SlideShare a Scribd company logo
1 of 1
Preventing Breaches Like the Apple Developer Website Hack
The highly publicized Apple Developer website breach, which left upwards of 100,000 records with personal
names, mailing addresses and emails potentially accessed by intruders, shows that no company—no matter how
big—is immune to a cyber attack.
Apple has released little detail about the situation, which may mean they have discovered a larger, fundamental
issue with their developing infrastructure. Especially since the company response was to completely overhaul its
systems and databases—a fairly substantial reaction.
The magnitude of the company allowed Apple to handle its situation well. The attacker managed to download
some personal information, but by no means did the attacker have unfettered access to Apple resources. Nor was
the attacker capable of logging into servers deep inside the Apple network or capable of launching or injecting
malware into App Store applications (that we know of). Apple has been safe from such large-scale, high-profile
breaches for a long time because of the company’s vast knowledge and experience in cyber protection.
For organizations less versed in building a wall of defense against outside hacks, there are three things they can
do now to help prevent such a breach in the future.
• Compartmentalize your data. This is the equivalent of storing records in locked file cabinets and
only giving people access on a need-to-know basis. It is an architectural decision—keep your login information
away from the blogs, and separate that from the payment information. Encrypt everything, and stick a firewall in
front of these data resources.
• Perform behavioral analysis on network traffic. 100,000 customer data records coming
from a sign-on database is an anomalous traffic pattern, which can be detected manually (humans are great
anomaly detectors!) or with software packages. Computers communicate in very predictable patterns, these
patterns can be profiled, and anomalies can be detected quickly.
• Hack yourself. Although audits and Red Team attempts often miss the more subtle attack vectors, an
outside team can often pinpoint small vulnerabilities that might allow an attacker access to your systems and
data. Place the audit or Red Team in front of the developers first, and force them to be honest. Pride should not
stand in the way of securing your customers’ data.
It’s important to remember that 100% security is only possible if you have no data to protect. The question we
should be asking is: What are the best steps one can take to ensure as close to 100% protection as possible, no
matter how much data needs to be protected?
Contact ProQSys
16 Cavendish Court
Lebanon, NH 03766
(603) 727-4477
sales@flowtraq.com
FlowTraq Trial
Free 14-Day Trial of FlowTraq at www.flowtraq.com/trial

More Related Content

Viewers also liked

Presentación CISTI 2016 "Distinciones Conceptuales para la Trazabilidad de l...
Presentación CISTI 2016 "Distinciones Conceptuales para la Trazabilidad de l...Presentación CISTI 2016 "Distinciones Conceptuales para la Trazabilidad de l...
Presentación CISTI 2016 "Distinciones Conceptuales para la Trazabilidad de l...Victor Aravena
 
Oficio curso virtual robotica
Oficio curso virtual roboticaOficio curso virtual robotica
Oficio curso virtual roboticaUGEL TUMBES
 
Corel Draw x5 - Diseño Grafico
Corel Draw x5 - Diseño GraficoCorel Draw x5 - Diseño Grafico
Corel Draw x5 - Diseño GraficoJulio Callata
 
African American Personality
African American PersonalityAfrican American Personality
African American PersonalityChristina Barnett
 
Hacking, The Mr. Robot Way
Hacking, The Mr. Robot WayHacking, The Mr. Robot Way
Hacking, The Mr. Robot WayHouse of I.T.
 
African americanculture&worldview
African americanculture&worldviewAfrican americanculture&worldview
African americanculture&worldviewChristina Barnett
 
(The Secret Weapon Tutorial Part 2) Email + Evernote + GTD: A no BS approach ...
(The Secret Weapon Tutorial Part 2) Email + Evernote + GTD: A no BS approach ...(The Secret Weapon Tutorial Part 2) Email + Evernote + GTD: A no BS approach ...
(The Secret Weapon Tutorial Part 2) Email + Evernote + GTD: A no BS approach ...William Marco Locañas
 
The Beginners Guide to Breathtaking Presentation with Prezi
The Beginners Guide to Breathtaking Presentation with PreziThe Beginners Guide to Breathtaking Presentation with Prezi
The Beginners Guide to Breathtaking Presentation with PreziWilliam Marco Locañas
 
La mona lisa (2)
La mona lisa (2)La mona lisa (2)
La mona lisa (2)chuscorral
 

Viewers also liked (13)

Presentación CISTI 2016 "Distinciones Conceptuales para la Trazabilidad de l...
Presentación CISTI 2016 "Distinciones Conceptuales para la Trazabilidad de l...Presentación CISTI 2016 "Distinciones Conceptuales para la Trazabilidad de l...
Presentación CISTI 2016 "Distinciones Conceptuales para la Trazabilidad de l...
 
