<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security &#8211; GDPR Register | Compliance tool for privacy experts</title>
	<atom:link href="https://www.gdprregister.eu/news-category/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.gdprregister.eu</link>
	<description>GDPR Register ✅- Cost-effective solution for complying with the GDPR. Regulator Ready reporting available in all EU languages. Sign up for 14-day trial!</description>
	<lastBuildDate>Fri, 18 Dec 2020 09:00:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.2.3</generator>

<image>
	<url>https://www.gdprregister.eu/wp-content/uploads/2018/04/favicon-96x96.png</url>
	<title>Cyber Security &#8211; GDPR Register | Compliance tool for privacy experts</title>
	<link>https://www.gdprregister.eu</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>SolarWinds hackers breach US nuclear weapons agency</title>
		<link>https://www.gdprregister.eu/news/solarwinds-nuclear-breach/</link>
				<comments>https://www.gdprregister.eu/news/solarwinds-nuclear-breach/#respond</comments>
				<pubDate>Fri, 18 Dec 2020 09:00:54 +0000</pubDate>
		<dc:creator><![CDATA[Aleksander Uibo]]></dc:creator>
		
		<guid isPermaLink="false">https://www.gdprregister.eu/?post_type=news&#038;p=11189</guid>
				<description><![CDATA[<p>Hackers accessed systems at the National Nuclear Security Administration, which maintains the U.S. nuclear weapons stockpile. The Energy Department and National Nuclear Security Administration, which maintains the U.S. nuclear weapons stockpile, have evidence that hackers accessed their networks as part of an extensive espionage operation that has affected at least half a dozen federal agencies, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/solarwinds-nuclear-breach/">SolarWinds hackers breach US nuclear weapons agency</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></description>
								<content:encoded><![CDATA[<section class="page-content__row page-content__row--story">
<div class="container container--story story-layout--fluid-fixed">
<div class="container__column container__column--story summary-middle">
<div class="container__row container__row--story story-layout--fixed-fluid">
<div class="container__column container__column--story">
<section class="media-item media-item--story media-item--story-lead">
<div class="media-item__summary size--medium">
<h1 class="dek">Hackers accessed systems at the National Nuclear Security Administration, which maintains the U.S. nuclear weapons stockpile.</h1>
</div>
</section>
</div>
</div>
<div class="container__row container__row--story story-layout--fixed-fluid">
<div class="container__column container__column--story center-horizontally">
<div class="story-text">
<p class=" story-text__paragraph">The Energy Department and National Nuclear Security Administration, which maintains the U.S. nuclear weapons stockpile, have evidence that hackers accessed their networks as part of an extensive espionage operation that has affected at least half a dozen federal agencies, officials directly familiar with the matter said.</p>
<p class=" story-text__paragraph">On Thursday, DOE and NNSA officials began coordinating notifications about the breach to their congressional oversight bodies after being briefed by Rocky Campione, the chief information officer at DOE.</p>
<p class=" story-text__paragraph">They found suspicious activity in networks belonging to the Federal Energy Regulatory Commission (FERC), Sandia and Los Alamos national laboratories in New Mexico and Washington, the Office of Secure Transportation at NNSA, and the Richland Field Office of the DOE.</p>
</div>
</div>
</div>
</div>
</div>
</section>
<section class="page-content__row page-content__row--story main-section" data-content-section="5">
<div class="container container--story story-layout--fixed-fluid">
<div class="container__column container__column--story">
<div class="container__row container__row--story story-layout--fluid-fixed">
<div class="container__column container__column--story center-horizontally">
<div class="story-text">
<p class=" story-text__paragraph" data-content-child-index="0-0">The hackers have been able to do more damage at FERC than the other agencies, and officials there have evidence of highly malicious activity, the officials said, but did not elaborate.</p>
<p class=" story-text__paragraph" data-content-child-index="0-1">The officials said that the Cybersecurity and Infrastructure Security Agency, which has been helping to manage the federal response to the broad hacking campaign, indicated to FERC this week that CISA was overwhelmed and might not be able to allocate the necessary resources to respond. DOE will therefore be allocating extra resources to FERC to help investigate the hack, even though FERC is a semi-autonomous agency, the officials said.</p>
