4. Search for..?
• Member name
• Date of birth
• Social Security number
• Member identification
number
• Email address
• Mailing and/or physical address
• Telephone number
• Banking account number
• Clinical information
• Claims information
6. Target..?
• Social media users
• Banks
• Organizations/corporations
• Intelligence agencies of countries
7. Why..
• Happens due to internal & external threats like…
• Old, Unpatched Security Vulnerabilities
• Cyber criminals
• Human Error
• Malware
• Insider Misuse
• Physical Theft of a Data-Carrying Device
8.
9. Real Cases
• Yahoo
• Biggest breach in the internet era
• 3 billion accounts hacked comprised by 2013
• ebay
• 145 million users were asked to change passwords along with other personal
information
• Breach was reported by employees and not customers themselves
• Equifax
• Putting the data of over 143 million Americans and many people in other
countries at risk.
• Several hundred thousands identities were stolen
10. • FACEBOOK:
A huge political scandal in early 2018 when it was revealed that Cambridge
analytica had harvested the data of millions of people without their consent for
political purposes.
• Uber
• Hackers accessed names, Emails, contacts & license plate numbers of about
57 million drivers & customers n October 2016.
• Company paid $100,000 to prevent hackers from using the data & keep the
breach under wraps.
11. Preventions..?
• Protect Information
• Reduce transfer of data
• Restrict download
• Shred files
• Ban unencrypted devices
• Secure transfer
• Good password
12. Cont’d
• Automate security
• Identify threats
• Monitor data leakage
• Track data
• Define accessibility
• Security training
• Stop incursion
• Breach response