SlideShare a Scribd company logo
@StoretecHull

www.storetec.net

Facebook.com/storetec
Storetec Services Limited

Data Security Breach May Embarrass FA

The Football Association (FA) already has plenty of critics, but it may
be set for more if it is found to have come up short over data
security.
If such failings have occurred, they may come to light in the trial of
three men accused of hacking at the body.
The trio include referee Dean Mohareb from Stockport, who has been
charged with unauthorised access to computer data as well as another
charge of perverting the course of justice. Two other men also face
perverting the course of justice charges.
Mr Mohareb is a Football League referee and the FA's national referee
development manager, which means he is likely to be in a position to
access substantial quantities of data concerning fellow match officials.
He was arrested in October last year over allegations that he hacked
into a fellow referee's email account and stole confidential data.
While more details of the case will emerge during the court case –
which begins on December 5th – the incident may raise the issue of
how much protection security staff at an organisation may have if a
rogue colleague is keen to spy on them.
Much may depend on the nature of an email account, of course. If data
is held on an internal system, that is a direct concern for the company,
whereas if it is a private account it will be the internet service provider's
security systems that are called into question.
Data encryption is one way that a company can take steps to ensure
data is kept as safe as possible, with this providing a second line of
defence in case the password is discovered.
Company data should certainly be encrypted, as organisations can get
into trouble if certain kinds of data are compromised.
For example, last month the Information Commissioner's Office fined
North East Lincolnshire Council £80,000 over an incident in which a
memory stick containing unencrypted data about children with special
needs went missing.
Storetec News/Blogs."http://www.storetec.net/news-blog/datasecurity-breach-may-embarrass-fa/". Data security breach may
embarrass FA. November 29, 2013. Storetec.
For example, last month the Information Commissioner's Office fined
North East Lincolnshire Council £80,000 over an incident in which a
memory stick containing unencrypted data about children with special
needs went missing.
Storetec News/Blogs."http://www.storetec.net/news-blog/datasecurity-breach-may-embarrass-fa/". Data security breach may
embarrass FA. November 29, 2013. Storetec.

More Related Content

What's hot

Critical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachCritical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target Breach
Teri Radichel
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
LexisNexis
 
Protecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceProtecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA compliance
Todd Merrill
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
United Security Providers AG
 
Schrems II and India
Schrems II and IndiaSchrems II and India
Schrems II and India
mayank batavia
 
Does Your Business
Does Your BusinessDoes Your Business
Does Your Business
Steven T. Bledsoe
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and Security
Jamie Hutt
 
What is WHOIS?
What is WHOIS?What is WHOIS?
What is WHOIS?
ICANN
 
E-Discovery in Litigation and Records Retention
E-Discovery in Litigation and Records RetentionE-Discovery in Litigation and Records Retention
E-Discovery in Litigation and Records Retentionwcodell
 

What's hot (9)

Critical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachCritical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target Breach
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
Protecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceProtecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA compliance
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
Schrems II and India
Schrems II and IndiaSchrems II and India
Schrems II and India
 
Does Your Business
Does Your BusinessDoes Your Business
Does Your Business
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and Security
 
What is WHOIS?
What is WHOIS?What is WHOIS?
What is WHOIS?
 
E-Discovery in Litigation and Records Retention
E-Discovery in Litigation and Records RetentionE-Discovery in Litigation and Records Retention
E-Discovery in Litigation and Records Retention
 

Viewers also liked

аскарида
аскаридааскарида
аскарида
nechaeva1
 
Cv
CvCv
Entrega fase 4_ creacion_o.v.a_avancemos en el aprendizaje_grupo_205540_1
Entrega  fase 4_  creacion_o.v.a_avancemos en el aprendizaje_grupo_205540_1Entrega  fase 4_  creacion_o.v.a_avancemos en el aprendizaje_grupo_205540_1
Entrega fase 4_ creacion_o.v.a_avancemos en el aprendizaje_grupo_205540_1
Claudia L Betancur
 
Clasificacion metodologias
Clasificacion metodologiasClasificacion metodologias
Clasificacion metodologias
feltiga
 
