In a form 8-K filing with the US Securities and Exchange Commission (SEC), Dick’s Sporting Goods says that they “discovered unauthorized third-party access to its information systems” on August 21. Dick’s activated their cybersecurity incident response plan and brought in third-party experts.
The real question is would they have announced it if it weren't required by the SEC. The US Federal Bureau of Investigation (FBI) has announced the takedown of the Radar/Dispossessor ransomware infrastructure. The takedown was an international operation, involving the dismantling of servers and domains in the UK, Germany, and the US. Law enforcement organizations in all three countries were involved. The ransomware operation has targeted 43 companies around the world.
Security firm KnowBe4 is sharing a cautionary tale. A North Korean hacker used a stolen identity to apply for a position as a software engineer at KnowBe4. Thanks to the stolen identity, the individual passed background checks, their references were validated, and they were hired. Once the person received their Mac workstation, it began loading malware onto the company network. The case is being investigated by the FBI.
Microsoft says that an eight-hour Azure and Microsoft 365 outage on Tuesday, July 30, was due to “an error in the implementation” of their distributed denial-of-service (DDoS) attack response mechanisms. Rather than mitigate the incident, the buggy protection mechanism amplified the attack.
Throwing out old PCs? Hold on...Call Lanit First.
We provide drive wipe and destruction at no charge for our customers. We use a DOD standard wipe and then crush them in a 20 ton press. Here's a few things to consider prior to throwing them in the dumpster - Data Security: Hard drives often contain sensitive information such as financial records, customer data, proprietary information, and employee details. Destroying hard drives ensures this data cannot be retrieved and misused by unauthorized individuals. Compliance with Regulations: Various laws and regulations, such as GDPR, HIPAA, and others, require businesses to properly dispose of data to protect privacy and prevent data breaches. Failure to comply can result in severe legal penalties and fines. Preventing Data Breaches: Improper disposal of hard drives can lead to data breaches, where sensitive information is accessed by cybercriminals. This can cause financial losses, damage to reputation, and loss of customer trust. End-of-Life Data Management: When PCs are decommissioned or replaced, the data stored on their hard drives must be securely managed. Destroying the hard drives ensures that no residual data remains accessible. Intellectual Property Protection: Companies often store trade secrets, patents, and proprietary research on their hard drives. Destroying these drives prevents competitors from accessing valuable intellectual property. Mitigating Risks of Identity Theft: Personal information stored on hard drives can be used for identity theft if it falls into the wrong hands. Destroying the drives eliminates this risk. |
Author25 Years of IT experience has taught me to how to recognize fluff versus actual usable technology that can make a difference. ArchivesCategories |