2012 online portfolio
2012 online portfolio2012 online portfolio
2012 online portfolio
 
Oficio curso virtual robotica
Oficio curso virtual roboticaOficio curso virtual robotica
Oficio curso virtual robotica
 
BTX Article
BTX Article BTX Article
BTX Article
 
Corel Draw x5 - Diseño Grafico
Corel Draw x5 - Diseño GraficoCorel Draw x5 - Diseño Grafico
Corel Draw x5 - Diseño Grafico
 
African American Personality
African American PersonalityAfrican American Personality
African American Personality
 
Hacking, The Mr. Robot Way
Hacking, The Mr. Robot WayHacking, The Mr. Robot Way
Hacking, The Mr. Robot Way
 
African americanculture&worldview
African americanculture&worldviewAfrican americanculture&worldview
African americanculture&worldview
 
(The Secret Weapon Tutorial Part 2) Email + Evernote + GTD: A no BS approach ...
(The Secret Weapon Tutorial Part 2) Email + Evernote + GTD: A no BS approach ...(The Secret Weapon Tutorial Part 2) Email + Evernote + GTD: A no BS approach ...
(The Secret Weapon Tutorial Part 2) Email + Evernote + GTD: A no BS approach ...
 
Wheel of life
Wheel of lifeWheel of life
Wheel of life
 
Η Γ' τάξη σε αποστακτηριο στο Υψηλό
Η Γ' τάξη σε αποστακτηριο στο ΥψηλόΗ Γ' τάξη σε αποστακτηριο στο Υψηλό
Η Γ' τάξη σε αποστακτηριο στο Υψηλό
 
The Beginners Guide to Breathtaking Presentation with Prezi
The Beginners Guide to Breathtaking Presentation with PreziThe Beginners Guide to Breathtaking Presentation with Prezi
The Beginners Guide to Breathtaking Presentation with Prezi
 
La mona lisa (2)
La mona lisa (2)La mona lisa (2)
La mona lisa (2)
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Preventing breaches like the apple developer website hack

  • 1. Preventing Breaches Like the Apple Developer Website Hack The highly publicized Apple Developer website breach, which left upwards of 100,000 records with personal names, mailing addresses and emails potentially accessed by intruders, shows that no company—no matter how big—is immune to a cyber attack. Apple has released little detail about the situation, which may mean they have discovered a larger, fundamental issue with their developing infrastructure. Especially since the company response was to completely overhaul its systems and databases—a fairly substantial reaction. The magnitude of the company allowed Apple to handle its situation well. The attacker managed to download some personal information, but by no means did the attacker have unfettered access to Apple resources. Nor was the attacker capable of logging into servers deep inside the Apple network or capable of launching or injecting malware into App Store applications (that we know of). Apple has been safe from such large-scale, high-profile breaches for a long time because of the company’s vast knowledge and experience in cyber protection. For organizations less versed in building a wall of defense against outside hacks, there are three things they can do now to help prevent such a breach in the future. • Compartmentalize your data. This is the equivalent of storing records in locked file cabinets and only giving people access on a need-to-know basis. It is an architectural decision—keep your login information away from the blogs, and separate that from the payment information. Encrypt everything, and stick a firewall in front of these data resources. • Perform behavioral analysis on network traffic. 100,000 customer data records coming from a sign-on database is an anomalous traffic pattern, which can be detected manually (humans are great anomaly detectors!) or with software packages. Computers communicate in very predictable patterns, these patterns can be profiled, and anomalies can be detected quickly. • Hack yourself. Although audits and Red Team attempts often miss the more subtle attack vectors, an outside team can often pinpoint small vulnerabilities that might allow an attacker access to your systems and data. Place the audit or Red Team in front of the developers first, and force them to be honest. Pride should not stand in the way of securing your customers’ data. It’s important to remember that 100% security is only possible if you have no data to protect. The question we should be asking is: What are the best steps one can take to ensure as close to 100% protection as possible, no matter how much data needs to be protected? Contact ProQSys 16 Cavendish Court Lebanon, NH 03766 (603) 727-4477 sales@flowtraq.com FlowTraq Trial Free 14-Day Trial of FlowTraq at www.flowtraq.com/trial