<p class=" story-text__paragraph" data-content-child-index="0-2">Several top officials from CISA, including its former director Christopher Krebs, have either been pushed out by the Trump administration or resigned in recent weeks.</p>
<p class=" story-text__paragraph" data-content-child-index="0-3">Federal investigators have been combing through networks in recent days to determine what hackers had been able to access and/or steal, and officials at DOE still don’t know whether the attackers were able to access anything, the people said, noting that the investigation is ongoing and they may not know the full extent of the damage “for weeks.”</p>
<p class=" story-text__paragraph" data-content-child-index="0-3">Shaylyn Hynes, a DOE spokesperson, said that an ongoing investigation into the hack has found that the perpetrators did not get into critical defense systems.</p>
<p class=" story-text__paragraph" data-content-child-index="0-5">&#8220;At this point, the investigation has found that the malware has been isolated to business networks only, and has not impacted the mission essential national security functions of the department, including the National Nuclear Security Administration,&#8221; Hynes said in a statement. &#8220;When DOE identified vulnerable software, immediate action was taken to mitigate the risk, and all software identified as being vulnerable to this attack was disconnected from the DOE network.”</p>
</div>
</div>
<div class="container__column container__column--story center-vertically right-zone hide-under-small" aria-hidden="true">
<div id="aside-0" class="story-enhancement" data-aside-index="0">
<div class="ad is-loaded" aria-label="Advertisement">
<div id="pol-04-medium-101" class="ad-slot" aria-hidden="true" data-google-query-id="CMTuvYCS1-0CFQeGGAodixIBVw">
<div id="google_ads_iframe_/6326/politico/policy-cybersecurity_9__container__">The attack on DOE is the clearest sign yet that the hackers were able to access the networks belonging to a core part of the U.S. national security enterprise. The hackers are believed to have gained access to the federal agencies’ networks by compromising the software company SolarWinds, which sells IT management products to hundreds of government and private-sector clients.</div>
<div></div>
<div>Read more: <a href="https://www.politico.com/news/2020/12/17/nuclear-agency-hacked-officials-inform-congress-447855">Politico</a></div>
<div></div>
<div>Photo by Markus Spiske on Unsplash</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</section>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/solarwinds-nuclear-breach/">SolarWinds hackers breach US nuclear weapons agency</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.gdprregister.eu/news/solarwinds-nuclear-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Survey result: 45% of businesses faced a data breach in last 12 months</title>
		<link>https://www.gdprregister.eu/news/data-breach-2020/</link>
				<comments>https://www.gdprregister.eu/news/data-breach-2020/#respond</comments>
				<pubDate>Wed, 11 Nov 2020 08:03:01 +0000</pubDate>
		<dc:creator><![CDATA[Aleksander Uibo]]></dc:creator>
		
		<guid isPermaLink="false">https://www.gdprregister.eu/?post_type=news&#038;p=11024</guid>
				<description><![CDATA[<p>The data breach report is based on a survey conducted by Kaspersky and B2B International on September 30, 2020. Researchers interviewed 4,179 businesses globally, with 50 and up to 4,999 employees. Surveyed companies are from the following 5 industries: financial services, government, manufacturing, IT and telecommunications, retail and wholesale. Analysis reveals that out of the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/data-breach-2020/">Survey result: 45% of businesses faced a data breach in last 12 months</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>The data breach report is based on a survey conducted by Kaspersky and B2B International on September 30, 2020. Researchers interviewed 4,179 businesses globally, with 50 and up to 4,999 employees. Surveyed companies are from the following 5 industries: financial services, government, manufacturing, IT and telecommunications, retail and wholesale.</p>
<p>Analysis reveals that out of the 4,179 businesses, 45% lost data to hackers in the past 12 months. IT and telecommunication companies saw breaches most often, with 53% of companies losing data. IT and telecommunication businesses often have customers&#8217; financial information, in addition to other sensitive data, such as private conversations, social security numbers, and addresses.</p>
<p>Next up is the retail and wholesale industry, in which 52% of businesses experienced a data breach in the last year. Such cybersecurity incidents in retail businesses can damage the brand’s reputation, which leads to losing numerous customers, especially those who are privacy-conscious.</p>