Secretele Vieţii - Dicteu Divin prin Gottfried Mayerhofer
Secretele Vieţii - Dicteu Divin prin Gottfried MayerhoferSecretele Vieţii - Dicteu Divin prin Gottfried Mayerhofer
Secretele Vieţii - Dicteu Divin prin Gottfried Mayerhofer
billydean
 
Preguntas anabell hilarski
Preguntas anabell hilarskiPreguntas anabell hilarski
Preguntas anabell hilarski
SomechatES
 
Patrono programa2015
Patrono   programa2015Patrono   programa2015
Patrono programa2015
Ria da Escrita
 
Kiran Sawant - Summary Profile
Kiran Sawant  - Summary ProfileKiran Sawant  - Summary Profile
Kiran Sawant - Summary ProfileKiran Sawant
 
Companies warned over new nsa malware allegations
Companies warned over new nsa malware allegationsCompanies warned over new nsa malware allegations
Companies warned over new nsa malware allegationsJohn Davis
 
Bigdata presentation
Bigdata presentationBigdata presentation
Bigdata presentation
SatishAlerts
 
11mo Estudio de hábitos de Internet en México 2015 del 18mayo de 2015 #DDI2015
11mo Estudio de hábitos de Internet en México 2015 del 18mayo de 2015 #DDI201511mo Estudio de hábitos de Internet en México 2015 del 18mayo de 2015 #DDI2015
11mo Estudio de hábitos de Internet en México 2015 del 18mayo de 2015 #DDI2015
Nabor Garrido
 
Presentacion - Deber
Presentacion - DeberPresentacion - Deber
Presentacion - Deber
karlitagd23
 
Digital surya 02 desember 2013
Digital surya 02 desember 2013Digital surya 02 desember 2013
Digital surya 02 desember 2013Portal Surya
 
Hospitalidade
HospitalidadeHospitalidade
Hospitalidade
Clarissa Matos
 

Viewers also liked (18)

Frank Endres
Frank EndresFrank Endres
Frank Endres
 
аскарида
аскаридааскарида
аскарида
 
Cv
CvCv
Cv
 
Entrega fase 4_ creacion_o.v.a_avancemos en el aprendizaje_grupo_205540_1
Entrega  fase 4_  creacion_o.v.a_avancemos en el aprendizaje_grupo_205540_1Entrega  fase 4_  creacion_o.v.a_avancemos en el aprendizaje_grupo_205540_1
Entrega fase 4_ creacion_o.v.a_avancemos en el aprendizaje_grupo_205540_1
 
Today i’m 25
Today i’m 25 Today i’m 25
Today i’m 25
 
Clasificacion metodologias
Clasificacion metodologiasClasificacion metodologias
Clasificacion metodologias
 
January Newsletter 2016
January Newsletter 2016January Newsletter 2016
January Newsletter 2016
 
Secretele Vieţii - Dicteu Divin prin Gottfried Mayerhofer
Secretele Vieţii - Dicteu Divin prin Gottfried MayerhoferSecretele Vieţii - Dicteu Divin prin Gottfried Mayerhofer
Secretele Vieţii - Dicteu Divin prin Gottfried Mayerhofer
 
Preguntas anabell hilarski
Preguntas anabell hilarskiPreguntas anabell hilarski
Preguntas anabell hilarski
 
Patrono programa2015
Patrono   programa2015Patrono   programa2015
Patrono programa2015
 
Kiran Sawant - Summary Profile
Kiran Sawant  - Summary ProfileKiran Sawant  - Summary Profile
Kiran Sawant - Summary Profile
 
Companies warned over new nsa malware allegations
Companies warned over new nsa malware allegationsCompanies warned over new nsa malware allegations
Companies warned over new nsa malware allegations
 
Bigdata presentation
Bigdata presentationBigdata presentation
Bigdata presentation
 
11mo Estudio de hábitos de Internet en México 2015 del 18mayo de 2015 #DDI2015
11mo Estudio de hábitos de Internet en México 2015 del 18mayo de 2015 #DDI201511mo Estudio de hábitos de Internet en México 2015 del 18mayo de 2015 #DDI2015
11mo Estudio de hábitos de Internet en México 2015 del 18mayo de 2015 #DDI2015
 
Presentacion - Deber
Presentacion - DeberPresentacion - Deber
Presentacion - Deber
 
