SlideShare a Scribd company logo
1 of 1
Preventing Breaches Like the Apple Developer Website Hack
The highly publicized Apple Developer website breach, which left upwards of 100,000 records with personal
names, mailing addresses and emails potentially accessed by intruders, shows that no company—no matter how
big—is immune to a cyber attack.
Apple has released little detail about the situation, which may mean they have discovered a larger, fundamental
issue with their developing infrastructure. Especially since the company response was to completely overhaul its
systems and databases—a fairly substantial reaction.
The magnitude of the company allowed Apple to handle its situation well. The attacker managed to download
some personal information, but by no means did the attacker have unfettered access to Apple resources. Nor was
the attacker capable of logging into servers deep inside the Apple network or capable of launching or injecting
malware into App Store applications (that we know of). Apple has been safe from such large-scale, high-profile
breaches for a long time because of the company’s vast knowledge and experience in cyber protection.
For organizations less versed in building a wall of defense against outside hacks, there are three things they can
do now to help prevent such a breach in the future.
• Compartmentalize your data. This is the equivalent of storing records in locked file cabinets and
only giving people access on a need-to-know basis. It is an architectural decision—keep your login information
away from the blogs, and separate that from the payment information. Encrypt everything, and stick a firewall in
front of these data resources.
• Perform behavioral analysis on network traffic. 100,000 customer data records coming
from a sign-on database is an anomalous traffic pattern, which can be detected manually (humans are great
anomaly detectors!) or with software packages. Computers communicate in very predictable patterns, these
patterns can be profiled, and anomalies can be detected quickly.
• Hack yourself. Although audits and Red Team attempts often miss the more subtle attack vectors, an
outside team can often pinpoint small vulnerabilities that might allow an attacker access to your systems and
data. Place the audit or Red Team in front of the developers first, and force them to be honest. Pride should not
stand in the way of securing your customers’ data.
It’s important to remember that 100% security is only possible if you have no data to protect. The question we
should be asking is: What are the best steps one can take to ensure as close to 100% protection as possible, no
matter how much data needs to be protected?
Contact ProQSys
16 Cavendish Court
Lebanon, NH 03766
(603) 727-4477
sales@flowtraq.com
FlowTraq Trial
Free 14-Day Trial of FlowTraq at www.flowtraq.com/trial

More Related Content

Viewers also liked

Viewers also liked (13)

Presentación CISTI 2016 "Distinciones Conceptuales para la Trazabilidad de l...
Presentación CISTI 2016 "Distinciones Conceptuales para la Trazabilidad de l...Presentación CISTI 2016 "Distinciones Conceptuales para la Trazabilidad de l...
Presentación CISTI 2016 "Distinciones Conceptuales para la Trazabilidad de l...
 
2012 online portfolio
2012 online portfolio2012 online portfolio
2012 online portfolio
 
Oficio curso virtual robotica
Oficio curso virtual roboticaOficio curso virtual robotica
Oficio curso virtual robotica
 
BTX Article
BTX Article BTX Article
BTX Article
 
Corel Draw x5 - Diseño Grafico
Corel Draw x5 - Diseño GraficoCorel Draw x5 - Diseño Grafico
Corel Draw x5 - Diseño Grafico
 
African American Personality
African American PersonalityAfrican American Personality
African American Personality
 
Hacking, The Mr. Robot Way
Hacking, The Mr. Robot WayHacking, The Mr. Robot Way
Hacking, The Mr. Robot Way
 
African americanculture&worldview
African americanculture&worldviewAfrican americanculture&worldview
African americanculture&worldview
 
(The Secret Weapon Tutorial Part 2) Email + Evernote + GTD: A no BS approach ...
(The Secret Weapon Tutorial Part 2) Email + Evernote + GTD: A no BS approach ...(The Secret Weapon Tutorial Part 2) Email + Evernote + GTD: A no BS approach ...
(The Secret Weapon Tutorial Part 2) Email + Evernote + GTD: A no BS approach ...
 
Wheel of life
Wheel of lifeWheel of life
Wheel of life
 
Η Γ' τάξη σε αποστακτηριο στο Υψηλό
Η Γ' τάξη σε αποστακτηριο στο ΥψηλόΗ Γ' τάξη σε αποστακτηριο στο Υψηλό
Η Γ' τάξη σε αποστακτηριο στο Υψηλό
 
The Beginners Guide to Breathtaking Presentation with Prezi
The Beginners Guide to Breathtaking Presentation with PreziThe Beginners Guide to Breathtaking Presentation with Prezi
The Beginners Guide to Breathtaking Presentation with Prezi
 
La mona lisa (2)
La mona lisa (2)La mona lisa (2)
La mona lisa (2)
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 

Preventing breaches like the apple developer website hack

  • 1. Preventing Breaches Like the Apple Developer Website Hack The highly publicized Apple Developer website breach, which left upwards of 100,000 records with personal names, mailing addresses and emails potentially accessed by intruders, shows that no company—no matter how big—is immune to a cyber attack. Apple has released little detail about the situation, which may mean they have discovered a larger, fundamental issue with their developing infrastructure. Especially since the company response was to completely overhaul its systems and databases—a fairly substantial reaction. The magnitude of the company allowed Apple to handle its situation well. The attacker managed to download some personal information, but by no means did the attacker have unfettered access to Apple resources. Nor was the attacker capable of logging into servers deep inside the Apple network or capable of launching or injecting malware into App Store applications (that we know of). Apple has been safe from such large-scale, high-profile breaches for a long time because of the company’s vast knowledge and experience in cyber protection. For organizations less versed in building a wall of defense against outside hacks, there are three things they can do now to help prevent such a breach in the future. • Compartmentalize your data. This is the equivalent of storing records in locked file cabinets and only giving people access on a need-to-know basis. It is an architectural decision—keep your login information away from the blogs, and separate that from the payment information. Encrypt everything, and stick a firewall in front of these data resources. • Perform behavioral analysis on network traffic. 100,000 customer data records coming from a sign-on database is an anomalous traffic pattern, which can be detected manually (humans are great anomaly detectors!) or with software packages. Computers communicate in very predictable patterns, these patterns can be profiled, and anomalies can be detected quickly. • Hack yourself. Although audits and Red Team attempts often miss the more subtle attack vectors, an outside team can often pinpoint small vulnerabilities that might allow an attacker access to your systems and data. Place the audit or Red Team in front of the developers first, and force them to be honest. Pride should not stand in the way of securing your customers’ data. It’s important to remember that 100% security is only possible if you have no data to protect. The question we should be asking is: What are the best steps one can take to ensure as close to 100% protection as possible, no matter how much data needs to be protected? Contact ProQSys 16 Cavendish Court Lebanon, NH 03766 (603) 727-4477 sales@flowtraq.com FlowTraq Trial Free 14-Day Trial of FlowTraq at www.flowtraq.com/trial