoing expenses are welcomed!  I have a page where you can do so, and where contributions start as low as $3, at https://www.buymeacoffee.com/KoIvM842y

Author: raytodd2017

Chartered Legal Executive and former senior manager with Isle of Man Customs and Excise, where I was (amongst other things) Sanctions Officer (for UN/EU sanctions), Export Licensing Officer and Manager of the Legal-Library & Collectorate Support Section

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s