SlideShare a Scribd company logo
MWEB Business: Hacked
    Management Information Systems


                       10.12.2012
Outline

1. What technology issues led to the security breach at MWEB?

2. What is the possible business impact of this security breach
   for both MWEB and its customers?

3. If you were an MWEB customer, would you consider MWEB's
   response to the security breach to be acceptable?

4. What should MWEB do in the future to avoid similar incidents?
o South Africa’s 2nd largest Internet Service Provider

o Founded in 1997

o Divisions: MWEB Connect and MWEB Business

o Customer base:
   •   Home users
   •   Small, medium and large enterprises
   •   Corporate clients
Portfolio

o Tailored Business Solutions

o Personalized account management

o Own world class network infrastructure

o International connectivity redundancy

o Next generation data centers

o 24/7 Technical support
Security Measures

o Using AVG Internet Security as partner
o Identity protection
o LinkScanner (safe surfing)
o WebShield (safe social networking)
o Antiphishing, Antispam, Antivirus,
  Antispyware
o Enhanced firewall
o Automatic e-mail cleaning
o Blocking network ports commonly used by
  hackers
Dangerous Breach

Issue:
oCompromised subscribers account details
oPublished logon and password details



Reason
oHackers gained access to Web based Internet
Solutions’ self-service management system
o outsourced, not in total control
Data Management
Business Impact

o Notifying customers and find solution
o Determine reason for breach = interruption of business processes
o Work together with IS
o Lost trust of customers  gain back
o Implement proper policies and controls
o Prepare for legal, financial risks
o Threat to customer retention and reputation



          Very tricky process with

          intangible and tangible costs
Customer Impact

o Need for explanation
o Need for behavioral recommendations
o Loss of personal information (privacy)
o Data lost or inaccurate
o Additional compromising of related accounts
o Inconvenience: have to change password or
  could not access the service
o Lost trust in the company
Response to the security breach
o 25.10.2010 Security Breach
       “Dear sirs if you see your own name on the list maybe it's time for
        switching ISP (in case you have any option) :D”
o Disclosed and responded the same day (quickly!!)


o User names  recreated
  Passwords  changed


o No personal information was lost
o Clients did not suffer any losses
Response to the security breach

o Internet Solutions network  own IPC network
o Repels 5000 attacks a day!
o Added security measure  reset the passwords
o Investigation together with Internet Solutions



             Acceptable response?           Yes


                      Saved trust?           No
To-do list for the future


o Digital certificates
o Intrusion detection system
o MIS audit
o Regular and thorough testing
o Improved identity management
Thank you!

More Related Content

What's hot

Diaspora marketing
Diaspora marketingDiaspora marketing
Diaspora marketing
Harram Aneeqa
 
Guidelines for office administration sba
Guidelines for office administration sbaGuidelines for office administration sba
Guidelines for office administration sba
Lisa Forbes
 
Alibaba ppt
Alibaba pptAlibaba ppt
Alibaba ppt
emogabbyemogabby
 
Swot analysis of Evaly
Swot analysis of EvalySwot analysis of Evaly
Swot analysis of Evaly
habiburrahman391
 
Demystifying The Growth Of E - Commerce In India - An Analysis By CouponzGuru
Demystifying The Growth Of E - Commerce In India - An Analysis By CouponzGuruDemystifying The Growth Of E - Commerce In India - An Analysis By CouponzGuru
Demystifying The Growth Of E - Commerce In India - An Analysis By CouponzGuru
CouponzGuru.com
 
Ecommerce daraz
Ecommerce darazEcommerce daraz
Ecommerce daraz
Deepak Rajak
 
Presentation on e business of chaldal.com
Presentation on e business of chaldal.comPresentation on e business of chaldal.com
Presentation on e business of chaldal.com
Rifat Mahmud Saikot
 
Oa
OaOa
Oa
cxf101
 
Corporate strategy-of-beximco-group
Corporate strategy-of-beximco-groupCorporate strategy-of-beximco-group
Corporate strategy-of-beximco-group
Farhan Shehab
 
Grameen phone project report
Grameen phone project reportGrameen phone project report
Grameen phone project report
Jasfia Khanam Fama
 
E-COMMERCE ORDER FULFILLMENT SERVICES
E-COMMERCE ORDER FULFILLMENT SERVICESE-COMMERCE ORDER FULFILLMENT SERVICES
E-COMMERCE ORDER FULFILLMENT SERVICES
Data Insight
 
