The supply chain is ground zero for several
recent cyber breaches.
Not exact matches
Following in the wake of the most
recent data security
breaches involving Target, PF Chang's and Sally Beauty, this week's incident involving Home Depot has certainly added to the
cyber security panic throughout the online world.
Following the
recent headlines surrounding the WikiLeaks, the Panama Papers, and thousands of much smaller cybersecurity
breaches around the world, legislation and action related to the protection of data and
cyber processes is increasingly necessary, and while governments and other parties do...
Darren Best, Managing Director of SavoyStewart.co.uk commented: «The calamity caused by
recent cyber - attacks /
breaches emphasises the need to take
cyber security very seriously.
And the most
recent thing we have introduced is for
cyber breaches, which puts in place for clients a technical solution, a PR solution and if they need a legal solution then we're there to do that; and we've got that running in Europe and Asia.
For many firms, issues of
cyber and data security have crept up on them in
recent years, but
recent high profile
breaches of client information have added a sense of urgency.
And the high - publicity hacks keep coming:
recent examples of firms suffering
cyber breaches include Cravath, Swain & Moore in New York, Johnson & Bell in Chicago, and of course the Panama Papers hack of Mossack Fonseca.
The
recent shut down of the website for Puckett & Faraj is an example of what can happen all too quickly in the case of a
cyber breach.
Following the
recent headlines surrounding the WikiLeaks, the Panama Papers, and thousands of much smaller cybersecurity
breaches around the world, legislation and action related to the protection of data and
cyber processes is increasingly necessary, and while governments and other parties do attempt to implement ways of managing
breaches, the threat of
cyber-attacks can not be shrugged away.
The
recent spate of
cyber attacks and global data
breaches has propelled disaster recovery planning strategies to the forefront of companies» security agendas.
But the problem for the government is that use of e2e encryption has been growing in
recent years as awareness of both privacy risks and
cyber security threats have stepped up, thanks to data
breach scandal after data
breach scandal, as well as revelations of the extent of government agencies» surveillance programs following the 2013 Snowden disclosures.
Not external, malicious actors, like the kind of blackhat hackers responsible for some of the largest data
breaches in
recent history, nor even the state - sponsored
cyber crime rings that recur in news reports.