<p>Third on the list is financial services, where exactly half of the respondents stated that their business lost sensitive data to fraudsters. Breaches in the financial industry are a huge concern since an unnoticed leak allows cybercriminals to drain the victims&#8217; bank accounts.</p>
<p>Companies in the government sector are not an exception to the rule, as 46% of them had a data leak in the last 12 months. Attacks aimed at the government are more often than not supported by foreign authorities, whose aim is to obtain political and military information.</p>
<p>Finally, manufacturing and industrial companies experienced data breaches least often, but still a significant amount, at 43%. The danger is mostly to the businesses themselves, as competitors hire hackers to steal inside data which would destroy the competitive advantage the victim company had.</p>
<h2>Most common threats overall</h2>
<p>Shockingly, as many as 78% of surveyed businesses reported some kind of a cyber threat in their systems last year. On average, a cyber incident caused $312,117 in damages.</p>
<p>Besides data breaches, <strong>viruses and malware</strong> are the most common threats detected. Over 43% of companies experienced viruses and malware in their internal network in the last 12 months.</p>
<p>There is a wide variety of viruses and malware created by hackers. Nonetheless, the overwhelming majority of them are created to make money illegally.</p>
<p>Also, 39% of companies reported that <strong>bring-your-own-devices (BYOD)</strong> had been infected by malware as well. Some companies provide all the needed equipment for work, while others require employees to bring their own computers and mobile devices. Company-owned equipment usually has at-least some security measures in place as soon as the employee gets the device. However, that is not the case with BYOD equipment. There is no guarantee that employees update their computer software, which leaves vulnerabilities that hackers can abuse.</p>
<p>The fourth most common cyber threat in businesses globally is <strong>crypto-malware and <a href="https://www.gdprregister.eu/gdpr/ransomware-gdpr/">ransomware</a></strong>. Crypto-malware is a type of ransomware that encrypts a user&#8217;s files and demands a ransom. Fraudsters can also steal the data, delete it from the company’s database, and request a ransom (usually in Bitcoin) to get back the data. Unfortunately, companies often choose to pay the ransom to avoid damaging their public reputation, hence further encouraging such attacks.</p>
<p><strong>DDoS attacks</strong> are one of the most known types of cyberattacks, which affected 34% of companies globally in the last 12 months. DDoS is short for Distributed Denial of Service, and it is an attack used to crash a service or a website, making it temporarily inaccessible to its users. Although individuals suffering from DDoS attacks, typically, cybercriminals target services instead. They often attack services hosted on high-profile web servers, like banks or credit card payment gateways. Revenge, blackmail, and activism are the most common reasons behind the performed attacks.</p>
<p>Source: <a href="https://atlasvpn.com/blog/45-of-businesses-faced-a-data-breach-in-last-12-months">atlasvpn</a></p>
<p>Photo by Kevin Ku on Unsplash</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/data-breach-2020/">Survey result: 45% of businesses faced a data breach in last 12 months</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.gdprregister.eu/news/data-breach-2020/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>ICO fines Marriott International Inc £18.4million for failing to keep customers’ personal data secure</title>
		<link>https://www.gdprregister.eu/news/ico-fine-marriot/</link>
				<comments>https://www.gdprregister.eu/news/ico-fine-marriot/#respond</comments>
				<pubDate>Mon, 02 Nov 2020 09:24:33 +0000</pubDate>
		<dc:creator><![CDATA[Aleksander Uibo]]></dc:creator>
		
		<guid isPermaLink="false">https://www.gdprregister.eu/?post_type=news&#038;p=10926</guid>
				<description><![CDATA[<p>The ICO has fined Marriott International Inc £18.4million for failing to keep millions of customers’ personal data secure. Marriott estimates that 339 million guest records worldwide were affected following a cyber-attack in 2014 on Starwood Hotels and Resorts Worldwide Inc. The attack, from an unknown source, remained undetected until September 2018, by which time the company [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/ico-fine-marriot/">ICO fines Marriott International Inc £18.4million for failing to keep customers’ personal data secure</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></description>
								<content:encoded><![CDATA[<h1>The ICO has <a title="Marriott International Inc" href="https://ico.org.uk/action-weve-taken/enforcement/marriott-international-inc/" data-id="44220">fined Marriott International Inc £18.4million for failing to keep millions of customers’ personal data secure</a>.</h1>
