Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Morgan Hunt data leak, expert commentary on what to do going forward

July 2022 by Matt Aldridge, Principal Solutions Consultant at OpenText Security Solutions

In response to the UK recruitment agency, Morgan Hunt, experiencing a data breach, please see commentary from Matt Aldridge, Principal Solutions Consultant at OpenText Security Solutions on what businesses need to do in order to limit such attacks going forward. The comment from Matt Aldridge, Principal Solutions Consultant at OpenText Security Solutions:

“In light of Morgan Hunt experiencing a data breach involving a third-party company, it really is a wakeup call for all businesses and highlights the need to look at themselves and the entirety of their supply chain for security weak links.

The fact that information like email address, date of birth and even maiden names have been stolen – make a potent potential package for identity theft. Sensitive information such as the customer data stolen in this attack is likely to be very valuable to organised criminals.

Businesses of all sizes need to prioritise the security of critical and personal information, as you’re never too small or large to be a target. The key learning lesson here is making sure that not only are your own security processes up to scratch, but also that any third party dealing with sensitive data or accessing your network does so in the right way too.

To limit the impact of these attacks, businesses that hold private information should ensure they have clearly defined security policies and procedures to avoid any leak of information. This starts with employee education, which underscores all effective cyber resilience and data protection strategies. Security awareness training programmes can now inform and educate employees on the latest threats in real-time, including information security, social engineering, malware, and industry-specific compliance topics. Attack simulations can also be used to automatically send users for re-education should any training issues be identified.”


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts