{"id":4884,"date":"2015-07-10T21:40:00","date_gmt":"2015-07-10T21:40:00","guid":{"rendered":"https:\/\/evssolutions.com\/businesses-prove-fraudsters-don-t-always-need-sophistication\/"},"modified":"2023-04-18T21:45:54","modified_gmt":"2023-04-18T21:45:54","slug":"businesses-prove-fraudsters-don-t-always-need-sophistication","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/businesses-prove-fraudsters-don-t-always-need-sophistication\/","title":{"rendered":"Businesses Prove Fraudsters Don\u2019t Always Need Sophistication"},"content":{"rendered":"

Data breaches dominate the headlines, but it is not always clear how they occur. Some fraudsters go to great lengths to infiltrate a network and system; however, attacks can happen because of human error.<\/p>\n

 <\/p>\n

These situations are not all that rare. Fortune released its findings from the Sony Cyber Attack, which shows not just a problem with cyber security but the lack thereof.  A recent example of an incident is, an attack of a London-based hedge fund. <\/span><\/p>\n

The Sony Cyber Attack proved to corporate America that is does not matter to a fraudster how big or powerful a company may be.  Fortune Magazine raised awareness to the Sony attack with a 12,000-word story by Peter Elkind, Editor-at-Large, in the July 1, 2015 issue.<\/a> <\/span><\/p>\n

It is troubling to customers and businesses that an electronic company could be so ill prepared. However, companies can learn from Sony\u2019s mistakes; as an example, reports state that the company\u2019s e-mail system did not offer two-factor authentication, which is such a common practice that Gmail users have seen the practice.  <\/p>\n

In addition, Fortune\u2019s findings claim that Sony previously kept up to seven years worth of unencrypted e-mails, passwords in unprotected documents and more. These findings support statements of what Jason Spaltro, who is now Sony Pictures\u2019 senior VP of information security told CIO in 2007.<\/a><\/p>\n

\u201cWe literally could go broke trying to cover for everything,\u201d Spaltro told CIO. \u201cI will not invest $10 million to avoid a possible $1 million loss,\u201d he reasoned. \u201cIt\u2019s a valid business decision to accept the risk.\u201d <\/p>\n

Although, the statement is more than seven years old, it conveys a point of view that remained over the years. Preparation is key and while the costs may seem overwhelming, businesses must protect the data they store. Therefore, the lack of awareness and pro-activity ultimately affected Sony. As a result, what may have been a $10 million investment for a $1 million loss in 2007 is now much larger than that for what some are considering one of the worst cyber attacks of the century.<\/p>\n

Unlike Sony\u2019s situation, which was a compilation of numerous issues, the hedge fund, Fortelus Capital Management LLP in London relied on cyber technology too much. According to the Daily Mail, Thomas Meston, former CFO at Fortelus Capital Management lost \u00a3740,000 (more than 1.1 million USD). Allegedly, this resulted in the CFO thinking that the company\u2019s bank was calling regarding fraudulent activity and gave sensitive bank information.<\/p>\n

The two situations convey that there is a significant need for strong cyber security procedures for companies of all sizes. However, it is equally important for companies to equip employees with the necessary tools and training to handle situations that may put data at risk for fraudsters to take. <\/p>\n","protected":false},"excerpt":{"rendered":"

Data breaches dominate the headlines, but it is not always clear how they occur. Some fraudsters go to great lengths to infiltrate a network and system; however, attacks can happen because of human error.<\/p>\n","protected":false},"author":40,"featured_media":6287,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[34,38],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4884"}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4884"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4884\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media\/6287"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}