<p>Marriott estimates that 339 million guest records worldwide were affected following a cyber-attack in 2014 on Starwood Hotels and Resorts Worldwide Inc. The attack, from an unknown source, remained undetected until September 2018, by which time the company had been acquired by Marriott.</p>
<p>The personal data involved differed between individuals but may have included names, email addresses, phone numbers, unencrypted passport numbers, arrival/departure information, guests’ VIP status and loyalty programme membership number.</p>
<p>The precise number of people affected is unclear as there may have been multiple records for an individual guest. Seven million guest records related to people in the UK.</p>
<p>The ICO’s investigation found that there were failures by Marriott to put appropriate technical or organisational measures in place to protect the personal data being processed on its systems, as required by the General Data Protection Regulation (GDPR).</p>
<p>Information Commissioner, Elizabeth Denham, said:</p>
<blockquote><p>”Personal data is precious and businesses have to look after it. Millions of people’s data was affected by Marriott’s failure; thousands contacted a helpline and others may have had to take action to protect their personal data because the company they trusted it with had not.</p>
<p>“When a business fails to look after customers’ data, the impact is not just a possible fine, what matters most is the public whose data they had a duty to protect.”</p></blockquote>
<p>The ICO’s investigation traced the cyber-attack back to 2014, but the penalty only relates to the breach from 25 May 2018, when new rules under the GDPR came into effect.</p>
<p>Because the breach happened before the UK left the EU, the ICO investigated on behalf of all EU authorities as lead supervisory authority under the GDPR. The penalty and action have been approved by the other <a href="https://www.gdprregister.eu/gdpr/dpa-gdpr/">EU DPAs</a> through the GDPR’s cooperation process.</p>
<p>In July 2019, the ICO issued Marriott with a notice of intent to fine. As part of the regulatory process, the ICO considered representations from Marriott, the steps Marriott took to mitigate the effects of the incident and the economic impact of COVID-19 on their business before setting a final penalty.</p>
<h3>Details of the cyber attack</h3>
<p>In 2014, an unknown attacker installed a piece of code known as a `web shell’ onto a device in the Starwood system giving them the ability to access and edit the contents of this device remotely.</p>
<p>This access was exploited in order to install malware, enabling the attacker to have remote access to the system as a privileged user. As a result, the attacker would have had unrestricted access to the relevant device, and other devices on the network to which that account would have had access.</p>
<p>Further tools were installed by the attacker to gather login credentials for additional users within the Starwood network. With these credentials, the database storing reservation data for Starwood customers was accessed and exported by the attacker.</p>
<p>The ICO acknowledges that Marriott acted promptly to contact customers and the ICO. It also acted quickly to mitigate the risk of damage suffered by customers, and has since instigated a number of measures to improve the security of its systems.</p>
<p>Source: ICO</p>
<p>Photo by ActionVance on Unsplash</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/ico-fine-marriot/">ICO fines Marriott International Inc £18.4million for failing to keep customers’ personal data secure</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.gdprregister.eu/news/ico-fine-marriot/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>ICO fines British Airways £20m for data breach affecting more than 400,000 customers</title>
		<link>https://www.gdprregister.eu/news/british-airways-fine/</link>
				<comments>https://www.gdprregister.eu/news/british-airways-fine/#respond</comments>
				<pubDate>Fri, 16 Oct 2020 11:14:12 +0000</pubDate>
		<dc:creator><![CDATA[Aleksander Uibo]]></dc:creator>
		
		<guid isPermaLink="false">https://www.gdprregister.eu/?post_type=news&#038;p=10782</guid>
				<description><![CDATA[<p>The Information Commissioner’s Office (ICO) has fined British Airways (BA) £20m for failing to protect the personal and financial details of more than 400,000 of its customers. An ICO investigation found the airline was processing a significant amount of personal data without adequate security measures in place. This failure broke data protection law and, subsequently, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/british-airways-fine/">ICO fines British Airways £20m for data breach affecting more than 400,000 customers</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></description>
