Tags

, , , , , , , , , , ,

Target's customers were targeted by hackers.

Target’s customers were targeted by hackers.

In an effort to provide a temporary hiatus to crafting your New Year’s Resolutions for 2014, I’ve decided to breakdown some of the biggest news in regards to top hacks and cyber attacks from 2013.

Take that, Adobe

In what would prove to be foreshadowing to an even bigger data hack, Adobe fell prey to the nefarious ways of cyber criminals; exposing around 2.9 million customers’ credit card information.

The New York Times Incident

A group of hackers known as the Syrian Electronic Army (SEA) was responsible for hacking into the New York Times, forcing the newspaper offline temporarily.  SEA had used a phishing scam to hack into social media giant Twitter’s host earlier in the year and, used that access to change the DNS records of several domain names, including the NYT.

Cryptolocker: Your files taken hostage

A specific type of ransomware, cryptolocker takes your computer’s files hostage and demands a time-sensitive payment lest your encrypted data be lost forever.

According to one report, almost 250,000 Windows based computers have already fallen prey.  Unlike the SEA, ransomware users seek monetary gains by holding as many computers hostage as possible.

Hackers Flip iPhone the bird

When hackers were able to simulate a fingerprint by using a 3D printer and other MacGyver-like shenanigans, it represented more of a technological breach rather than a hack into a particular system or database.

However, it caused Apple to scramble to circumvent further damage to its latest (and supposedly greatest) technology.  It took less than one week for hacker’s to crack Apple’s fingerprint security feature.

Target Targeted

Hackers breached Target’s vast array of POS-stored data, exposing some 40 million customers to possible data leaks.  If you used a credit or debit card in any U.S. Target store between Nov. 27 and December 15, your PIN number could have been swiped.

The sheer brilliance of this hack is the timing.  I mean, who wasn’t shopping between those dates?

Preventive Medicine to thwart Hackers

Just as regular visits to your general practitioner can help prevent many health maladies, a solid File Integrity Management program can circumvent many of the aforementioned data loss issues.

EzFIM provides elite file monitoring at a fraction of the cost of its competitors.  Just as FIM provides a magnifying glass to illuminate even the most minute of data issues, a Managed Security Service Provider, such as time-trusted NetBoundary, can oversee a vast array of security software, 24/7, 365 days a year.

NetBoundary and EzFIM: Here to Help

For more information on how NetBoundary and EzFIM can help keep your company from falling prey to data breaches, hacks and cyber attacks in 2014, ask to speak to one of their Secruity Experts today, by calling: (888) 698-3563.

Unlike Target—or the New York Times—your business might not be able to recover from a cyber attack. A data breach is an awful way to ring in the New Year.