Brick and mortar vs ecom
Brick and mortar vs ecomBrick and mortar vs ecom
Brick and mortar vs ecom
Nandana Gupta
 
Alibaba group
Alibaba groupAlibaba group
Alibaba group
Mahi Kiranmayi
 
Building a Culture of Innovation at Amazon: Driving Customer Success
Building a Culture of Innovation at Amazon: Driving Customer SuccessBuilding a Culture of Innovation at Amazon: Driving Customer Success
Building a Culture of Innovation at Amazon: Driving Customer Success
Amazon Web Services
 
Internship report on grameen phone internet service by lecturesheets & lectur...
Internship report on grameen phone internet service by lecturesheets & lectur...Internship report on grameen phone internet service by lecturesheets & lectur...
Internship report on grameen phone internet service by lecturesheets & lectur...
International Islamic University Chittagong, Batch 28 A9
 
Online to offline (O2O) Commerce
Online to offline (O2O) CommerceOnline to offline (O2O) Commerce
Online to offline (O2O) Commerce
Ravikeerthi Rao
 
When tragedy strikes the supply chain (Rana Plaza)
When tragedy strikes the supply chain (Rana Plaza)When tragedy strikes the supply chain (Rana Plaza)
When tragedy strikes the supply chain (Rana Plaza)
Md. Kamran Hasan
 
Amazon SWOT Analysis 2018
Amazon SWOT Analysis 2018Amazon SWOT Analysis 2018
Amazon SWOT Analysis 2018
Ovidijus Jurevicius
 
Social studies sba
Social studies sbaSocial studies sba
Social studies sba
Niesha Young
 
E-Commerce Case Studies
E-Commerce Case StudiesE-Commerce Case Studies
E-Commerce Case Studies
Divante
 

What's hot (20)

Diaspora marketing
Diaspora marketingDiaspora marketing
Diaspora marketing
 
Guidelines for office administration sba
Guidelines for office administration sbaGuidelines for office administration sba
Guidelines for office administration sba
 
Alibaba ppt
Alibaba pptAlibaba ppt
Alibaba ppt
 
Swot analysis of Evaly
Swot analysis of EvalySwot analysis of Evaly
Swot analysis of Evaly
 
Demystifying The Growth Of E - Commerce In India - An Analysis By CouponzGuru
Demystifying The Growth Of E - Commerce In India - An Analysis By CouponzGuruDemystifying The Growth Of E - Commerce In India - An Analysis By CouponzGuru
Demystifying The Growth Of E - Commerce In India - An Analysis By CouponzGuru
 
Ecommerce daraz
Ecommerce darazEcommerce daraz
Ecommerce daraz
 
Presentation on e business of chaldal.com
Presentation on e business of chaldal.comPresentation on e business of chaldal.com
Presentation on e business of chaldal.com
 
Oa
OaOa
Oa
 
Corporate strategy-of-beximco-group
Corporate strategy-of-beximco-groupCorporate strategy-of-beximco-group
Corporate strategy-of-beximco-group
 
Grameen phone project report
Grameen phone project reportGrameen phone project report
Grameen phone project report
 
E-COMMERCE ORDER FULFILLMENT SERVICES
E-COMMERCE ORDER FULFILLMENT SERVICESE-COMMERCE ORDER FULFILLMENT SERVICES
E-COMMERCE ORDER FULFILLMENT SERVICES
 
Brick and mortar vs ecom
Brick and mortar vs ecomBrick and mortar vs ecom
Brick and mortar vs ecom
 
Alibaba group
Alibaba groupAlibaba group
Alibaba group
 
Building a Culture of Innovation at Amazon: Driving Customer Success
Building a Culture of Innovation at Amazon: Driving Customer SuccessBuilding a Culture of Innovation at Amazon: Driving Customer Success
Building a Culture of Innovation at Amazon: Driving Customer Success
 
Internship report on grameen phone internet service by lecturesheets & lectur...
Internship report on grameen phone internet service by lecturesheets & lectur...Internship report on grameen phone internet service by lecturesheets & lectur...
Internship report on grameen phone internet service by lecturesheets & lectur...
 