								<content:encoded><![CDATA[<h1>The Information Commissioner’s Office (ICO) has <a href="https://ico.org.uk/action-weve-taken/enforcement/british-airways/" title="British Airways" data-id="44044">fined British Airways (BA) £20m for failing to protect the personal and financial details of more than 400,000 of its customers</a>.</h1>
<p>An ICO investigation found the airline was processing a significant amount of personal data without adequate security measures in place. This failure broke data protection law and, subsequently, BA was the subject of a cyber-attack during 2018, which it did not detect for more than two months.</p>
<p>ICO investigators found BA ought to have identified weaknesses in its security and resolved them with security measures that were available at the time.</p>
<p>Addressing these security issues would have prevented the 2018 cyber-attack being carried out in this way, investigators concluded.</p>
<p>Information Commissioner Elizabeth Denham said: “People entrusted their personal details to BA and BA failed to take adequate measures to keep those details secure.</p>
<p>“Their failure to act was unacceptable and affected hundreds of thousands of people, which may have caused some anxiety and distress as a result. That’s why we have issued BA with a £20m fine – our biggest to date.</p>
<p>“When organisations take poor decisions around people’s personal data, that can have a real impact on people’s lives. The law now gives us the tools to encourage businesses to make better decisions about data, including investing in up-to-date security.”</p>
<p>Because the BA breach happened in June 2018, before the UK left the EU, the ICO investigated on behalf of all EU authorities as lead supervisory authority under the GDPR. The penalty and action have been approved by the other EU DPAs through the GDPR’s cooperation process.</p>
<p>In June 2019 the ICO issued BA with a notice of intent to fine. As part of the regulatory process the ICO considered both representations from BA and the economic impact of COVID-19 on their business before setting a final penalty.</p>
<h3>Details of the cyber attack</h3>
<p>The attacker is believed to have potentially accessed the personal data of approximately 429,612 customers and staff. This included names, addresses, payment card numbers and CVV numbers of 244,000 BA customers.</p>
<p>Other details thought to have been accessed include the combined card and CVV numbers of 77,000 customers and card numbers only for 108,000 customers.</p>
<p>Usernames and passwords of BA employee and administrator accounts as well as usernames and PINs of up to 612 BA Executive Club accounts were also potentially accessed.</p>
<h3>Failure to prevent the attack</h3>
<p>There were numerous measures BA could have used to mitigate or prevent the risk of an attacker being able to access the BA network. These include:</p>
<ul>
<li>limiting access to applications, data and tools to only that which are required to fulfil a user’s role</li>
<li>undertaking rigorous testing, in the form of simulating a cyber-attack, on the business’ systems;</li>
<li>protecting employee and third party accounts with multi-factor authentication.</li>
</ul>
<p>Additional mitigating measures BA could have used are <a href="https://ico.org.uk/action-weve-taken/enforcement/british-airways/" title="British Airways" data-id="44044">listed in the penalty notice</a>.</p>
<p>None of these measures would have entailed excessive cost or technical barriers, with some available through the Microsoft Operating System used by BA.</p>
<p>Since the attack, BA has made considerable improvements to its IT security.</p>
<h3>Lack of awareness of the attack</h3>
<p>ICO investigators found that BA did not detect the attack on 22 June 2018 themselves but were alerted by a third party more than two months afterwards on 5 September. Once they became aware BA acted promptly and notified the ICO.</p>
<p>It is not clear whether or when BA would have identified the attack themselves. This was considered to be a severe failing because of the number of people affected and because any potential financial harm could have been more significant.</p>
<p>Original article: <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2020/10/ico-fines-british-airways-20m-for-data-breach-affecting-more-than-400-000-customers/">ICO</a></p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/british-airways-fine/">ICO fines British Airways £20m for data breach affecting more than 400,000 customers</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.gdprregister.eu/news/british-airways-fine/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Morgan Stanley Fined $60 Million for Data Protection Mishaps</title>
		<link>https://www.gdprregister.eu/news/morgan-sanley-fined/</link>
				<comments>https://www.gdprregister.eu/news/morgan-sanley-fined/#respond</comments>
				<pubDate>Wed, 14 Oct 2020 08:21:15 +0000</pubDate>
		<dc:creator><![CDATA[Aleksander Uibo]]></dc:creator>
		
		<guid isPermaLink="false">https://www.gdprregister.eu/?post_type=news&#038;p=10735</guid>
