senior VP of information security told CIO in 2007.<\/a><\/p>\n\u201cWe literally could go broke trying to cover for everything,\u201d Spaltro told CIO. \u201cI will not invest $10 million to avoid a possible $1 million loss,\u201d he reasoned. \u201cIt\u2019s a valid business decision to accept the risk.\u201d <\/p>\n
Although, the statement is more than seven years old, it conveys a point of view that remained over the years. Preparation is key and while the costs may seem overwhelming, businesses must protect the data they store. Therefore, the lack of awareness and pro-activity ultimately affected Sony. As a result, what may have been a $10 million investment for a $1 million loss in 2007 is now much larger than that for what some are considering one of the worst cyber attacks of the century.<\/p>\n
Unlike Sony\u2019s situation, which was a compilation of numerous issues, the hedge fund, Fortelus Capital Management LLP in London relied on cyber technology too much. According to the Daily Mail, Thomas Meston, former CFO at Fortelus Capital Management lost \u00a3740,000 (more than 1.1 million USD). Allegedly, this resulted in the CFO thinking that the company\u2019s bank was calling regarding fraudulent activity and gave sensitive bank information.<\/p>\n
The two situations convey that there is a significant need for strong cyber security procedures for companies of all sizes. However, it is equally important for companies to equip employees with the necessary tools and training to handle situations that may put data at risk for fraudsters to take. <\/p>\n","protected":false},"excerpt":{"rendered":"
Data breaches dominate the headlines, but it is not always clear how they occur. Some fraudsters go to great lengths to infiltrate a network and system; however, attacks can happen because of human error.<\/p>\n","protected":false},"author":40,"featured_media":6287,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[34,38],"tags":[],"class_list":["post-4884","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraud-prevention","category-internet-fraud"],"acf":[],"_links":{"self":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/comments?post=4884"}],"version-history":[{"count":1,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4884\/revisions"}],"predecessor-version":[{"id":6288,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4884\/revisions\/6288"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/media\/6287"}],"wp:attachment":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/media?parent=4884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/categories?post=4884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/tags?post=4884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}