Last October, the software giant Adobe suffered a massive security breach which compromised the sensitive data of nearly three million customers. Later in October, further compromise of Adobe’s databases resulted in this number growing to more than 150 Millions names and encrypted passwords. Some of the compromised accounts included more than a quarter million governmental and military accounts. This data included IDs, names, passwords, and encrypted credit card information.
While Adobe’s chief security officer, Brad Arkin, has said that he doesn’t believe the hackers obtained any decrypted credit card information, this is little comfort to the millions of Adobe users worldwide. In addition to the sensitive customer data, hackers also stole source code for numerous Adobe products, which some believe to have included the ColdFusion Web application platform and the Acrobat family of products.
As a precaution, Adobe has reset relevant customer passwords and sent affected customers an email notification. It is also recommended that those affected customers change their passwords on other sites, especially if they use the same one on multiple sites.
In addition to changing passwords and notifying affected customers, Adobe has promised that any customer whose credit card information was stolen would be offered a year’s membership in a credit monitoring service free of charge.
After this most recent breach, security experts and consumers everywhere are more than concerned that the compromised data could be used criminally. In addition, the source code that was stolen has made security professionals around the world a bit nervous, prompting more cyber-vigilance in many companies. It also makes this security breach slightly different from previous billing information compromises.
Since nearly every company worldwide uses Adobe in some form or another, the impact from such a breach is enormous. Adobe’s recent security breach has many business owners questioning: If Adobe can be hacked, how can my company possibly ward off such an attack?
The answer may lie in shifting to an inside-out security model. In other words, corporations and business owners must assume that the criminals in the world are already in their network and work to ensure that their security protects from inside breaches.
“Companies need to secure access to sensitive data by implementing fine-grained access controls, including NSA’s new two-man rule, as well as role-based monitoring in order to detect potential breaches and data center disasters. This is increasingly important in cloud and virtualization environments where the risk is ten times greater.”
At Forensicon, we have the technology and the experience to assist your company or firm with all digital and electronic security breaches. With over a decade of experience tracking rogue hackers, we can help your company after a hacker has compromised your data or breached your security. More importantly we can help prevent the attack from even beginning. To learn more about how our computer forensic specialists can assist your firm, call us at 1-888-427-5667 or visit us on the web at www.forensicon.com.
- Staff Recognized for Departing Employee Investigations - The first issue of Corporate Counsel Business Journal, CCBJ, includes an interview with our Director of Digital Forensics, Yaniv Schiff, and Solutions Architect, Curtis Collette, on the evolution of departing employee investigations. Departing Employee: When Do Investigations Become Necessary? appeared in the print publication, online edition, and on CCBJ’s In-House Tech website. For Increasing Numbers of Employers, Departing Employee Investigations[...Read More]
- Chicago Office Food Drive – The Results Are In - QDiscovery’s Chicago Office collected nearly 1,000 containers of food for the local food bank this Holiday Season! Our office competed with sister offices in Indiana and Connecticut. Alas, we came in third. Our sister offices each collected nearly 2,000 containers for their local food banks. Relatively new to the company-wide food drive, the Forensics Division[...Read More]
- QDiscovery QMobile App Wins Innovation Award - QDiscovery’s QMobile is winner of a 2017 Relativity Innovation Award. Presented at Relativity Fest, the Innovation Award celebrates organizations that create apps or integrations that extend the functionality of Relativity’s eDiscovery software. Our development team created an application that makes the analysis of mobile collections much more manageable. Relativity users can now produce and review mobile[...Read More]
- Moving and Changing - Acquired by Connecticut-based QDiscovery in 2016, Forensicon’s capabilities multiplied overnight, both in forensics brain power and eDiscovery expertise. As part of a leading provider of end to end litigation support, moving to larger offices that are more central to the Chicago legal community was inevitable.
- QDiscovery Named One of the Top 20 Providers of Legal Services! - Leading industry publication, CIO Magazine, has named Forensicon’s parent company, QDiscovery, to it’s Top 20 Providers of Legal Services. The annual listing includes 20 companies that are at the forefront of providing legal solutions and impacting the marketplace. Read the whole article here. Featured in the publication alongside QDiscovery President, Dave Barrett, is Director of Digital Forensics, Yaniv[...Read More]