Industri
IndustriIndustri
Industri
 
Digital surya 02 desember 2013
Digital surya 02 desember 2013Digital surya 02 desember 2013
Digital surya 02 desember 2013
 
Hospitalidade
HospitalidadeHospitalidade
Hospitalidade
 

Similar to Data security breach may embarrass fa

Ico underlines importance of encryption after data loss
Ico underlines importance of encryption after data lossIco underlines importance of encryption after data loss
Ico underlines importance of encryption after data loss
John Davis
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Stanford GSB Corporate Governance Research Initiative
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Grady
tomo006
 
Data Breaches
Data BreachesData Breaches
Data Breachessstose
 
Internet Safety/Security
Internet Safety/SecurityInternet Safety/Security
Internet Safety/Securityczarviscayno
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data Breach
Logikcull.com
 
Data_Privacy_Protection_brochure_UK
Data_Privacy_Protection_brochure_UKData_Privacy_Protection_brochure_UK
Data_Privacy_Protection_brochure_UKSally Hunt
 
Data trawling and security strategies
Data trawling and security strategiesData trawling and security strategies
Data trawling and security strategies
Venkata Karthik Gullapalli
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
tidwellveronique
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
Hayden McCall
 
Ni sug disuk 2013
Ni sug disuk 2013Ni sug disuk 2013
Ni sug disuk 2013
DISUK Limited
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
anthonywong
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Adriana Sanford
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
aryan532920
 
Internet Privacy
Internet PrivacyInternet Privacy
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docxSmartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
whitneyleman54422
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
TanayMalhotra
 
1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibe1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibe
cargillfilberto
 
What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019
Ulf Mattsson
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 

Similar to Data security breach may embarrass fa (20)

Ico underlines importance of encryption after data loss
Ico underlines importance of encryption after data lossIco underlines importance of encryption after data loss
Ico underlines importance of encryption after data loss
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Grady
 
Data Breaches
Data BreachesData Breaches
Data Breaches
 
Internet Safety/Security
Internet Safety/SecurityInternet Safety/Security
Internet Safety/Security
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data Breach
 
Data_Privacy_Protection_brochure_UK
Data_Privacy_Protection_brochure_UKData_Privacy_Protection_brochure_UK
Data_Privacy_Protection_brochure_UK
 
Data trawling and security strategies
Data trawling and security strategiesData trawling and security strategies
Data trawling and security strategies
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 
Ni sug disuk 2013
Ni sug disuk 2013Ni sug disuk 2013
Ni sug disuk 2013
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docxSmartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibe1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibe
 
What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 

More from John Davis

Norfolk County Council Announces Cloud-based Storage Network
Norfolk County Council Announces Cloud-based Storage Network Norfolk County Council Announces Cloud-based Storage Network
Norfolk County Council Announces Cloud-based Storage Network
John Davis
 
Data protection rules could cost firms £75k a year
Data protection rules could cost firms £75k a yearData protection rules could cost firms £75k a year
Data protection rules could cost firms £75k a year
John Davis
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing Data
John Davis
 
Uk banks targeted in cyber attacks
Uk banks targeted in cyber attacksUk banks targeted in cyber attacks
Uk banks targeted in cyber attacksJohn Davis
 
Glasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recoveryGlasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recoveryJohn Davis
 
Burglary figures may highlight byod data risk
Burglary figures may highlight byod data riskBurglary figures may highlight byod data risk
Burglary figures may highlight byod data riskJohn Davis
 
Uk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concernsUk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concernsJohn Davis
 
New microsoft application security problem
New microsoft application security problemNew microsoft application security problem
New microsoft application security problem
John Davis
 
Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’
John Davis
 
Improve your security, minister tells major firms
Improve your security, minister tells major firmsImprove your security, minister tells major firms
Improve your security, minister tells major firmsJohn Davis
 
Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’John Davis
 
Bitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 millionBitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 millionJohn Davis
 
Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’John Davis
 
Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’John Davis
 
Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’
John Davis
 
Data centres getting greener, say experts
Data centres getting greener, say expertsData centres getting greener, say experts
Data centres getting greener, say expertsJohn Davis
 
Data protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeData protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeJohn Davis
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacksJohn Davis
 
It spending set for rise after 2013 dip
It spending set for rise after 2013 dipIt spending set for rise after 2013 dip
It spending set for rise after 2013 dipJohn Davis
 
