Insights
Publication | ThinkSet, issue 4
Data Breaches Take Various Forms
Peggy Daley
Spring 2018
Patching leaks from your house to the courthouse
Even companies with redundant data-security systems have blind spots for the social or nontechnical ways that corporate details are at risk. Projects that emphasize physical security—new purchases and monitoring of usage patterns—win funding and attention, while more mundane threats barely get a thought.
It starts with remembering to lock the server room door.
Consider that petty thieves made off with $2.8 million in the Great Brinks Robbery of 1950 by using a piece of plastic to pick a lock. In 2014, the Sony Pictures hack was made possible thanks to logins and passwords stored in an unencrypted file labeled “Passwords.”