				<description><![CDATA[<p>The Office of the Comptroller of the Currency has fined Morgan Stanley $60 million for the investment bank&#8217;s failure to properly oversee the decommissioning of several data centers, putting customer data at risk of exposure. When Morgan Stanley decommissioned two data centers related to the bank&#8217;s wealth management business in 2016, the company did not properly oversee [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/morgan-sanley-fined/">Morgan Stanley Fined $60 Million for Data Protection Mishaps</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></description>
								<content:encoded><![CDATA[<h1>The <a target="_blank" href="https://www.occ.gov/static/enforcement-actions/ea2020-058.pdf" rel="noopener noreferrer">Office of the Comptroller of the Currency </a>has fined Morgan Stanley $60 million for the investment bank&#8217;s failure to properly oversee the decommissioning of several data centers, putting customer data at risk of exposure.</h1>
<p>When <a href="https://www.morganstanley.com/">Morgan Stanley</a> decommissioned two data centers related to the bank&#8217;s wealth management business in 2016, the company did not properly oversee the third-party company responsible for ensuring that all personal data was removed, according to the OCC, which is part of the U.S. Treasury Department.</p>
<p>&#8220;In connection with the decommissioning, the bank, among other things, failed to effectively assess or address the risks associated with the decommissioning of its hardware, failed to adequately assess the risk of using third-party vendors, including subcontractors, and failed to maintain an appropriate inventory of customer data stored on the devices,&#8221; according to an OCC report.</p>
<p>OCC also says Morgan Stanley neglected to exercise proper oversight while retiring certain network devices, such as computer servers, at a local branch in 2019.</p>
<p>A spokesperson for Morgan Stanley says that the company does not believe that any customer data has ever been accessed or misused, and the bank continues to monitor the situation.</p>
<p>&#8220;Moreover, we have instituted enhanced security procedures, including continuous fraud monitoring, and will continue to strengthen the controls that we have in place to protect our clients&#8217; information,&#8221; the spokesperson says.</p>
<h2>Lawsuit Filed as Well</h2>
<p>The OCC fine come about a month after attorneys representing Morgan Stanley customers filed a lawsuit against the bank, claiming it failed to properly safeguard personally identifiable information when the company discarded equipment (see: <a href="https://www.bankinfosecurity.com/morgan-stanley-hit-5-million-data-breach-suit-a-14927"><i>Morgan Stanley Hit With $5 Million Data Breach Suit </i></a>).</p>
<p>Morgan Stanley confirmed these incidents in data breach notification letters sent to the <a target="_blank" href="https://oag.ca.gov/system/files/MS%20-%20Template%20CA%20Consumer%20Notice.pdf" rel="noopener noreferrer">California attorney general</a> and other states&#8217; attorneys general in July. The letter notes the data exposed may have included account names and numbers (at Morgan Stanley and any linked bank accounts), Social Security number, passport number, contact information, date of birth, asset value and holdings data. It says it offered victims two years of prepaid credit monitoring services.</p>
<p>The lawsuit involves complaints from about 100 Morgan Stanley customers who claim they were affected by the company&#8217;s practices.</p>
<h2>Protecting Data</h2>
<p>One reason why the OCC likely fined Morgan Stanely is that the bank failed to properly assess the data it was protecting, says Mark Rasch, an attorney with the law firm of Kohrman, Jackson &amp; Krantz, who is not involved in the case.</p>
<p>&#8220;The entities that are the custodians of the data don&#8217;t understand the value of the data they are protecting. If this were a bank vault, they would understand,&#8221; Rasch tells Information Security Media Group.</p>
<p>Morgan Stanley may not have had a complete checklist in place to help ensure it properly disposed of decommissioned computers, Rasch says.</p>
<p>Richard Santalesa, a technology and data privacy attorney at SmartEdgeLaw Group, a boutique law firm with offices in New York and Connecticut, notes that the size of the fine likely reflects that these similar incidents happened only three years apart and that the OCC wanted to make a point about how large financial institutions need to oversee personally identifiable information, even when it&#8217;s left to third parties to handle.</p>
<p>&#8220;I&#8217;m sure this latest action has made the desks of every CISO and <a href="https://www.gdprregister.eu/gdpr/data-protection-officer/">chief privacy officer</a> in the financial ecosphere,&#8221; Santalesa says. &#8220;I know that if I were sitting in that C-seat, I&#8217;d immediately add a &#8216;data destruction/deletion review&#8217; agenda item to my next department meeting.&#8221;</p>
