Fannie Mae breach highlights crucial reed for secure datacenter management principles, according to Cloakware

February 9, 2009

2 Min Read

PRESS RELEASE

Feb. 5, 2009 " Vienna, VA " In light of major security breaches, Cloakware Inc., the provider of proven software solutions for securing business and digital assets, today announced that it is cautioning large organizations to re-evaluate their current datacenter security measures for shared privileged passwords " accounts that administrators use to install, configure and maintain servers, databases, enterprise applications, mainframes etc. across datacenter operations - to avoid being the next in line for a devastating breach. In today's volatile economy, Cloakware, understanding the ramifications of critical security incidents to global organizations, offers three tips for companies to be proactive, protecting critical information and assets from unwanted access.

With the current economic downturn, now more than ever an organization's sensitive data is at risk. Downsizing, restructuring, mergers & acquisitions can all leave security gaps in which disgruntled employees, contractors or creative hackers can steal information or compromise systems. This can result in tangible and intangible costs, including loss of data, loss of profit, lawsuits, and damage to the company brand, ultimately, wreaking havoc that companies simply cannot afford.

In fact, battered mortgage giant Fannie Mae, a recent bailout recipient, just announced they had discovered a worm that was intentionally planted by a disgruntled former employee. Adding insult to injury, this worm, if executed as it was planned on Jan. 31, 2009, would have wiped out millions of mortgage records and locked out the system access for a week " exposing mortgagees and the government to unfathomable repercussions. While this was averted by an F.B.I. sting, most companies are not so lucky.

To prevent the type of devastation and havoc one person can inflict on a company, Cloakware offers three tips for companies to take a proactive approach to prevent breaches and protect company assets. They include:

Read more about:

2009
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights