This month’s list is a little earlier than usual, so I expect that I’ll be updating it more than usual over the remainder of the month. Keep revisiting it to see new additions.
It’s been an interesting month. While there haven’t been any large-scale data breaches (that we’re aware of) so far this month, there have been several data dumps posted online from previous breaches.
One of these dumps included the 51 million iMesh passwords that were stolen from a breach back in September 2013. Now, if the world’s population practised good password security and used unique passwords for every online account they have, this wouldn’t be much of an issue, especially since iMesh no longer exists. However, password reuse is as common as the air, and those who had an iMesh account in 2013 may want to consider changing their login credentials on sites where they’ve used the same password.
At the time of publication, I have the number of known leaked records this month (that’s including those that have just come to light) at 289,526,590.
Fighting back against cyber crime
A key takeaway from this month’s list is that cyber crime does not wait. As the EU referendum looms, organisations are holding back on all forms of spending and waiting to see if the UK will be leaving the European Union. This is far from smart
Brexit or no Brexit, cyber crime isn’t going to pause for a referendum.
To encourage organisations to continue the fight against cyber crime, IT Governance is offering 25% off two consultancy services if you purchase before referendum day – 23 June. We also have some training courses with 20% off:
This three-day Cyber Health Check combines on-site consultancy and audit with remote vulnerability assessments to assess your cyber risk exposure and identify a practical route to minimise the risk.
This expert, in-person review of your information security arrangements against the requirements of ISO/IEC 27001:2013 is ideal for organisations seeking to develop a business case and secure budget approval for implementing an ISO 27001-aligned ISMS.
With information security skills still in short supply, we’re doing our bit to help organisations focus on their internal training programmes by offering 20% off a selected number of IT Governance training courses for new direct customer bookings made between 9 May 2016 and 23 June 2016.
Trends and traits of data breaches
To help you understand the trends and traits of data breaches, what they are, how and why they occur, and what you can do to avoid suffering a similar fate, take a look at our book of the month: Managing Information Security Breaches – Studies from real life by Michael Krausz.
This thought-provoking guide details how breaches can be treated and the direction you should take if you’ve been affected.