<h2>Other Recent OCC Action</h2>
<p>The fine that the OCC levied against Morgan Stanley is the second the agency has brought against a major financial intuition following a cyber incident.</p>
<p>In August, the OCC fined Capital One $80 million, citing numerous security shortfalls before the 2019 data breach that exposed the financial and personal information of over 100 million individuals in the U.S. and Canada (see: <a href="https://www.bankinfosecurity.com/capital-one-fined-80-million-over-2019-breach-a-14787"><i>Capital One Fined $80 Million Over 2019 Breach </i></a>).</p>
<p>Original article: <a href="https://www.bankinfosecurity.com/morgan-stanley-fined-60-million-for-data-protection-mishaps-a-15158">BANKINFOSECURITY</a></p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/morgan-sanley-fined/">Morgan Stanley Fined $60 Million for Data Protection Mishaps</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.gdprregister.eu/news/morgan-sanley-fined/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>World’s Biggest Data Breach &#8211; Over 770 Million User Accounts and Passwords Leaked</title>
		<link>https://www.gdprregister.eu/news/biggest-data-breach/</link>
				<comments>https://www.gdprregister.eu/news/biggest-data-breach/#respond</comments>
				<pubDate>Fri, 18 Jan 2019 07:33:22 +0000</pubDate>
		<dc:creator><![CDATA[Sara Laine]]></dc:creator>
		
		<guid isPermaLink="false">https://www.gdprregister.eu/?post_type=news&#038;p=7537</guid>
				<description><![CDATA[<p>Australian data protection expert Troy Hunt has exposed the biggest single data breach known so far. During the recent data breach, nearly 773 million email addresses’ passwords leaked. This data was posted in a data collection called Collection #1. The raw form of the data comprises 2,7 billion rows of email addresses and passwords.  Furthermore, the passwords [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/biggest-data-breach/">World’s Biggest Data Breach &#8211; Over 770 Million User Accounts and Passwords Leaked</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>Australian data protection expert Troy Hunt has exposed the biggest single data breach known so far. During the recent data breach, nearly 773 million email addresses’ passwords leaked. This data was posted in a data collection called Collection #1. The raw form of the data comprises 2,7 billion rows of email addresses and passwords.  Furthermore, the passwords are in written form, which means that everyone is able to read them. This makes the data breach particularly serious.</p>
<p>The data protection expert, who exposed the breach, build a site called <strong><a href="https://haveibeenpwned.com">Have I Been Pwned</a></strong><a href="https://haveibeenpwned.com">,</a> where internet users can c<span class="Apple-converted-space">heck, whether if users account that has been compromised in a data breach.  In the same site, users can check, whether the <strong><a href="https://haveibeenpwned.com/Passwords">password</a> </strong>has previously appeared in a data breach and should never be used. </span></p>
<blockquote><p><b>LEARNING TIP: </b>Firstly, it is important to <b>change all the passwords</b> from your email accounts and start using<b> two-phase authentication</b>. Secondly, it is crucial to make your passwords as secure as possible. Many use similar passwords to several different accounts with only minor variations.</p>
<p>Modern computers are able to break simple and short passwords within minutes, even if using capital letters, numbers and special characters. <b>The safest passwords should contain at least 15 characters and could even form a sentence, </b>sentence is also easier to remember compared to random letters and characters<b>.</b> Never store passwords at your own computer, as malware is able to collect them.</p>
<p>Consider using <b>password management programs</b>, where you can save your passwords or the program can create random passwords for you. <b>Most commonly used programs: Dashlane, F-Secure Key, Keychain, Keepass, Password Safe, Lastpass and 1password.</b></p></blockquote>
<p>&nbsp;</p>
<p><a href="https://www.gdprregister.eu/gdpr/ransomware-gdpr/"><strong>Read more on cyber attacks</strong></a> and see the <strong><a href="https://www.gdprregister.eu/news/angela-merkel-hacked/">tips on how to avoid being attacked</a> </strong>in the first place.</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/biggest-data-breach/">World’s Biggest Data Breach &#8211; Over 770 Million User Accounts and Passwords Leaked</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.gdprregister.eu/news/biggest-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>German Politicians in the Target of Cyber Attacks</title>