Online to offline (O2O) Commerce
Online to offline (O2O) CommerceOnline to offline (O2O) Commerce
Online to offline (O2O) Commerce
 
When tragedy strikes the supply chain (Rana Plaza)
When tragedy strikes the supply chain (Rana Plaza)When tragedy strikes the supply chain (Rana Plaza)
When tragedy strikes the supply chain (Rana Plaza)
 
Amazon SWOT Analysis 2018
Amazon SWOT Analysis 2018Amazon SWOT Analysis 2018
Amazon SWOT Analysis 2018
 
Social studies sba
Social studies sbaSocial studies sba
Social studies sba
 
E-Commerce Case Studies
E-Commerce Case StudiesE-Commerce Case Studies
E-Commerce Case Studies
 

Viewers also liked

MWEB - Trends Report 2014
MWEB - Trends Report 2014 MWEB - Trends Report 2014
MWEB - Trends Report 2014
MWEB_SA
 
Soundbuzz’s Music Strategy for Asia-Pacific
Soundbuzz’s Music Strategy for Asia-Pacific Soundbuzz’s Music Strategy for Asia-Pacific
Soundbuzz’s Music Strategy for Asia-Pacific
Birte Gröger
 
Apache
ApacheApache
Chapter 8 management information system 12th edition 2012 laudon
Chapter 8 management information system 12th edition 2012 laudonChapter 8 management information system 12th edition 2012 laudon
Chapter 8 management information system 12th edition 2012 laudon
Yanick Iglesias
 
WoW Project - World of Wifi
WoW Project - World of WifiWoW Project - World of Wifi
WoW Project - World of Wifi
telpin telpin
 
KeyWifi business presentation
KeyWifi business presentationKeyWifi business presentation
KeyWifi business presentation
tmcmh
 
Apa Itu WiFi
Apa Itu WiFiApa Itu WiFi
New Ways to Generate Revenues from Public Wi-Fi
New Ways to Generate Revenues from Public Wi-FiNew Ways to Generate Revenues from Public Wi-Fi
New Ways to Generate Revenues from Public Wi-Fi
Wi-Fi 360
 
WiFi HotSpot Marketin
WiFi HotSpot MarketinWiFi HotSpot Marketin
WiFi HotSpot Marketin
Kody Smith
 
Monetizing WiFi
Monetizing WiFiMonetizing WiFi
Monetizing WiFi
Dr. Mazlan Abbas
 
WiFi: Current And Future Opportunities
WiFi: Current And Future Opportunities WiFi: Current And Future Opportunities
WiFi: Current And Future Opportunities
Peter Jarich
 
Go to Market Strategy
Go to Market StrategyGo to Market Strategy
Go to Market Strategy
Rajiv Netra
 
Go-to-Market Strategy vs Marketing Strategy
Go-to-Market Strategy vs Marketing StrategyGo-to-Market Strategy vs Marketing Strategy
Go-to-Market Strategy vs Marketing Strategy
Armando-Jose Diaz Phd MBM MBA
 
Web 2.0 youtube
Web 2.0 youtubeWeb 2.0 youtube
Web 2.0 youtube
leidy burgos
 
Go-to-Market Best Practices for Startups
Go-to-Market Best Practices for StartupsGo-to-Market Best Practices for Startups
Go-to-Market Best Practices for Startups
a16z
 
Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)
Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)
Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)
MaRS Discovery District
 
Go to market planning
Go to market planningGo to market planning
Go to market planning
Mike McCormac
 
Go to-market strategy for B2B SaaS companies
Go to-market strategy for B2B SaaS companiesGo to-market strategy for B2B SaaS companies
Go to-market strategy for B2B SaaS companies
Guillaume Lerouge
 

Viewers also liked (18)

MWEB - Trends Report 2014
MWEB - Trends Report 2014 MWEB - Trends Report 2014
MWEB - Trends Report 2014
 
Soundbuzz’s Music Strategy for Asia-Pacific
Soundbuzz’s Music Strategy for Asia-Pacific Soundbuzz’s Music Strategy for Asia-Pacific
Soundbuzz’s Music Strategy for Asia-Pacific
 
Apache
ApacheApache
Apache
 
Chapter 8 management information system 12th edition 2012 laudon
Chapter 8 management information system 12th edition 2012 laudonChapter 8 management information system 12th edition 2012 laudon
Chapter 8 management information system 12th edition 2012 laudon
 
WoW Project - World of Wifi
WoW Project - World of WifiWoW Project - World of Wifi
WoW Project - World of Wifi
 