Loughborough university launches byod to complement cloud
Loughborough university launches byod to complement cloudLoughborough university launches byod to complement cloud
Loughborough university launches byod to complement cloudJohn Davis
 

More from John Davis (20)

Norfolk County Council Announces Cloud-based Storage Network
Norfolk County Council Announces Cloud-based Storage Network Norfolk County Council Announces Cloud-based Storage Network
Norfolk County Council Announces Cloud-based Storage Network
 
Data protection rules could cost firms £75k a year
Data protection rules could cost firms £75k a yearData protection rules could cost firms £75k a year
Data protection rules could cost firms £75k a year
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing Data
 
Uk banks targeted in cyber attacks
Uk banks targeted in cyber attacksUk banks targeted in cyber attacks
Uk banks targeted in cyber attacks
 
Glasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recoveryGlasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recovery
 
Burglary figures may highlight byod data risk
Burglary figures may highlight byod data riskBurglary figures may highlight byod data risk
Burglary figures may highlight byod data risk
 
Uk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concernsUk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concerns
 
New microsoft application security problem
New microsoft application security problemNew microsoft application security problem
New microsoft application security problem
 
Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’
 
Improve your security, minister tells major firms
Improve your security, minister tells major firmsImprove your security, minister tells major firms
Improve your security, minister tells major firms
 
Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’
 
Bitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 millionBitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 million
 
Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’
 
Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’
 
Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’
 
Data centres getting greener, say experts
Data centres getting greener, say expertsData centres getting greener, say experts
Data centres getting greener, say experts
 
Data protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeData protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk trade
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacks
 
It spending set for rise after 2013 dip
It spending set for rise after 2013 dipIt spending set for rise after 2013 dip
It spending set for rise after 2013 dip
 
Loughborough university launches byod to complement cloud
Loughborough university launches byod to complement cloudLoughborough university launches byod to complement cloud
Loughborough university launches byod to complement cloud
 

Recently uploaded

Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Jos Voskuil
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
Naaraayani Minerals Pvt.Ltd
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop.com LTD
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
Henry Tapper
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
Kumar Satyam
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
Safe PaaS
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 

Recently uploaded (20)

Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 

Data security breach may embarrass fa

  • 1. @StoretecHull www.storetec.net Facebook.com/storetec Storetec Services Limited Data Security Breach May Embarrass FA The Football Association (FA) already has plenty of critics, but it may be set for more if it is found to have come up short over data security. If such failings have occurred, they may come to light in the trial of three men accused of hacking at the body.
  • 2. The trio include referee Dean Mohareb from Stockport, who has been charged with unauthorised access to computer data as well as another charge of perverting the course of justice. Two other men also face perverting the course of justice charges. Mr Mohareb is a Football League referee and the FA's national referee development manager, which means he is likely to be in a position to access substantial quantities of data concerning fellow match officials.
  • 3. He was arrested in October last year over allegations that he hacked into a fellow referee's email account and stole confidential data. While more details of the case will emerge during the court case – which begins on December 5th – the incident may raise the issue of how much protection security staff at an organisation may have if a rogue colleague is keen to spy on them.
  • 4. Much may depend on the nature of an email account, of course. If data is held on an internal system, that is a direct concern for the company, whereas if it is a private account it will be the internet service provider's security systems that are called into question. Data encryption is one way that a company can take steps to ensure data is kept as safe as possible, with this providing a second line of defence in case the password is discovered. Company data should certainly be encrypted, as organisations can get into trouble if certain kinds of data are compromised.
  • 5. For example, last month the Information Commissioner's Office fined North East Lincolnshire Council £80,000 over an incident in which a memory stick containing unencrypted data about children with special needs went missing. Storetec News/Blogs."http://www.storetec.net/news-blog/datasecurity-breach-may-embarrass-fa/". Data security breach may embarrass FA. November 29, 2013. Storetec.
  • 6. For example, last month the Information Commissioner's Office fined North East Lincolnshire Council £80,000 over an incident in which a memory stick containing unencrypted data about children with special needs went missing. Storetec News/Blogs."http://www.storetec.net/news-blog/datasecurity-breach-may-embarrass-fa/". Data security breach may embarrass FA. November 29, 2013. Storetec.