Question

In: Finance

In recent years, some firms have suffered large data breaches, increasing the focus on cyber security....

In recent years, some firms have suffered large data breaches, increasing the focus on cyber security. Find an example of a firm that sufferer a data breach. How effectively did it manage the aftermath of the breach? How could an insurer be helpful?

Solutions

Expert Solution

The firm which suffered data breach is Equifax. The hackers had hacked into the system of this credit rating agnecy and stole millions of data on the customers records. The breach compromised on the personal information of the customers like their date of birth, social security number and adresses and even driver's license numbers.

Due to a number of security and response lapses this security breach had happened. The rating agency was also slow in reporting the breach.Once, it was identified that the breach has taken place, they fixed the bugs, some of which were serious. They started redirected people to a separate domain equifaxsecurity2017.com. They also asked people to trust the system and punch in their social security numbers and check weather a breach has taken place.

Yes, Equifax is liable to pay compensation to all those people whose security has been breached. Luckily, the company had incorporated cyber insurance which will look after all the costs involved and offset a part of the costs.Its cyber covergae includes the breach response costs including credit monitoring expenses .Beazley is the primary insurer for Equifax.


Related Solutions

Data Breaches : In recent years we’ve witnessed a series of disastrous data breach. Research one...
Data Breaches : In recent years we’ve witnessed a series of disastrous data breach. Research one of breaches reported in the recent years (for example this article). Write a report about the breach, describing abuse techniques, damages, consequences, and remedies.
Your readings for this week have discussed databases, data breaches, and networking security in the business...
Your readings for this week have discussed databases, data breaches, and networking security in the business world. Find a major data breach within the last 2 years and do some research explain how and why the breach occurred, what information was accessed, and how this information could be misused. Has the incident been fully resolved or are there ongoing security issues with the company or customer information? Remember to include references to your readings and an article from the web...
How can increased cyber security have a negative impact on data privacy?
How can increased cyber security have a negative impact on data privacy?
Identity theft and data breaches seem to be ever-increasing in scope, severity, and frequency. As it...
Identity theft and data breaches seem to be ever-increasing in scope, severity, and frequency. As it is almost impossible to live in this world without sharing your private information with many other people, what steps can you take to minimize the risk of ID theft, and what can you do after the fact to minimize the damage?
In discussions of business and society, why is there a tendency to focus on large firms...
In discussions of business and society, why is there a tendency to focus on large firms rather than small- or medium-sized firms? Have the corporate ethics scandals of the past decade affected small- and medium-sized firms? If so, in what ways have these firms been affected?
Find two examples of data/security breaches that resulted in theft/loss/exposure of confidential data, preferably health care...
Find two examples of data/security breaches that resulted in theft/loss/exposure of confidential data, preferably health care related related data. Describe the incidents and explain what could have been done to prevent or mitigate them.
I am completing some online labs for a cyber security course. We are meant to do...
I am completing some online labs for a cyber security course. We are meant to do specific tasks. For this task we have a compromised virtual machine in an activity titled "compromised host" . "The attacker has deployed the ‘mimikatz’ tool to attempt to capture plaintext passwords." I am not sure what a mimikatz tool is, but upon research online it is used in malicious attacks. We are meant to find the filename of the executable for this mimikatz tool...
1)   There are many private security firms, and many large housing developments have police protection provided by...
1)   There are many private security firms, and many large housing developments have police protection provided by such private firms. Few towns, though, contract out their police departments Why do you think this is so? What would be the advantages and disadvantages of doing so?
I need a detail explanation of a Cyber Security Project you might have worked on or...
I need a detail explanation of a Cyber Security Project you might have worked on or know about or maybe any project topics or ideas would work.
Learn all you can about the Cyber Security Enhancement Act. What is it? Provide some examples...
Learn all you can about the Cyber Security Enhancement Act. What is it? Provide some examples of court cases that involved violations of this act. What are some of the punishment(s) if someone is found guilty?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT