Coca-Cola Security Breach Put Personal Information Of 74,000 Employees At Risk

Coca-Cola Security Breach Put Personal Information Of 74,000 Employees At Risk

Coca-Cola Experiences a Data Breach After An Employee Steals Laptops. Coca-Cola has admitted to a data breach after an employee stole dozens of laptops over the course of six years. The stolen laptops went unnoticed and contained the sensitive data of 74,000 individuals. The employee stole a total of 55 laptops from Coca-Cola’s Atlanta offices;...

avatar
Duleep Pillai
January 28, 2014
Discover More
Coca-Cola Security Breach Put Personal Information Of 74,000 Employees At Risk

Retail POS Security: Four Ways To Prevent Cybercriminals From Attacking Your Point-of-Sales Systems

The Target and Neiman Marcus (and now Michaels) data breaches generated a lot of concern for retail businesses. The data breaches were caused by memory-scraping malware that’s designed to steal customer names, credit cards numbers, and other personal information. What you should do to prevent these attacks: Upgrade outdated software to prevent infection from malware...

avatar
Duleep Pillai
January 28, 2014
Discover More
Coca-Cola Security Breach Put Personal Information Of 74,000 Employees At Risk

Michael’s Craft Store Suspects They’ve Been Hit By POS Malware

The U.S. Federal Bureau of Investigation (FBI) has revealed that they’ve detected 20 hacking cases over the past year that used the same POS (point of sale) infecting malware used against Target stores over the 2013 holiday shopping season.  Now Michael’s Craft Store, the largest arts and crafts dealer in the U.S. suspects it has...

avatar
Duleep Pillai
January 26, 2014
Discover More
Coca-Cola Security Breach Put Personal Information Of 74,000 Employees At Risk

Test, Evaluate and Refresh Your Business Continuity Plan On A Regular Basis

Your business operates in threatening time with a diverse range of technology risks, including natural disasters, cyber-attacks, and software or hardware failures. Business continuity planning is necessary to minimize these risks and protect your valuable data. In today’s technology-driven world, most businesses rely on IT to perform critical operational functions. Essentially, information technology is embedded...

avatar
Duleep Pillai
January 24, 2014
Discover More