T-Mobile email vendor breach exposes info on customers, employees
Friday, March 6, 2020
Phishing campaigns most certainly will follow. “Leveraging the compromised data, the malicious actor could target customers with extremely convincing phishing emails that appear to come from the breached company in order to harvest more sensitive information from them,” said Goldstein.
But Ilia Kolochenko, founder and CEO of ImmuniWeb, cautioned against prematurely assessing the overall damage or speculating the eventual consequences of the T-Mobile breach since the circumstances remain obscure and the scope is clouded. While he gave the nod to T-Mobile’s public response for being “adequately adapted to the nature of the breach, aimed at minimizing damage and protecting potential victims,” Kolochenko said, “This does not, however, shield T-Mobile from individual lawsuits and class actions from the victims, but will likely minimize any penalties that regulators may impose.”
The breach highlights the wide spectrum of critical risks stemming from third-party vendors and suppliers,” he said. “Worse, such incidents are infrequently discovered given their complexity and lack of visibility. Most organizations merely rely on vendor SAQ and paper questionnaires without ascertaining that security controls are properly put in place.” Read Full Article
SiliconANGLE: Customer and employee information stolen in latest T-Mobile data breach
Software Testing NEWS: How to succeed as a woman working in cybersecurity