This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Jean Maurice Rakotoarimanana Article 06 According to Roger Kay, of analysis Endpoint technologies Associate, hackers depend on simple social engineering attacks to gain footholds. A laptop was infected with a malware and permitted unauthorized access to a database which contain names, addresses, Social Security numbers, PenFed account numbers, credit card numbers and/or debit card numbers. According to New Hampshire resident, approximately ten thousands of current and former Pentagon workers will be affected. Sometimes users unknowingly gave access to the malicious program, by clicking a link which contain malware program. And from there the link lead the user to a download they didnt want. Savvy hackers have their way to make their program looks like a normal program to deceive users. It is important to have a good authentication and verification of Endpoint protection prior to connection with important assets. It is also a good practice for companies who handle credit card data and PII to limit the numbers of servers and employees who can touch the data. By storing key information on its own servers, rather than giving it to a third part, a company can retain control of that datas protection. Company holding customer data should use a Web application firewall, develop software using secure practices and focus on whitelisting technologies for key servers....
View Full Document
- Spring '12