KeyWifi business presentation
KeyWifi business presentationKeyWifi business presentation
KeyWifi business presentation
 
Apa Itu WiFi
Apa Itu WiFiApa Itu WiFi
Apa Itu WiFi
 
New Ways to Generate Revenues from Public Wi-Fi
New Ways to Generate Revenues from Public Wi-FiNew Ways to Generate Revenues from Public Wi-Fi
New Ways to Generate Revenues from Public Wi-Fi
 
WiFi HotSpot Marketin
WiFi HotSpot MarketinWiFi HotSpot Marketin
WiFi HotSpot Marketin
 
Monetizing WiFi
Monetizing WiFiMonetizing WiFi
Monetizing WiFi
 
WiFi: Current And Future Opportunities
WiFi: Current And Future Opportunities WiFi: Current And Future Opportunities
WiFi: Current And Future Opportunities
 
Go to Market Strategy
Go to Market StrategyGo to Market Strategy
Go to Market Strategy
 
Go-to-Market Strategy vs Marketing Strategy
Go-to-Market Strategy vs Marketing StrategyGo-to-Market Strategy vs Marketing Strategy
Go-to-Market Strategy vs Marketing Strategy
 
Web 2.0 youtube
Web 2.0 youtubeWeb 2.0 youtube
Web 2.0 youtube
 
Go-to-Market Best Practices for Startups
Go-to-Market Best Practices for StartupsGo-to-Market Best Practices for Startups
Go-to-Market Best Practices for Startups
 
Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)
Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)
Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)
 
Go to market planning
Go to market planningGo to market planning
Go to market planning
 
Go to-market strategy for B2B SaaS companies
Go to-market strategy for B2B SaaS companiesGo to-market strategy for B2B SaaS companies
Go to-market strategy for B2B SaaS companies
 

Similar to MWEB Business: Hacked

IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to Know
Rochester Software Associates
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
James Sutter
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
BeyondTrust
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
Jim Kaplan CIA CFE
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
Jim Kaplan CIA CFE
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
Bankingdotcom
 
Network Security
Network SecurityNetwork Security
Network Security
pethurusan
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security Services
All Covered
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
North Texas Chapter of the ISSA
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
Lucy Denver
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
Gabor Szathmari
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
Community IT Innovators
 
Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?
Digital Transformation EXPO Event Series
 
Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
Brenton Johnson
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2
Donald Malloy
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
Donald Malloy
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
New Horizons Computer Learning Centers / 5PE
 
AMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes WebinarAMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes Webinar
ThousandEyes
 
Office365 in today's digital threats landscape: attacks & remedies from a hac...
Office365 in today's digital threats landscape: attacks & remedies from a hac...Office365 in today's digital threats landscape: attacks & remedies from a hac...
Office365 in today's digital threats landscape: attacks & remedies from a hac...
Benedek Menesi
 

Similar to MWEB Business: Hacked (20)

IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to Know
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Network Security
Network SecurityNetwork Security
Network Security
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security Services
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?
 
Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
 
AMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes WebinarAMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes Webinar
 
Office365 in today's digital threats landscape: attacks & remedies from a hac...
Office365 in today's digital threats landscape: attacks & remedies from a hac...Office365 in today's digital threats landscape: attacks & remedies from a hac...
Office365 in today's digital threats landscape: attacks & remedies from a hac...
 

More from Birte Gröger

Knowing the Drill: Virtual Teamwork at BP
Knowing the Drill: Virtual Teamwork at BPKnowing the Drill: Virtual Teamwork at BP
Knowing the Drill: Virtual Teamwork at BP
Birte Gröger
 
Nordea goes green with IT
Nordea goes green with ITNordea goes green with IT
Nordea goes green with IT
Birte Gröger
 
New Service Design Excercise - Experience Hub
New Service Design Excercise - Experience HubNew Service Design Excercise - Experience Hub
New Service Design Excercise - Experience Hub
Birte Gröger
 
Progressive: Pay-as-you-go insurance
Progressive: Pay-as-you-go insuranceProgressive: Pay-as-you-go insurance
Progressive: Pay-as-you-go insurance
Birte Gröger
 
How do fear appeals in advertising work?
How do fear appeals in advertising work?How do fear appeals in advertising work?
How do fear appeals in advertising work?
Birte Gröger
 
Teaching Bayesian Method
Teaching Bayesian MethodTeaching Bayesian Method
Teaching Bayesian Method
Birte Gröger
 

More from Birte Gröger (6)

Knowing the Drill: Virtual Teamwork at BP
Knowing the Drill: Virtual Teamwork at BPKnowing the Drill: Virtual Teamwork at BP
Knowing the Drill: Virtual Teamwork at BP
 
Nordea goes green with IT
Nordea goes green with ITNordea goes green with IT
Nordea goes green with IT
 
New Service Design Excercise - Experience Hub
New Service Design Excercise - Experience HubNew Service Design Excercise - Experience Hub
New Service Design Excercise - Experience Hub
 
Progressive: Pay-as-you-go insurance
Progressive: Pay-as-you-go insuranceProgressive: Pay-as-you-go insurance
Progressive: Pay-as-you-go insurance
 
How do fear appeals in advertising work?
How do fear appeals in advertising work?How do fear appeals in advertising work?
How do fear appeals in advertising work?
 
Teaching Bayesian Method
Teaching Bayesian MethodTeaching Bayesian Method
Teaching Bayesian Method
 

Recently uploaded

2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
buy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accountsbuy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accounts
Susan Laney
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
 
Structural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for BuildingsStructural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for Buildings
Chandresh Chudasama
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
Christian Dahlen
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
CLIVE MINCHIN
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 

Recently uploaded (20)

2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
buy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accountsbuy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accounts
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
 
Structural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for BuildingsStructural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for Buildings
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
 

MWEB Business: Hacked

  • 1. MWEB Business: Hacked Management Information Systems 10.12.2012
  • 2. Outline 1. What technology issues led to the security breach at MWEB? 2. What is the possible business impact of this security breach for both MWEB and its customers? 3. If you were an MWEB customer, would you consider MWEB's response to the security breach to be acceptable? 4. What should MWEB do in the future to avoid similar incidents?
  • 3. o South Africa’s 2nd largest Internet Service Provider o Founded in 1997 o Divisions: MWEB Connect and MWEB Business o Customer base: • Home users • Small, medium and large enterprises • Corporate clients
  • 4. Portfolio o Tailored Business Solutions o Personalized account management o Own world class network infrastructure o International connectivity redundancy o Next generation data centers o 24/7 Technical support
  • 5. Security Measures o Using AVG Internet Security as partner o Identity protection o LinkScanner (safe surfing) o WebShield (safe social networking) o Antiphishing, Antispam, Antivirus, Antispyware o Enhanced firewall o Automatic e-mail cleaning o Blocking network ports commonly used by hackers
  • 6. Dangerous Breach Issue: oCompromised subscribers account details oPublished logon and password details Reason oHackers gained access to Web based Internet Solutions’ self-service management system o outsourced, not in total control
  • 8. Business Impact o Notifying customers and find solution o Determine reason for breach = interruption of business processes o Work together with IS o Lost trust of customers  gain back o Implement proper policies and controls o Prepare for legal, financial risks o Threat to customer retention and reputation Very tricky process with intangible and tangible costs
  • 9. Customer Impact o Need for explanation o Need for behavioral recommendations o Loss of personal information (privacy) o Data lost or inaccurate o Additional compromising of related accounts o Inconvenience: have to change password or could not access the service o Lost trust in the company
  • 10. Response to the security breach o 25.10.2010 Security Breach “Dear sirs if you see your own name on the list maybe it's time for switching ISP (in case you have any option) :D” o Disclosed and responded the same day (quickly!!) o User names  recreated Passwords  changed o No personal information was lost o Clients did not suffer any losses
  • 11. Response to the security breach o Internet Solutions network  own IPC network o Repels 5000 attacks a day! o Added security measure  reset the passwords o Investigation together with Internet Solutions Acceptable response? Yes Saved trust? No
  • 12. To-do list for the future o Digital certificates o Intrusion detection system o MIS audit o Regular and thorough testing o Improved identity management

Editor's Notes

  1. Cater for specific connectivity requirements
  2. (Wired and wireless Internet connectivity, hosting services, applications, VoIP)
  3. Automatic e-mail cleaning from recognized malware sources  protection against junkmail and viruses
  4. 2390 users of digital subscriber line were affected MWEB uses this system to manage accounts not yet migrated to MWEB network Legacy system, not so security options
  5. Bulk was already migrated but some business users still on the old system
  6. Quotation is from the site where the information was published
  7. Thank you for listening. Any questions?