		<link>https://www.gdprregister.eu/news/angela-merkel-hacked/</link>
				<comments>https://www.gdprregister.eu/news/angela-merkel-hacked/#respond</comments>
				<pubDate>Tue, 08 Jan 2019 08:30:09 +0000</pubDate>
		<dc:creator><![CDATA[Sarune Zybartaite]]></dc:creator>
		
		<guid isPermaLink="false">https://www.gdprregister.eu/?post_type=news&#038;p=7473</guid>
				<description><![CDATA[<p>Right after the start of the New Year, the message spread that Angela Merkel&#8217;s personal details leaked on Twitter.  According to the Bloomberg, German Chancellor’s account was hacked, and the information was released in an Advent Calendar sort of fashion.  Compromised information involved bills and credit card information, phone numbers, email addresses, photo identification and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/angela-merkel-hacked/">German Politicians in the Target of Cyber Attacks</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>Right after the start of the New Year, the message spread that Angela Merkel&#8217;s personal details leaked on Twitter.  According to the <em><a href="https://www.bloomberg.com">Bloomberg</a></em><em>, </em>German Chancellor’s account was hacked, and the information was released in an Advent Calendar sort of fashion.  Compromised information involved bills and credit card information, phone numbers, email addresses, photo identification and personal chat histories. Later on, it was discovered that Angela Merkel was not the only one under the attack, but all major German political parties were affected.</p>
<p>A few days later after announcing the incident, the possible <em>m</em><em>astermind</em> of the attack was found. A 19-year-old guy is claimed to cause a huge data breach that affected hundreds of politicians and celebrities. While the German government takes this attack very seriously as the infringement of the of personal data protection, cybersecurity experts warn all the officials in higher power positions to be aware of the risks.</p>
<blockquote><p><strong>LEARNING TIP on prevention from being hacked:<br />
</strong>1.  <strong>Keeping accounts secure with complex passwords</strong> that consist of a combination of numbers, upper- and lower-case letters, and special characters that is difficult to guess (ITPRO suggests that &#8220;<a href="https://www.itpro.co.uk/security/32680/the-best-passwords-are-the-ones-you-cant-remember?_mout=1&amp;utm_campaign=itpro_newsletter&amp;utm_medium=email&amp;utm_source=newsletter">The best passwords are the ones you can&#8217;t remember</a>&#8220;).<br />
2. <strong>Using a password manager</strong> that stores and auto-fills credentials for different sites, allowing to create a complex and unique password for each site and keeping the device much more secure.<br />
3. <strong>NOT sharing the paswords.</strong> With the exception of some school services, never provide a site administrator with the password for them to access the account.<br />
4. <strong>Changing passwords often</strong>, at least once per 6 months.<br />
5. <strong>Setting a two-factor authentication</strong> which requires to enter a code sent, as an example, in a text message. This makes it more difficult for a hacker to access target&#8217;s information, even if they are able to crack the password.<br />
6. <strong>Avoiding the use of the correct answer for security questions</strong>. Hackers can find out target mother’s maiden name or what street target grew up on easily. It is better to enter random answers, or to make them like passwords and not based on the questions at all.<br />
7. <strong>Reading the privacy policies carefully</strong>. Any company that collects any personal data must have a privacy policy that details how they use that information and the extent to which they share it with others.<br />
8. <strong>Logging out of accounts after the session is done.</strong><br />
9. <b class="whb">Making sure that pasword is being entered to an official website. </b>Phishing scams – instances in which a malicious page pretends to be a login page for a social media or bank account – are one of the easiest ways to hack someone. One way to spot phishing scams is to look at the site&#8217;s URL: if it closely resembles (but doesn&#8217;t exactly match) a reputable site&#8217;s URL, it&#8217;s a fake site.</p></blockquote>
<p>The same as any person, any company, regardless of the size, can be attacked. Attackers are aware that receiving GDPR fine could be fatal to the smaller businesses. <a href="https://www.gdprregister.eu/gdpr/ransomware-gdpr/"><strong>Read more on how to prevent cyber attacks in the companies. </strong></a></p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/angela-merkel-hacked/">German Politicians in the Target of Cyber Attacks</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.gdprregister.eu/news/angela-merkel-hacked/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
	</channel>
</rss>
