Numerous details about people, their purchases and other sensitive details could be accessed unprotected on the web for months, as Der Spiegel (German content) prominently reports on its website. A service provider had inadequately secured a technical interface. Even upon request, this IT security incident was not addressed until after it had been reported in the media.

Are your IT systems adequately secured? Do you know what your technical service providers are doing – and also what they are omitting – possibly negligently – in terms of information security measures? Let us find out together – with Vulnerability Scanning & Penetration Testing Services from TEN Information Management.

Tags

Share post

More articles

Privilege escalations in applications – often referred to as privilege escalation – are vulnerabilities that allow attackers or even regular users to access data, information or system functions for which they have no authorization. Attackers...
In discussions with customers and interested parties, we are repeatedly confronted with the statement that security investigations (penetration tests and vulnerability scans) are not necessary in cloud scenarios because the cloud provider (e.g. Amazon Web...
Risk precautions are supposedly just as unwelcome as health precautions. But they are just as important! Various studies prove: Attacks on IT systems and applications are increasing significantly. The consequences are financially devastating. At the...