How Minor Data Breaches Turn Into Major Problems

  • By

    Ericka Chickowski

    | Posted 2011-03-21
Hackers Will Use Those Database Weaknesses Elsewhere In The Infrastructure

Hackers Will Use Those Database Weaknesses Elsewhere In The Infrastructure

The first foray into your email database may be just the tip of the iceberg for hackers' future attacks. They could potentially use access into a less sensitive database as a toe-hold to gain access into other more important databases.
Many organizations sweat bullets at the thought of a data breach exposing sensitive personally identifiable information (PII) that they've been entrusted to protect. But when it comes to protecting other information such as emal addresses and passwords that can be reset, many within IT are not so concerned - after all, these morsels of information are not usually regulated the same way social security numbers and credit card digits are. However, breaches that expose these kinds of information have the potential to do a lot of organizational damage as well. And they happen all the time. Consider the Gawker breach reported in December, which exposed 1.3 million usernames and passwords and caused the media outlet a severe hit to its reputation. Similarly, in December email marketer Silverpop experienced an email database breach that affected hundreds of large customers such as McDonald's and Walgreens. Here's why 'inconsequential' breaches are actually a big deal after all.

Submit a Comment

Loading Comments...

By submitting your information, you agree that channelinsider.com may send you channelinsider offers via email, phone and text message, as well as email offers about other products and services that channelinsider believes may be of interest to you. channelinsider will process your information in accordance with the Quinstreet Privacy Policy.

Thanks for your registration, follow us on our social networks to keep up-to-date