Whitepaper: Protecting your organisation from itself
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Posted: 23 September 2016 | QinetiQ | No comments yet
In February of this year security researchers proved that with a simple USB drop in a hospital it was possible to hack patient records, critical medical equipment and patient monitorsi. Vital signs could be manipulated, drug doses changed and medical equipment operated remotely.
In 2015 a Morrisons auditor with a grudge was jailed for leaking personal details, including bank details, of 100,000 other employees. It cost Morrisons more than £2 million to rectifyii.
US retailer Target lost hundreds of millions of dollars in 2013 when 110 million customers were affected by a breach stemming from a phishing attack on a contractoriii. Credit card details were stolen as Target’s billing system was compromised.
These hacks all have one thing in common: employees.
This whitepaper is restricted - login or subscribe free to access
Why subscribe? Join our growing community of thousands of industry professionals and gain access to:
- bi-monthly issues in print and/or digital format
- case studies, whitepapers, webinars and industry-leading content
- breaking news and features
- our extensive online archive of thousands of articles and years of past issues
- ...And it's all free!
Click here to Subscribe today Login here